Habiba Chaoui

Orcid: 0000-0001-8892-9612

According to our database1, Habiba Chaoui authored at least 16 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
SDN/NFV Security Challenges and Proposed Architecture.
Proceedings of the 7th IEEE Congress on Information Science and Technology, 2023

2020
An Optimized Security Vehicular Internet of Things -IoT-Application Layer Protocols MQTT and COAP Based on Cryptographic Elliptic-Curve.
Proceedings of the 2nd IEEE International Conference on Electronics, 2020

2019
Teaching Android Mobile Security.
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019

2018
A security approach based on honeypots: Protecting Online Social network from malicious profiles.
CoRR, 2018

Recognition Based Mechanism to Detect Malicious Content in Social Networks.
Proceedings of the International Conference on E-business and Mobile Commerce, 2018

A Proposed Approach to Reduce the Vulnerability in a Cloud System.
Proceedings of the Big Data, Cloud and Applications - Third International Conference, 2018

Access control in IoT environments: Feasible scenarios.
Proceedings of the 9th International Conference on Ambient Systems, 2018

2017
A new approach to mitigate security threats in cloud environment.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

A new secure model for the use of cloud computing in big data analytics.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

Improving Software Automation Testing Using Jenkins, and Machine Learning Under Big Data.
Proceedings of the Big Data Technologies and Applications - 8th International Conference, 2017

Detecting Malicious Users in Social Network via Collaborative Filtering.
Proceedings of the 2nd international Conference on Big Data, Cloud and Applications, 2017

2016
A Robust Authentication Scheme for Telecare Medicine Information System.
Proceedings of the 7th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2016)/The 6th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2016)/Affiliated Workshops, 2016

Intrusion detection system based interaction on mobile agents and clust-density algorithm "IDS-AM-Clust".
Proceedings of the 4th IEEE International Colloquium on Information Science and Technology, 2016

A security scheme for mobile cloud using multi-agents system.
Proceedings of the 4th IEEE International Colloquium on Information Science and Technology, 2016

2015
Big Data Privacy in Healthcare Moroccan Context.
Proceedings of the 6th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2015)/ The 5th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2015)/ Affiliated Workshops, 2015

2014
Big data analysis and query optimization improve HadoopDB performance.
Proceedings of the 10th International Conference on Semantic Systems, 2014


  Loading...