default search action
Mohammed Saber
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c22]Mohammed Saber, Rachid Saadane, Abdellah Chehri, Abdessamad El Rharras, Yassine El Hafid, Mohamed Wahbi:
Reconfigurable Intelligent Surfaces improved Spectrum Sensing in Cognitive Radio Networks. KES 2022: 4113-4122 - 2021
- [c21]Mohammed Saber, Abdellah Chehri, Rachid Saadane, Yassine El Hafid, Abdessamad El Rharras, Mohammed Wahbi:
Reconfigurable Intelligent Surfaces Supported Wireless Communications. KES 2021: 2491-2501 - [c20]Mohammed Saber, Abdellah Chehri, Yassine El Hafid, Rachid Saadane, Mohammed Wahbi, Hatim Kharraz Aroussi:
Hybrid OSA-CSA Model for an Efficient Dynamic Spectrum Access in Cognitive Radio Environments. KES-HCIS 2021: 130-139 - [c19]Adil Abou El Hassan, Abdelmalek El Mehdi, Mohammed Saber:
NarrowBand-IoT and eMTC Towards Massive MTC: Performance Evaluation and Comparison for 5G mMTC. NISS (Springer) 2021: 177-195 - [c18]Imane Kerrakchou, Sara Chadli, Mohammed Saber, Mohammed Ghaouth Belkasmi:
Effects of Jamming Attack on the Internet of Things. NISS (Springer) 2021: 409-422 - 2020
- [c17]Mohammed Saber, Abdessamad El Rharras, Rachid Saadane, Abdellah Chehri, Nadir Hakem, Hatim Kharraz Aroussi:
Spectrum Sensing for Smart Embedded Devices in Cognitive Networks using Machine Learning Algorithms. KES 2020: 2404-2413 - [c16]Abdessamad El Rharras, Mohammed Saber, Abdellah Chehri, Rachid Saadane, Nadir Hakem, Gwanggil Jeon:
Optimization of Spectrum Utilization Parameters in Cognitive Radio Using Genetic Algorithm. KES 2020: 2466-2475
2010 – 2019
- 2019
- [j3]Mohammed Saber, Abdessamad El Rharras, Rachid Saadane, Hatim Kharraz Aroussi, Mohamed Wahbi:
Artificial Neural Networks, Support Vector Machine And Energy Detection For Spectrum Sensing Based On Real Signals. Int. J. Commun. Networks Inf. Secur. 11(1) (2019) - [c15]Mohammed Saber, Abdessamad El Rharras, Rachid Saadane, Hatim Kharraz Aroussi, Mohammed Wahbi:
Controlling interference and power consumption in cognitive radio based on game theory. SCA 2019: 96:1-96:7 - [c14]Mohammed Saber, Abdessamad El Rharras, Rachid Saadane, Hatim Kharraz Aroussi, Abdellah Chehri:
An Optimized Spectrum Sensing Implementation Based on SVM, KNN and TREE Algorithms. SITIS 2019: 383-389 - 2018
- [c13]Mohammed Saber, Abdessamad El Rharras, Rachid Saadane, Hatim Kharraz Aroussi:
Performance Evaluation of Spectrum Sensing Implementation using Artificial Neural Networks and Energy Detection Method. ICECOCS 2018: 1-6 - [c12]Mohammed Saber, Hatim Kharraz Aroussi, Abdessamad El Rharras, Rachid Saadane:
Raspberry Pi and RTL-SDR for Spectrum Sensing based on FM Real Signals. ICMCS 2018: 1-6 - [c11]Mohammed Saber, Mahmuda Naznin:
Saving Relay Time in a Heterogeneous Wireless Sensor Network. LANMAN 2018: 122-124 - 2017
- [c10]Mohammed Saber, Mohammed Ghaouth Belkasmi, Sara Chadli, Mohamed Emharraf, Ilhame El Farissi:
Implementation and Performance Evaluation of Intrusion Detection Systems under high-speed networks. BDCA 2017: 38:1-38:6 - [c9]Mohammed Saber, Mohammed Ghaouth Belkasmi, Sara Chadli, Mohamed Emharraf:
Implementation and Performance Evaluation of Network Intrusion Detection Systems. UNet 2017: 484-495 - 2016
- [j2]Mohamed Emharraf, Mohammed Bourhaleb, Mohammed Saber, Mohammed Rahmoun:
Mobile Robot: SLAM Implementation for Unknown Indoor Environment Exploration. J. Comput. Sci. 12(2): 106-112 (2016) - [j1]Sara Chadli, Mohammed Saber, Abdelhak Ziyyat:
Generation Test-Cases of Attacks in Mobile Ad Hoc Network. J. Comput. Sci. 12(10): 495-501 (2016) - [c8]Ilhame El Farissi, Mohammed Saber, Sara Chadli, Mohamed Emharraf, Mohammed Ghaouth Belkasmi:
The analysis performance of an Intrusion Detection Systems based on Neural Network. CIST 2016: 145-151 - [c7]Ilhame El Farissi, Sara Chadli, Mohamed Emharraf, Mohammed Saber:
The Analysis of KDD-Parameters to Develop an Intrusion Detection System Based on Neural Network. UNet 2016: 491-503 - 2015
- [c6]Mohammed Saber, Sara Chadli, Mohamed Emharraf, Ilhame El Farissi:
Modeling and Implementation Approach to Evaluate the Intrusion Detection System. NETYS 2015: 513-517 - 2014
- [c5]Sara Chadli, Mohamed Emharraf, Mohammed Saber, Abdelhak Ziyyat:
The design of an IDS architecture for MANET based on multi-agent. CIST 2014: 122-128 - [c4]Sara Chadli, Mohammed Saber, Abdelhak Ziyyat:
Defining categories to select representative attack test-cases in MANETs. ICMCS 2014: 855-860 - [c3]Mohamed Emharraf, Mohammed Rahmoun, Mohammed Saber, Mostafa Azizi:
Mobile robot unknown indoor environment exploration using self-localization and grid map building. SITA 2014: 1-5 - [c2]Sara Chadli, Mohamed Emharraf, Mohammed Saber, Abdelhak Ziyyat:
Combination of Hierarchical and Cooperative Models of an IDS for MANETs. SITIS 2014: 230-236 - 2012
- [c1]Mohammed Saber, Mohamed Emharraf, Toumi Bouchentouf, Abdelhamid Benazzi:
Platform based on an embedded system to evaluate the intrusion detection system. ICMCS 2012: 894-899
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint