Mirlabs
Moughit Mohamed
Moughit Mohamed
IR2M laboratory University Hassan 1er Settat, khouribga
Regular Member
Personal Web Site:
Main page: http://www.mirlabs.net/global/index.php?c=main&a=person&id=1359
Short Biography
Dr. Mohamed MOUGHIT is currently professor (HDR) at National School of applied Science (ENSA) Khouribga-Maroc. He received the Telecommunication engineering diploma from INPT (Institut National des Postes et Télécommunication) Rabat-Maroc in 1991. He received, in 1995, the certificate of depth studies in data processing. In 1999, he received the diploma of high studies in data processing. In 2007, Mohamed MOUGHIT received the PhD degree. He is mainly interested in SDN, WSN, Security, mobile telephony networks, and QoS.
List of top 5 publications in the last 5 years
List of top 5 academic activities during the last 5 years
1- Chakir E.M., Moughit M., Khamlichi Y.I. (2018) A Real-Time Risk Assessment Model for Intrusion Detection Systems Using Pattern Matching. In: Noreddine G., Kacprzyk J. (eds) International Conference on Information Technology and Communication Systems. ITCS 2017. Advances in Intelligent Systems and Computing, vol 640. Springer, Cham. DOI: https://doi.org/10.1007/978-3-319-64719-7_20 (Scopus, DBLP, ISI web of Science Thomson Reuters)

2- Chakir E.M., Moughit M., Khamlichi Y.I. (2017) Risk Assessment and Alert Prioritization for Intrusion Detection Systems. In: Sabir E., García Armada A., Ghogho M., Debbah M. (eds) Ubiquitous Networking. UNet 2017. Lecture Notes in Computer Science, vol 10542. Springer, Cham, DOI: https://doi.org/10.1007/978-3-319-68179-5_56 (Scopus, DBLP, ISI web of Science Thomson Reuters)

3- E.M. Chakir, M. Moughit, and Y.I. Khamlichi. An efficient method for evaluating alerts of Intrusion Detection Systems. In International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS), 2017. Pages: 1 - 6, IEEE Xplore, https://doi.org/10.1109/WITS.2017.7934678 (Scopus, DBLP)

4- E. M. Chakir, M. Moughit and Y. I. Khamlichi, A real-time risk assessment model for intrusion detection systems, 2017 International Symposium on Networks, Computers and Communications (ISNCC), Marrakech, 2017, pp. 1-6. IEEE Xplore, doi: 10.1109/ISNCC.2017.8071990 (Scopus, DBLP, ISI web of Science Thomson Reuters)

5- Y. Labyad, M. Moughit, A. Marzouk and A. Haqiq, "Comparative of developed VoLTE AC algorithm with existing one using G.711, G.723 and G.729," 2015 Third World Conference on Complex Systems (WCCS), Marrakech, 2015, pp. 1-5. doi: 10.1109/ICoCS.2015.7483216

6- S. Rattal, A. Badri and M. Moughit, "A new SIP proxy prototype supporting H.323 protocol in OPNET Modeler," 2014 International Conference on Multimedia Computing and Systems (ICMCS), Marrakech, 2014, pp. 1095-1100. doi: 10.1109/ICMCS.2014.6911147