Follow
Mostafa AZIZI
Mostafa AZIZI
Ph.D., Ing, Professor, Lab. MATSI, ESTO, University Med 1st, Oujda - Morocco
Verified email at ump.ma
Title
Cited by
Cited by
Year
A green strategic activity scheduling for UAV networks: A sub-modular game perspective
S Koulali, E Sabir, T Taleb, M Azizi
IEEE Communications Magazine 54 (5), 58-64, 2016
1392016
Comparison of Mamdani-type and Sugeno-type fuzzy inference systems for fuzzy real time scheduling
M Blej, M Azizi
International Journal of Applied Engineering Research 11 (22), 11071-11075, 2016
802016
Environmental awareness and attitude among Iranian students in Malaysian universities
Z Aminrad, M Azizi, M Wahab, R Huron, M Nawawi
Environment Asia 3 (1), 1-10, 2010
582010
Quantum Key Distribution Protocols: A Survey.
M Elboukhari, M Azizi, A Azizi
International Journal of Universal Computer Science 1 (2), 2010
402010
Implementation of secure key distribution based on quantum cryptography
M Elboukhari, A Azizi, M Azizi
2009 International Conference on Multimedia Computing and Systems, 361-365, 2009
362009
Toward a deep learning-based intrusion detection system for IoT against botnet attacks
I Idrissi, M Boukabous, M Azizi, O Moussaoui, H El Fadili
IAES International Journal of Artificial Intelligence 10 (1), 110, 2021
352021
Monitoring and control of the performances for photovoltaic systems
M Hamdaoui, A Rabhi, A El Hajjaji, M Rahmoun, M Azizi
International Renewable Energy Congress, 2009
272009
MDA approach to automate code generation for mobile applications
H Benouda, M Azizi, R Esbai, M Moussaoui
Mobile and Wireless Technologies 2016, 241-250, 2016
252016
IoT security with Deep Learning-based Intrusion Detection Systems: A systematic literature review
I Idrissi, M Azizi, O Moussaoui
2020 Fourth international conference on intelligent computing in data …, 2020
242020
Modeling and code generation of Android applications using acceleo
H Benouda, R ESSBAI, M AZIZI, M MOUSSAOUI
International Journal of Software Engineering and Its Applications 10 (3), 83-94, 2016
242016
Analysis of the Security of BB84 by Model Checking
M Elboukhari, M Azizi, A Azizi
arXiv preprint arXiv:1005.4504, 2010
242010
Classification of major security attacks against RFID systems
M El Beqqal, M Azizi
2017 International Conference on Wireless Technologies, Embedded and …, 2017
232017
Automatic code generation within MDA approach for cross-platform mobiles apps
H Benouda, M Azizi, M Moussaoui, R Esbai
2017 First International Conference on Embedded & Distributed Systems (EDiS …, 2017
202017
Accelerating the update of a DL-based IDS for IoT using deep transfer learning
I Idrissi, M Azizi, O Moussaoui
Indones. J. Electr. Eng. Comput. Sci 23 (2), 1059-1067, 2021
182021
Analysis of quantum cryptography protocols by model checking
M Elboukhari, M Azizi, A Azizi
Int. J. Universal Comput. Sci 1, 34-40, 2010
182010
Integration of quantum key distribution in the TLS protocol
M Elboukhari, M Azizi, A Azizi
IJCSNS 9 (12), 21-28, 2009
172009
Review on security issues in RFID systems
M El Beqqal, M Azizi
Adv. Sci. Technol. Eng. Syst 2 (6), 194-202, 2017
162017
Crime prediction using a hybrid sentiment analysis approach based on the bidirectional encoder representations from transformers
M Boukabous, M Azizi
Indones. J. Electr. Eng. Comput. Sci. 25 (2), 1131-1139, 2022
152022
A lightweight optimized deep learning-based host-intrusion detection system deployed on the edge for IoT
I Idrissi, M Mostafa Azizi, O Moussaoui
International Journal of Computing and Digital System, 2021
152021
Amelioration of attack classifications for evaluating and testing intrusion detection system
M Saber, T Bouchentouf, A Benazzi, M Azizi
Journal of Computer Science 6 (7), 716-722, 2010
152010
The system can't perform the operation now. Try again later.
Articles 1–20