Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Follow
Yassine Sadqi
Title
Cited by
Cited by
Year
A comprehensive survey on SDN security: threats, mitigations, and future directions
Y Maleh, Y Qasmaoui, K El Gholami, Y Sadqi, S Mounir
Journal of Reliable Intelligent Environments 9 (2), 201-239, 2023
1052023
A systematic review and taxonomy of web applications threats
Y Sadqi, Y Maleh
Information Security Journal: A Global Perspective 31 (1), 1-27, 2022
432022
A Global Intrusion Detection System using PcapSockS Sniffer and Multilayer Perceptron Classifier.
A Guezzaz, A Asimi, Y Asimi, Z Tbatou, Y Sadqi
Int. J. Netw. Secur. 21 (3), 438-450, 2019
432019
An empirical assessment of ensemble methods and traditional machine learning techniques for web-based attack detection in industry 5.0
O Chakir, A Rehaimi, Y Sadqi, M Krichen, GS Gaba, A Gurtov
Journal of King Saud University-Computer and Information Sciences 35 (3 …, 2023
412023
A New Mutuel Kerberos Authentication Protocol for Distributed Systems.
Z Tbatou, A Asimi, Y Asimi, Y Sadqi, A Guezzaz
Int. J. Netw. Secur. 19 (6), 889-898, 2017
222017
A new hybrid network sniffer model based on Pcap language and sockets (Pcapsocks)
A Guezzaz, A Asimi, Y Sadqi, Y Asimi, Z Tbatou
International Journal of Advanced Computer Science and Applications 7 (2), 2016
192016
A lightweight neural classifier for intrusion detection
A Guezzaz, A Asimi, Y Asimi, Z Tbatou, Y Sadqi
General Letters in Mathematics 2 (2), 57-66, 2017
182017
Web oauth-based SSO systems security
Y Sadqi, Y Belfaik, S Safi
Proceedings of the 3rd International Conference on Networking, Information …, 2020
162020
Strong zero-knowledge Authentication based on the Virtual Passwords (SAVP)
Y ASIMI, A AMGHAR, A ASIMI, Y SADQI
International Journal of Network Security 18 (4), 601-616, 2016
132016
New Random Generator of a Safe Cryptographic Salt per session (RGSCS)
Y ASIMI, A AMGHAR, A ASIMI, Y SADQI
International Journal of Network Security 18 (3), 445-453, 2016
122016
Kerberos V5: Vulnerabilities and perspectives
Z Tbatou, A Asimi, Y Asimi, Y Sadqi
2015 Third World Conference on Complex Systems (WCCS), 1-5, 2015
122015
A novel secure and privacy-preserving model for OpenID connect based on blockchain
B Yousra, S Yassine, M Yassine, S Said, T Lo’ai, K Salah
IEEE Access, 2023
92023
Short: A lightweight and secure session management protocol
Y Sadqi, A Asimi, Y Asimi
International Conference on Networked Systems, 319-323, 2014
92014
Experimental study on the effectiveness of machine learning methods in web intrusion detection
C Oumaima, R Abdeslam, S Yassine, F Abderrazek
Advances in Information, Communication and Cybersecurity: Proceedings of …, 2022
82022
Strong zero-knowledge Authentication based on the Session Keys (SASK)
Y Asimi, A Amghar, A Asimi, Y Sadqi
International Journal of Network Security & Its Applications 7 (1), 51, 2015
82015
Unpredictable cryptographic primitives for the robust wireless network security
Y Asimi, A Asimi, A Guezzaz, Z Tbatou, Y Sadqi
Procedia computer science 134, 316-321, 2018
72018
A Secure and Efficient User Authentication Scheme for the Web
YA Yassine sadqi, Ahmed Asimi
International Journal of Internet Technology and Secured Transactions, 2015
72015
A cryptographic mutual authentication scheme for web applications
Y Sadqi, A Asimi, Y Asimi
arXiv preprint arXiv:1412.2908, 2014
72014
Evaluation of open-source web application firewalls for cyber threat intelligence
O Chakir, Y Sadqi, Y Maleh
Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence, 35-48, 2023
62023
A systematic review of cybersecurity assessment methods for HTTPS
A Zineddine, O Chakir, Y Sadqi, Y Maleh, GS Gaba, A Gurtov, K Dev
Computers and Electrical Engineering 115, 109137, 2024
52024
The system can't perform the operation now. Try again later.
Articles 1–20