default search action
Hassan El Ghazi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Nabil Tazi Chibi, Omar Ait Oualhaj, Wassim Fassi Fihri, Hassan El Ghazi:
A Novel Approach Based on Machine Learning, Blockchain, and Decision Process for Securing Smart Grid. IEEE Access 12: 33190-33199 (2024) - [c26]Nabil Tazi Chibi, Omar Ait Oualhaj, Hassan El Ghazi, Wassim Fassi Fihri:
Secured Storage of Smart Grid Events: Blockchain Based on Multi Agents Markov Decision Processes. WINCOM 2024: 1-7 - 2023
- [c25]Tariq Mouatassim, Hassan El Ghazi, Khadija Bouzaâchane, El Mahdi El Guarmah, Iyad Lahsen Cherif:
Cybersecurity Analytics: Toward an Efficient ML-Based Network Intrusion Detection System (NIDS). MLN 2023: 267-284 - 2021
- [j12]Wassim Fassi Fihri, Hassan El Ghazi, Badr Abou El Majd:
A Multi-Objective Particle Swarm Optimization Based Algorithm for Primary User Emulation Attack Detection. Wirel. Pers. Commun. 117(2): 867-886 (2021) - [c24]Djerassembe Laouhingamaye Frederic, Awatif Rouijel, Hassan El Ghazi:
Insomnia EEG signal Preprocessing using ICA Algorithms. NISS (ACM) 2021: 55:1-55:7 - 2020
- [j11]Mehdi Ezzarii, Hamid El Ghazi, Hassan El Ghazi, Faissal El Bouanani:
Epigenetic Algorithm-Based Detection Technique for Network Attacks. IEEE Access 8: 199482-199491 (2020) - [j10]Wassim Fassi Fihri, Hassan El Ghazi, Badr Abou El Majd, Faissal El Bouanani:
A Machine Learning Approach for Backoff Manipulation Attack Detection in Cognitive Radio. IEEE Access 8: 227349-227359 (2020) - [c23]Rabie Fadil, Andie Jackson, Badr Abou El Majd, Hassan El Ghazi, Naima Kaabouch:
Classification of Microcalcifications in Mammograms using 2D Discrete Wavelet Transform and Random Forest. EIT 2020: 353-359 - [c22]Rabie Fadil, Badr Abou El Majd, Hassan El Ghazi, Naima Kaabouch:
Breast Microcalcifications Detection using TR-MUSIC Algorithm. EIT 2020: 360-365 - [i9]Zakaria El Mrabet, Mehdi Ezzari, Hassan El Ghazi, Badr Abou El Majd:
Deep Learning-Based Intrusion Detection System for Advanced Metering Infrastructure. CoRR abs/2001.00916 (2020) - [i8]Zakaria El Mrabet, Hassan El Ghazi, Naima Kaabouch:
A Performance Comparison of Data Mining Algorithms Based Intrusion Detection System for Smart Grid. CoRR abs/2001.00917 (2020)
2010 – 2019
- 2019
- [j9]Wassim Fassi Fihri, Hassan El Ghazi, Badr Abou El Majd, Faissal El Bouanani:
A decision-making approach for detecting the primary user emulation attack in cognitive radio networks. Int. J. Commun. Syst. 32(15) (2019) - [c21]Rabie Fadil, Andie Jackson, Badr Abou El Majd, Hassan El Ghazi, Naima Kaabouch:
Segmentation of Microcalcifications in Mammograms: A comparative Study. EIT 2019: 18-23 - [c20]Zakaria El Mrabet, Hassan El Ghazi, Naima Kaabouch:
A Performance Comparison of Data Mining Algorithms Based Intrusion Detection System for Smart Grid. EIT 2019: 298-303 - [c19]Zakaria El Mrabet, Mehdi Ezzari, Hassan El Ghazi, Badr Abou El Majd:
Deep Learning-Based Intrusion Detection System for Advanced Metering Infrastructure. NISS 2019: 58:1-58:7 - [e1]Badr Abouelmajd, Mohamed Ben Ahmed, Anouar Abdelhakim Boudhir, Hassan El Ghazi:
Proceedings of the 2nd International Conference on Networking, Information Systems & Security, NISS 2019, Rabat, Morocco, 27-29 March, 2019. ACM 2019, ISBN 978-1-4503-6645-8 [contents] - [i7]Zakaria El Mrabet, Youness Arjoune, Hassan El Ghazi, Badr Abou Al Majd, Naima Kaabouch:
Primary User Emulation Attacks: A Detection Technique Based on Kalman Filter. CoRR abs/1903.03684 (2019) - 2018
- [j8]Zakaria Elmrabet, Naima Kaabouch, Hassan El Ghazi, Hamid El Ghazi:
Cyber-security in smart grid: Survey and challenges. Comput. Electr. Eng. 67: 469-482 (2018) - [j7]Youness Arjoune, Naima Kaabouch, Hassan El Ghazi, Ahmed Tamtaoui:
A performance comparison of measurement matrices in compressive sensing. Int. J. Commun. Syst. 31(10) (2018) - [j6]Bassma Guermah, Tayeb Sadiki, Hassan El Ghazi:
GNSS Positioning Enhancement Based on NLOS Multipath Biases Estimation Using Gaussian Mixture Noise. Int. J. Mob. Comput. Multim. Commun. 9(1): 21-39 (2018) - [j5]Zakaria Elmrabet, Youness Arjoune, Hassan El Ghazi, Badr Abou Al Majd, Naima Kaabouch:
Primary User Emulation Attacks: A Detection Technique Based on Kalman Filter. J. Sens. Actuator Networks 7(3): 26 (2018) - [c18]Wassim Fassi Fihri, Youness Arjoune, Hassan El Ghazi, Naima Kaabouch, Badr Abou El Majd:
A particle swarm optimization based algorithm for primary user emulation attack detection. CCWC 2018: 823-827 - [c17]Youness Arjoune, Zakaria El Mrabet, Hassan El Ghazi, Ahmed Tamtaoui:
Spectrum sensing: Enhanced energy detection technique based on noise measurement. CCWC 2018: 828-834 - [c16]Bassma Guermah, Tayeb Sadiki, Hassan El Ghazi:
Improving Vehicle Localization in Hard Environment Using GNSS-GSM Hybridization and Gaussian Mixture Noise. ICCAD 2018: 1-6 - [c15]Fatima Salahdine, Naima Kaabouch, Hassan El Ghazi:
One-bit compressive sensing vs. multi-bit compressive sensing for cognitive radio networks. ICIT 2018: 1610-1615 - [i6]Fatima Salahdine, Naima Kaabouch, Hassan El Ghazi:
Bayesian Compressive Sensing with Circulant Matrix for Spectrum Sensing in Cognitive Radio Networks. CoRR abs/1802.03457 (2018) - [i5]Zakaria Elmrabet, Hassan El Ghazi, Naima Kaabouch, Hamid El Ghazi:
Cyber-Security in Smart Grid: Survey and Challenges. CoRR abs/1809.02609 (2018) - [i4]Zakaria Elmrabet, Hamid El Ghazi, Tayeb Sadiki, Hassan El Ghazi:
A New Secure Network Architecture to Increase Security Among Virtual Machines in Cloud Computing. CoRR abs/1809.05528 (2018) - 2017
- [j4]Fatima Salahdine, Naima Kaabouch, Hassan El Ghazi:
A Bayesian recovery technique with Toeplitz matrix for compressive spectrum sensing in cognitive radio networks. Int. J. Commun. Syst. 30(15) (2017) - [j3]Bassma Guermah, Tayeb Sadiki, Hassan El Ghazi, Serge Reboul, Esmail Ahouzi:
A Map-Matching Based Approach to Compute and Modelize NLOS and Multipath Errors for GNSS Positioning in Hard Areas. J. Mobile Multimedia 13(3&4): 256-269 (2017) - [c14]Youness Arjoune, Naima Kaabouch, Hassan El Ghazi, Ahmed Tamtaoui:
Compressive sensing: Performance comparison of sparse recovery algorithms. CCWC 2017: 1-7 - [c13]Fatima Salahdine, Naima Kaabouch, Hassan El Ghazi:
Techniques for dealing with uncertainty in cognitive radio networks. CCWC 2017: 1-6 - [c12]Wassim Fassi Fihri, Hassan El Ghazi, Naima Kaabouch, Badr Abou El Majd:
Bayesian decision model with trilateration for primary user emulation attack localization in cognitive radio networks. ISNCC 2017: 1-6 - [c11]Bassma Guermah, Tayeb Sadiki, Hassan El Ghazi:
Fuzzy logic approach for GNSS signal classification using RHCP and LHCP antennas. UEMCON 2017: 203-208 - [c10]Fatima Salahdine, Hassan El Ghazi:
A real time spectrum scanning technique based on compressive sensing for cognitive radio networks. UEMCON 2017: 506-511 - [i3]Fatima Salahdine, Naima Kaabouch, Hassan El Ghazi:
Techniques for Dealing with Uncertainty in Cognitive Radio Networks. CoRR abs/1701.05468 (2017) - 2016
- [j2]Fatima Salahdine, Naima Kaabouch, Hassan El Ghazi:
A survey on compressive sensing techniques for cognitive radio networks. Phys. Commun. 20: 61-73 (2016) - [c9]Mehdi Ezzarii, Hamid Elghazi, Hassan El Ghazi, Tayeb Sadiki:
Epigenetic algorithm for performing intrusion detection system. ACOSIS 2016: 1-6 - [c8]Wassim Fassi Fihri, Fatima Salahdine, Hassan El Ghazi, Naima Kaabouch:
A survey on decentralized random access MAC protocols for cognitive radio networks. ACOSIS 2016: 1-7 - [c7]Bassma Guermah, Hassan El Ghazi, Tayeb Sadiki, Yann Ben Maissa, Esmail Ahouzi:
A comparative performance analysis of position estimation algorithms for GNSS localization in urban areas. ACOSIS 2016: 1-7 - [c6]Fatima Salahdine, Naima Kaabouch, Hassan El Ghazi:
Bayesian compressive sensing with circulant matrix for spectrum sensing in cognitive radio networks. UEMCON 2016: 1-6 - [i2]Fatima Salahdine, Naima Kaabouch, Hassan El Ghazi:
Matched filter detection with dynamic threshold for cognitive radio networks. CoRR abs/1609.08398 (2016) - 2015
- [c5]Zakaria Elmrabet, Hamid El Ghazi, Tayeb Sadiki, Hassan El Ghazi:
A New Secure Network Architecture to Increase Security Among Virtual Machines in Cloud Computing. UNet 2015: 105-116 - [c4]Youness Arjoune, Ahmed Tamtaoui, Hassan El Ghazi, Lahoucine Ballihi:
A survey on packet scheduling over DVB-S2 through GSE encapsulation. WINCOM 2015: 1-6 - [c3]Fatima Salahdine, Hassan El Ghazi, Naima Kaabouch, Wassim Fassi Fihri:
Matched filter detection with dynamic threshold for cognitive radio networks. WINCOM 2015: 1-6 - 2014
- [j1]Christelle Garnier, Yves Delignon, Hassan El Ghazi, François Septier:
Spreading code allocation strategy for downlink multicarrier code division multiple access transmission in a correlated Rayleigh fading channel. Wirel. Commun. Mob. Comput. 14(6): 659-672 (2014) - 2012
- [c2]Hassan El Ghazi, Hamza Dahmouni:
Behavior analysis of QoS parameters from a live IP network. COMNET 2012: 1-5 - 2010
- [i1]Hamza Dahmouni, Hassan El Ghazi, David Bonacci, Brunilde Sansò, André Girard:
Imprvoing QoS of all-IP Generation of Pre-WiMax Networks Using Delay-Jitter Model. CoRR abs/1006.0845 (2010)
2000 – 2009
- 2006
- [c1]Hassan El Ghazi, Christelle Garnier, Yves Delignon:
Efficient Spreading Code Allocation Strategy for a Downlink MC-CDMA System in a Time Varying Frequency Selective Channel. PIMRC 2006: 1-5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-26 00:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint