Search Results - "Kaabouch, Naima"

Refine Results
  1. 1

    A Comprehensive Survey on Spectrum Sensing in Cognitive Radio Networks: Recent Advances, New Challenges, and Future Research Directions by Arjoune, Youness, Kaabouch, Naima

    Published in Sensors (Basel, Switzerland) (02-01-2019)
    “…Cognitive radio technology has the potential to address the shortage of available radio spectrum by enabling dynamic spectrum access. Since its introduction,…”
    Get full text
    Journal Article
  2. 2

    Social Engineering Attacks: A Survey by Salahdine, Fatima, Kaabouch, Naima

    Published in Future internet (01-04-2019)
    “…The advancements in digital communication technology have made communication between humans more accessible and instant. However, personal and sensitive…”
    Get full text
    Journal Article
  3. 3

    Dynamic Selection Techniques for Detecting GPS Spoofing Attacks on UAVs by Talaei Khoei, Tala, Ismail, Shereen, Kaabouch, Naima

    Published in Sensors (Basel, Switzerland) (01-01-2022)
    “…Unmanned aerial vehicles are prone to several cyber-attacks, including Global Positioning System spoofing. Several techniques have been proposed for detecting…”
    Get full text
    Journal Article
  4. 4

    Analysis of vulnerabilities, attacks, countermeasures and overall risk of the Automatic Dependent Surveillance-Broadcast (ADS-B) system by Riahi Manesh, Mohsen, Kaabouch, Naima

    “…The U.S. Federal Aviation Administration has mandated the use of the Automatic Dependent Surveillance-Broadcast (ADS-B) system by January 2020 as a key…”
    Get full text
    Journal Article
  5. 5

    Detecting and Mitigating Attacks on GPS Devices by Burbank, Jack, Greene, Trevor, Kaabouch, Naima

    Published in Sensors (Basel, Switzerland) (26-08-2024)
    “…Modern systems and devices, including unmanned aerial systems (UASs), autonomous vehicles, and other unmanned and autonomous systems, commonly rely on the…”
    Get full text
    Journal Article
  6. 6

    Autonomous Image-Based Corrosion Detection in Steel Structures Using Deep Learning by Das, Amrita, Dorafshan, Sattar, Kaabouch, Naima

    Published in Sensors (Basel, Switzerland) (01-06-2024)
    “…Steel structures are susceptible to corrosion due to their exposure to the environment. Currently used non-destructive techniques require inspector…”
    Get full text
    Journal Article
  7. 7

    Wideband Spectrum Sensing: A Bayesian Compressive Sensing Approach by Arjoune, Youness, Kaabouch, Naima

    Published in Sensors (Basel, Switzerland) (05-06-2018)
    “…Sensing the wideband spectrum is an important process for next-generation wireless communication systems. Spectrum sensing primarily aims at detecting unused…”
    Get full text
    Journal Article
  8. 8

    Combining Edge Computing-Assisted Internet of Things Security with Artificial Intelligence: Applications, Challenges, and Opportunities by Rupanetti, Dulana, Kaabouch, Naima

    Published in Applied sciences (01-08-2024)
    “…The integration of edge computing with IoT (EC-IoT) systems provides significant improvements in addressing security and privacy challenges in IoT networks…”
    Get full text
    Journal Article
  9. 9

    Electric and Magnetic Fields Analysis of the Safety Distance for UAV Inspection around Extra-High Voltage Transmission Lines by Boukabou, Issam, Kaabouch, Naima

    Published in Drones (Basel) (01-02-2024)
    “…The deployment of small unmanned aerial vehicles (UAVs), or drones, for transmission line inspections, has brought attention to the potential impact of…”
    Get full text
    Journal Article
  10. 10

    A Deep Learning approach for Diagnosis of Mild Cognitive Impairment Based on MRI Images by Gorji, Hamed Taheri, Kaabouch, Naima

    Published in Brain sciences (28-08-2019)
    “…Mild cognitive impairment (MCI) is an intermediary stage condition between healthy people and Alzheimer's disease (AD) patients and other dementias. AD is a…”
    Get full text
    Journal Article
  11. 11

    A Comparative Analysis of Supervised and Unsupervised Models for Detecting Attacks on the Intrusion Detection Systems by Talaei Khoei, Tala, Kaabouch, Naima

    Published in Information (Basel) (01-02-2023)
    “…Intrusion Detection Systems are expected to detect and prevent malicious activities in a network, such as a smart grid. However, they are the main systems…”
    Get full text
    Journal Article
  12. 12

    Deepfake Attacks: Generation, Detection, Datasets, Challenges, and Research Directions by Naitali, Amal, Ridouani, Mohammed, Salahdine, Fatima, Kaabouch, Naima

    Published in Computers (Basel) (01-10-2023)
    “…Recent years have seen a substantial increase in interest in deepfakes, a fast-developing field at the nexus of artificial intelligence and multimedia. These…”
    Get full text
    Journal Article
  13. 13

    Machine Learning: Models, Challenges, and Research Directions by Talaei Khoei, Tala, Kaabouch, Naima

    Published in Future internet (01-10-2023)
    “…Machine learning techniques have emerged as a transformative force, revolutionizing various application domains, particularly cybersecurity. The development of…”
    Get full text
    Journal Article
  14. 14

    A Holistic Review of Machine Learning Adversarial Attacks in IoT Networks by Khazane, Hassan, Ridouani, Mohammed, Salahdine, Fatima, Kaabouch, Naima

    Published in Future internet (01-01-2024)
    “…With the rapid advancements and notable achievements across various application domains, Machine Learning (ML) has become a vital element within the Internet…”
    Get full text
    Journal Article
  15. 15

    An evaluation and ranking of evolutionary algorithms in segmenting abnormal masses in digital mammograms by Belhaj Soulami, Khaoula, Kaabouch, Naima, Saidi, Mohamed Nabil, Tamtaoui, Ahmed

    Published in Multimedia tools and applications (01-07-2020)
    “…Breast cancer is the most common cancer in women worldwide and the second main cause of cancer mortality after lung cancer. Up to now, there still no…”
    Get full text
    Journal Article
  16. 16

    Space Occupancy Representation Based on A Bayesian Model for Unmanned Aerial Vehicles by Elderini, Tarek, Kaabouch, Naima, Neubert, Jeremiah

    Published in Journal of intelligent & robotic systems (01-02-2020)
    “…Collision avoidance for unmanned aerial vehicles is a main task for autonomous aerial systems. One of the major challenges facing such technology is the…”
    Get full text
    Journal Article
  17. 17

    Range-Free Localization Approaches Based on Intelligent Swarm Optimization for Internet of Things by Hadir, Abdelali, Kaabouch, Naima, El Houssaini, Mohammed-Alamine, El Kafi, Jamal

    Published in Information (Basel) (01-11-2023)
    “…Recently, the precise location of sensor nodes has emerged as a significant challenge in the realm of Internet of Things (IoT) applications, including Wireless…”
    Get full text
    Journal Article
  18. 18

    Impact of Dataset and Model Parameters on Machine Learning Performance for the Detection of GPS Spoofing Attacks on Unmanned Aerial Vehicles by Talaei Khoei, Tala, Ismail, Shereen, Shamaileh, Khair Al, Devabhaktuni, Vijay Kumar, Kaabouch, Naima

    Published in Applied sciences (01-01-2023)
    “…GPS spoofing attacks are a severe threat to unmanned aerial vehicles. These attacks manipulate the true state of the unmanned aerial vehicles, potentially…”
    Get full text
    Journal Article
  19. 19

    Multi-Attributes, Utility-Based, Channel Quality Ranking Mechanism for Cognitive Radio Networks by Arjoune, Youness, Mrabet, Zakaria, Kaabouch, Naima

    Published in Applied sciences (01-04-2018)
    “…[...]even though these techniques rank the channel using some parameters and perform well under specific settings, they consider parameters separately in the…”
    Get full text
    Journal Article
  20. 20

    Primary User Emulation Attacks: A Detection Technique Based on Kalman Filter by Mrabet, Zakaria El, Arjoune, Youness, Ghazi, Hassan El, Majd, Badr Abou Al, Kaabouch, Naima

    Published in Journal of sensor and actuator networks (01-09-2018)
    “…Cognitive radio technology addresses the problem of spectrum scarcity by allowing secondary users to use the vacant spectrum bands without causing interference…”
    Get full text
    Journal Article