Alert button
Picture for Zakaria El Mrabet

Zakaria El Mrabet

Alert button

Phishing Attacks Detection -- A Machine Learning-Based Approach

Add code
Bookmark button
Alert button
Jan 26, 2022
Fatima Salahdine, Zakaria El Mrabet, Naima Kaabouch

Figure 1 for Phishing Attacks Detection -- A Machine Learning-Based Approach
Figure 2 for Phishing Attacks Detection -- A Machine Learning-Based Approach
Figure 3 for Phishing Attacks Detection -- A Machine Learning-Based Approach
Figure 4 for Phishing Attacks Detection -- A Machine Learning-Based Approach
Viaarxiv icon

Deep Learning-Based Intrusion Detection System for Advanced Metering Infrastructure

Add code
Bookmark button
Alert button
Dec 31, 2019
Zakaria El Mrabet, Mehdi Ezzari, Hassan Elghazi, Badr Abou El Majd

Figure 1 for Deep Learning-Based Intrusion Detection System for Advanced Metering Infrastructure
Figure 2 for Deep Learning-Based Intrusion Detection System for Advanced Metering Infrastructure
Figure 3 for Deep Learning-Based Intrusion Detection System for Advanced Metering Infrastructure
Figure 4 for Deep Learning-Based Intrusion Detection System for Advanced Metering Infrastructure
Viaarxiv icon

A Performance Comparison of Data Mining Algorithms Based Intrusion Detection System for Smart Grid

Add code
Bookmark button
Alert button
Dec 31, 2019
Zakaria El Mrabet, Hassan El Ghazi, Naima Kaabouch

Figure 1 for A Performance Comparison of Data Mining Algorithms Based Intrusion Detection System for Smart Grid
Figure 2 for A Performance Comparison of Data Mining Algorithms Based Intrusion Detection System for Smart Grid
Figure 3 for A Performance Comparison of Data Mining Algorithms Based Intrusion Detection System for Smart Grid
Figure 4 for A Performance Comparison of Data Mining Algorithms Based Intrusion Detection System for Smart Grid
Viaarxiv icon

Primary User Emulation Attacks: A Detection Technique Based on Kalman Filter

Add code
Bookmark button
Alert button
Mar 08, 2019
Zakaria El Mrabet, Youness Arjoune, Hassan El Ghazi, Badr Abou Al Majd, Naima Kaabouch

Figure 1 for Primary User Emulation Attacks: A Detection Technique Based on Kalman Filter
Figure 2 for Primary User Emulation Attacks: A Detection Technique Based on Kalman Filter
Figure 3 for Primary User Emulation Attacks: A Detection Technique Based on Kalman Filter
Figure 4 for Primary User Emulation Attacks: A Detection Technique Based on Kalman Filter
Viaarxiv icon