Said Benkirane

Orcid: 0000-0001-7095-4502

According to our database1, Said Benkirane authored at least 23 papers between 2010 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
A smart model integrating LSTM and XGBoost for improving IoT-enabled smart cities security.
Clust. Comput., February, 2025

2024
A Robust Model for Predicting Abnormal Behavior in Vehicular Networks using AdaBoost and Chi-Square.
Wirel. Pers. Commun., October, 2024

Malicious detection model with artificial neural network in IoT-based smart farming security.
Clust. Comput., September, 2024

Toward an intrusion detection model for IoT-based smart environments.
Multim. Tools Appl., July, 2024

IDS-XGbFS: a smart intrusion detection system using XGboostwith recent feature selection for VANET safety.
Clust. Comput., June, 2024

An efficient intrusion detection system for IoT security using CNN decision forest.
PeerJ Comput. Sci., 2024

2023
Anomaly detection model based on gradient boosting and decision tree for IoT environments security.
J. Reliab. Intell. Environ., December, 2023

lIDS-SIoEL: intrusion detection framework for IoT-based smart environments security using ensemble learning.
Clust. Comput., December, 2023

An effective intrusion detection approach based on ensemble learning for IIoT edge computing.
J. Comput. Virol. Hacking Tech., November, 2023

An Ensemble Learning Based Intrusion Detection Model for Industrial IoT Security.
Big Data Min. Anal., September, 2023

Cloud-Based Intrusion Detection Approach Using Machine Learning Techniques.
Big Data Min. Anal., September, 2023

An efficient network intrusion detection model for IoT security using K-NN classifier and feature selection.
Multim. Tools Appl., June, 2023

An improved anomaly detection model for IoT security using decision tree and gradient boosting.
J. Supercomput., 2023

Authentication in Internet of Things: State of Art.
Proceedings of the 6th International Conference on Networking, 2023

2022
Random forest-based IDS for IIoT edge computing security using ensemble learning for dimensionality reduction.
Int. J. Embed. Syst., 2022

A Lightweight Hybrid Intrusion Detection Framework using Machine Learning for Edge-Based IIoT Security.
Int. Arab J. Inf. Technol., 2022

2021
A Reliable Network Intrusion Detection Approach Using Decision Tree with Enhanced Data Quality.
Secur. Commun. Networks, 2021

2019
Road Safety Against Sybil Attacks Based on RSU Collaboration in VANET Environment.
Proceedings of the Mobile, Secure, and Programmable Networking, 2019

2018
Performance Evaluation of IEEE 802.11p and IEEE 802.16e for Vehicular Ad Hoc Networks Using Simulation Tools.
Proceedings of the 5th IEEE International Congress on Information Science and Technology, 2018

2015
A new comparative study of ad hoc routing protocol AODV and DSR in VANET environment using simulation tools.
Proceedings of the 15th International Conference on Intelligent Systems Design and Applications, 2015

2013
Energy-Aware Scheme used in Multi-level Heterogeneous Wireless Sensor Networks.
CoRR, 2013

2012
Householder Algorithm Applied to Localization for Wireless Sensor Networks.
Int. J. Mob. Comput. Multim. Commun., 2012

2010
Equitable Leach-E Protocol for Heterogeneous Wireless Sensor Networks.
Proceedings of the Intelligent Distributed Computing IV - Proceedings of the 4th International Symposium on Intelligent Distributed Computing, 2010


  Loading...