no code implementations • 22 Jun 2022 • Tala Talaei Khoei, Hadjar Ould Slimane, Naima Kaabouch
In this survey paper, we provide a classification of attacks based on the OSI model and discuss in more detail the cyber-attacks that can target the different layers of smart grid networks communication.
no code implementations • 26 Jan 2022 • Fatima Salahdine, Zakaria El Mrabet, Naima Kaabouch
Over the last decade, a number of anti-phishing techniques have been proposed to detect and mitigate these attacks.
no code implementations • 31 Dec 2019 • Zakaria El Mrabet, Hassan El Ghazi, Naima Kaabouch
Smart grid is an emerging and promising technology.
no code implementations • 8 Mar 2019 • Zakaria El Mrabet, Youness Arjoune, Hassan El Ghazi, Badr Abou Al Majd, Naima Kaabouch
Primary user emulation attacks are one of the most severe attacks in which a malicious user emulates the primary user signal characteristics to either prevent other legitimate secondary users from accessing the idle channels or causing harmful interference to the primary users.
no code implementations • 3 Jul 2016 • Naima Kaabouch, Richard R. Schultz, Barry Milavetz, Lata Balakrishnan
Automatic thresholding, used to equalize the gray values of the gel electrophoresis image background, is one of the novel operations in this algorithm.
no code implementations • 3 Jul 2016 • Naima Kaabouch, Hamid Shahbazkia
One of the major challenges of this technique is the image processing phase.
no code implementations • 11 Jun 2016 • Naima Kaabouch, Wen-Chen Hu, Yi Chen
Asymmetry analysis based on the overlapping of thermal images proved able to detect inflammation and, predict foot ulceration.