Mourade Azrour

Orcid: 0000-0003-1575-8140

According to our database1, Mourade Azrour authored at least 31 papers between 2017 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
A smart model integrating LSTM and XGBoost for improving IoT-enabled smart cities security.
Clust. Comput., February, 2025

2024
A Robust Model for Predicting Abnormal Behavior in Vehicular Networks using AdaBoost and Chi-Square.
Wirel. Pers. Commun., October, 2024

Malicious detection model with artificial neural network in IoT-based smart farming security.
Clust. Comput., September, 2024

Toward an intrusion detection model for IoT-based smart environments.
Multim. Tools Appl., July, 2024

IDS-XGbFS: a smart intrusion detection system using XGboostwith recent feature selection for VANET safety.
Clust. Comput., June, 2024

An efficient intrusion detection system for IoT security using CNN decision forest.
PeerJ Comput. Sci., 2024

2023
Anomaly detection model based on gradient boosting and decision tree for IoT environments security.
J. Reliab. Intell. Environ., December, 2023

lIDS-SIoEL: intrusion detection framework for IoT-based smart environments security using ensemble learning.
Clust. Comput., December, 2023

An effective intrusion detection approach based on ensemble learning for IIoT edge computing.
J. Comput. Virol. Hacking Tech., November, 2023

New ECC-Based IoT Authentication Protocol for Securing RFID Systems.
SN Comput. Sci., November, 2023

An Ensemble Learning Based Intrusion Detection Model for Industrial IoT Security.
Big Data Min. Anal., September, 2023

Cloud-Based Intrusion Detection Approach Using Machine Learning Techniques.
Big Data Min. Anal., September, 2023

An efficient network intrusion detection model for IoT security using K-NN classifier and feature selection.
Multim. Tools Appl., June, 2023

An improved anomaly detection model for IoT security using decision tree and gradient boosting.
J. Supercomput., 2023

Authentication in Internet of Things: State of Art.
Proceedings of the 6th International Conference on Networking, 2023

2022
Random forest-based IDS for IIoT edge computing security using ensemble learning for dimensionality reduction.
Int. J. Embed. Syst., 2022

A Lightweight Hybrid Intrusion Detection Framework using Machine Learning for Edge-Based IIoT Security.
Int. Arab J. Inf. Technol., 2022

Predicting Students' Final Performance Using Artificial Neural Networks.
Big Data Min. Anal., 2022

Effect of Feature Selection on the Prediction of Direct Normal Irradiance.
Big Data Min. Anal., 2022

2021
A Reliable Network Intrusion Detection Approach Using Decision Tree with Enhanced Data Quality.
Secur. Commun. Networks, 2021

Internet of Things Security: Challenges and Key Issues.
Secur. Commun. Networks, 2021

New Efficient and Secured Authentication Protocol for Remote Healthcare Systems in Cloud-IoT.
Secur. Commun. Networks, 2021

Use of internet of things for monitoring and evaluating water's quality: a comparative study.
Int. J. Cloud Comput., 2021

Survey of high school students' usage of smartphone in Moroccan rural areas.
Int. J. Cloud Comput., 2021

Recent trends in Social Engineering Scams and Case study of Gift Card Scam.
CoRR, 2021

Intelligent monitoring system for biogas detection based on the Internet of Things: Mohammedia, Morocco city landfill case.
Big Data Min. Anal., 2021

IoT-based data logger for weather monitoring using arduino-based wireless sensor networks with remote graphical application and alerts.
Big Data Min. Anal., 2021

Mathematical validation of proposed machine learning classifier for heterogeneous traffic and anomaly detection.
Big Data Min. Anal., 2021

New enhanced authentication protocol for Internet of Things.
Big Data Min. Anal., 2021

2017
A New Authentication and Key Exchange Protocol for Session Initiation Protocol Using Smart Card.
Int. J. Netw. Secur., 2017

A New Efficient SIP Authentication and Key Agreement Protocol Based on Chaotic Maps and Using Smart Card.
Proceedings of the 2nd International Conference on Computing and Wireless Communication Systems, 2017


  Loading...