A green strategic activity scheduling for UAV networks: A sub-modular game perspective S Koulali, E Sabir, T Taleb, M Azizi IEEE Communications Magazine 54 (5), 58-64, 2016 | 139 | 2016 |
Comparison of Mamdani-type and Sugeno-type fuzzy inference systems for fuzzy real time scheduling M Blej, M Azizi International Journal of Applied Engineering Research 11 (22), 11071-11075, 2016 | 80 | 2016 |
Environmental awareness and attitude among Iranian students in Malaysian universities Z Aminrad, M Azizi, M Wahab, R Huron, M Nawawi Environment Asia 3 (1), 1-10, 2010 | 58 | 2010 |
Quantum Key Distribution Protocols: A Survey. M Elboukhari, M Azizi, A Azizi International Journal of Universal Computer Science 1 (2), 2010 | 40 | 2010 |
Implementation of secure key distribution based on quantum cryptography M Elboukhari, A Azizi, M Azizi 2009 International Conference on Multimedia Computing and Systems, 361-365, 2009 | 36 | 2009 |
Toward a deep learning-based intrusion detection system for IoT against botnet attacks I Idrissi, M Boukabous, M Azizi, O Moussaoui, H El Fadili IAES International Journal of Artificial Intelligence 10 (1), 110, 2021 | 35 | 2021 |
Monitoring and control of the performances for photovoltaic systems M Hamdaoui, A Rabhi, A El Hajjaji, M Rahmoun, M Azizi International Renewable Energy Congress, 2009 | 27 | 2009 |
MDA approach to automate code generation for mobile applications H Benouda, M Azizi, R Esbai, M Moussaoui Mobile and Wireless Technologies 2016, 241-250, 2016 | 25 | 2016 |
IoT security with Deep Learning-based Intrusion Detection Systems: A systematic literature review I Idrissi, M Azizi, O Moussaoui 2020 Fourth international conference on intelligent computing in data …, 2020 | 24 | 2020 |
Modeling and code generation of Android applications using acceleo H Benouda, R ESSBAI, M AZIZI, M MOUSSAOUI International Journal of Software Engineering and Its Applications 10 (3), 83-94, 2016 | 24 | 2016 |
Analysis of the Security of BB84 by Model Checking M Elboukhari, M Azizi, A Azizi arXiv preprint arXiv:1005.4504, 2010 | 24 | 2010 |
Classification of major security attacks against RFID systems M El Beqqal, M Azizi 2017 International Conference on Wireless Technologies, Embedded and …, 2017 | 23 | 2017 |
Automatic code generation within MDA approach for cross-platform mobiles apps H Benouda, M Azizi, M Moussaoui, R Esbai 2017 First International Conference on Embedded & Distributed Systems (EDiS …, 2017 | 20 | 2017 |
Accelerating the update of a DL-based IDS for IoT using deep transfer learning I Idrissi, M Azizi, O Moussaoui Indones. J. Electr. Eng. Comput. Sci 23 (2), 1059-1067, 2021 | 18 | 2021 |
Analysis of quantum cryptography protocols by model checking M Elboukhari, M Azizi, A Azizi Int. J. Universal Comput. Sci 1, 34-40, 2010 | 18 | 2010 |
Integration of quantum key distribution in the TLS protocol M Elboukhari, M Azizi, A Azizi IJCSNS 9 (12), 21-28, 2009 | 17 | 2009 |
Review on security issues in RFID systems M El Beqqal, M Azizi Adv. Sci. Technol. Eng. Syst 2 (6), 194-202, 2017 | 16 | 2017 |
Crime prediction using a hybrid sentiment analysis approach based on the bidirectional encoder representations from transformers M Boukabous, M Azizi Indones. J. Electr. Eng. Comput. Sci. 25 (2), 1131-1139, 2022 | 15 | 2022 |
A lightweight optimized deep learning-based host-intrusion detection system deployed on the edge for IoT I Idrissi, M Mostafa Azizi, O Moussaoui International Journal of Computing and Digital System, 2021 | 15 | 2021 |
Amelioration of attack classifications for evaluating and testing intrusion detection system M Saber, T Bouchentouf, A Benazzi, M Azizi Journal of Computer Science 6 (7), 716-722, 2010 | 15 | 2010 |