Search Results - "Haddadi, Mohamed"

  • Showing 1 - 6 results of 6
Refine Results
  1. 1

    Genetic-Based Algorithm for Task Scheduling in Fog–Cloud Environment by Khiat, Abdelhamid, Haddadi, Mohamed, Bahnes, Nacera

    Published in Journal of network and systems management (01-03-2024)
    “…Over the past few years, there has been a consistent increase in the number of Internet of Things (IoT) devices utilizing Cloud services. However, this growth…”
    Get full text
    Journal Article
  2. 2
  3. 3

    DoS-DDoS: TAXONOMIES OF ATTACKS, COUNTERMEASURES, AND WELL-KNOWN DEFENSE MECHANISMS IN CLOUD ENVIRONMENT by Haddadi, Mohamed, Beghdad, Rachid

    Published in EDPACS (04-05-2018)
    “…Cloud computing has become a suitable provider of services for organizations as well as individuals through the Internet. Generally, these services become…”
    Get full text
    Journal Article
  4. 4

    A SINGLE-PACKET IP TRACEBACK: COMBATING DOS-DDOS ATTACKS by Mohamed, Haddadi, Ouldmohamed, Youcef, Nacera, Bahnes

    Published in EDPACS (03-10-2022)
    “…Cyber-attacks such as Denial of Service (DoS) and Distributed Denial of Service(DDoS) can affect Internet security so that they become a major threat to the…”
    Get full text
    Journal Article
  5. 5

    Well-known Open-Source Cloud Computing Platforms by Haddadi, Mohamed, Bahnes, Nacera

    “…Cloud computing is an adaptive model that provides resources to end-users. This model moves many organizations to develop open-source cloud computing…”
    Get full text
    Conference Proceeding
  6. 6

    Intrusion Detection Systems using Data Mining Techniques: A comparative study by Haddadi, Mohamed, Khiat, Abdelhamid, Bahnes, Nacera

    “…Data mining tools are widely used in computer networks. The well-known and mostly used tools to secure computers and network systems are WEKA and TANAGRA. The…”
    Get full text
    Conference Proceeding