Follow
ahmed BENTAJER
ahmed BENTAJER
Professor, ENSA Tetouan
Verified email at ced.uca.ma
Title
Cited by
Cited by
Year
Proposed GA-BFSS and logistic regression based intrusion detection system
P Ghosh, R Mitra
Proceedings of the 2015 third international conference on computer …, 2015
422015
A survey of intrusion detection system
L Dali, A Bentajer, E Abdelmajid, K Abouelmehdi, H Elsayed, E Fatiha, ...
2015 2nd World Symposium on Web Applications and Networking (WSWAN), 1-6, 2015
402015
CS-IBE: a data confidentiality system in public cloud storage system
A Bentajer, M Hedabou, K Abouelmehdi, S Elfezazi
Procedia computer science 141, 559-564, 2018
322018
An IBE-based design for assured deletion in cloud storage
A Bentajer, M Hedabou, K Abouelmehdi, Z Igarramen, S El Fezazi
Cryptologia 43 (3), 254-265, 2019
312019
Classifying Arabic text using deep learning
M Galal, MM Madbouly, A El-Zoghby
Journal of Theoretical and Applied Information Technology 97 (23), 3412-3422, 2019
222019
Cryptographic key management issues in cloud computing
A Bentajer, M Hedabou
Adv. Eng. Res 34, 78-112, 2020
72020
Comparative and analysis study of biometric systems
F Ennaama, K Benhida, A Boulahoual, A Bentajer, H Mustapha, ...
Journal of Theoretical and Applied Information Technology 97 (12), 2019
52019
Secure Cloud Key Management based on Robust Secret Sharing
A Bentajer, M Hedabou, S Ennaama, A Tahiri
CS and IT Conference Proceedings 11 (9), 2021
32021
TPM Based Design for Enhanced Trust in SaaS Services
M Hedabou, A Azougaghe, A Bentajer
CS & IT Conference Proceedings 10 (5), 217-226, 2020
22020
TPM based schema for reinforcing security in IBE’s key manager
Z Igarramen, A Bentajer, M Hedabou
New Trends in Model and Data Engineering: MEDI 2019 International Workshops …, 2019
22019
A NEW APPROACH OF WEB ATTACKS CLASSIFICATION FOR TESTING SECURITY TOOLS AT THE APPLICATION LEVEL.
K ABOUELMEHDI, A BENTAJER, N SEFIANI
Journal of Theoretical & Applied Information Technology 72 (3), 2015
22015
Robust Secret Share to Reinforce the Security of IBE’s Master Key
A Bentajer, Y Said, Z Igarramen, M Hedabou
Advances in Information, Communication and Cybersecurity: Proceedings of …, 2022
12022
AN ASSESSING APPROACH BASED ON FMECA METHODOLOGY TO EVALUATE SECURITY OF A THIRD PARTY CLOUD PROVIDER.
B Ahmed, AEM Karim, D Loubna, ELF Said, H Mustapha, ...
Journal of Theoretical & Applied Information Technology 74 (3), 2015
12015
The behaviour of undrained saturated clay under cyclic loading.
H Mustapha, B Ahmed
12006
Development of Design for Enhancing Trust in Cloud’s SPI Stack
A BENTAJER, M HEDABOU, F ENNAAMA, S ELFEZAZİ
International Journal of Computational and Experimental Science and …, 2020
2020
A USER FRIENDLY AND IMPROVED DESIGN FOR SECURE DELETION IN CLOUD STORAGE.
B AHMED, E FAOUZIA, H MUSTAPHA, E SAID
Journal of Theoretical & Applied Information Technology 95 (6), 2017
2017
PROTECTION OF VIRTUAL MACHINE D
T TPM
2015
Organisation des attaques web: classes et attributs
IILESC EXISTANTES
New approach to enhance security in cloud computing against internal side channel attacks
A Bentajer, M Hedabou, SEL Fezazi, I Mouhib
The system can't perform the operation now. Try again later.
Articles 1–19