default search action
Najib El Kamoun
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j1]Yassine El Yamani, Youssef Baddi, Najib El Kamoun:
A survey on the contribution of ML and DL to the detection and prevention of botnet attacks. J. Reliab. Intell. Environ. 10(4): 431-448 (2024) - [c12]Yousra Fadili, Yassine El Yamani, Jihad Kilani, Najib El Kamoun, Youssef Baddi, Faycal Bensalah:
An Enhancing Timeseries Anomaly Detection Using LSTM and Bi-LSTM Architectures. WINCOM 2024: 1-6 - [c11]Yassine El Yamani, Yousra Fadili, Jihad Kilani, Najib El Kamoun, Youssef Baddi, Faycal Bensalah:
Hybrid Models for IoT Security: Tackling Class Imbalance. WINCOM 2024: 1-6 - 2020
- [c10]Khalid E. L. Khadiri, Ouidad Labouidya, Najib El Kamoun, Rachid Hilal, Fatima Lakrami, Chaimaa Belbergui:
Study of Various Web-based Applications Performance in Natif IPv4 and IPv6 Environments. ISDA 2020: 292-301
2010 – 2019
- 2019
- [c9]Yassine Sabri, Najib El Kamoun, Fatima Lakrami:
Investigation of Energy Efficient Routing Protocols in Wireless Sensor Networks on Variant Energy Models. BDIoT 2019 - [c8]Yassine Sabri, Najib El Kamoun, Fatima Lakrami:
A survey of Smart Grid in Protection Perspective. BDIoT 2019 - [c7]Faycal Bensalah, Najib El Kamoun, Mohammed-Alamine El Houssaini:
Inline detection of Denial of Service Attacks in Software Defined Networking using the Hotelling Chart. EUSPN/ICTH 2019: 785-790 - [c6]Faycal Bensalah, Najib El Kamoun, Youssef Baddi:
A novel approach for improving MPLS VPN security by adopting the software defined network paradigm. EUSPN/ICTH 2019: 831-836 - [c5]Abdellatif Elmouatamid, Radouane Ouladsine, Mohamed Bakhouya, Najib El Kamoun, Khalid Zine-Dine, Mohammed Khaidar:
A Control Strategy Based on Power Forecasting for Micro-Grid Systems. ISC2 2019: 735-740 - 2018
- [c4]Faycal Bensalah, Najib El Kamoun, Ayoub Bahnasse:
Software Defined Networking for Smart Quality of Service Management on New Generation Network. ICMCS 2018: 1-6 - 2015
- [c3]Asmaa Kassid, Najib El Kamoun:
Evaluation of a Security Policy Based on OrBAC Model Using MotOrBAC: Application E-learning. UNet 2015: 129-139 - 2013
- [c2]Abderrahim Maizate, Najib El Kamoun:
Enhanced passive clustering based on distance and residual energy for wireless sensor network. AICCSA 2013: 1-8 - [c1]Yassine Sabri, Najib El Kamoun:
Forest Fire Detection and Localization with Wireless Sensor Networks. NETYS 2013: 321-325
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint