


default search action
Anas Motii
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j2]Saida Elouardi, Anas Motii
, Mohammed Jouhari, Abdoul Nasser Hassane Amadou
, Mustapha Hedabou
:
A Survey on Hybrid-CNN and LLMs for Intrusion Detection Systems: Recent IoT Datasets. IEEE Access 12: 180009-180033 (2024) - [j1]Gursharan Singh
, Parminder Singh
, Anas Motii
, Mustapha Hedabou
:
A secure and lightweight container migration technique in cloud computing. J. King Saud Univ. Comput. Inf. Sci. 36(1): 101887 (2024) - [c10]Abdoul Nasser Hassane Amadou, Anas Motii, Mohammed Jouhari:
HC-HackerRank: Identifying Key Hackers in Cybercrime Social Network Forums. CommNet 2024: 1-8 - [c9]Iness Hassani Idrissi, Mohammed Jouhari, Hafsa Benaddi, Anas Motii, Khalil Ibrahimi:
Deep Learning-Based Traffic Banner Recognition for Enhanced Road Safety in Autonomous Vehicles. CommNet 2024: 1-6 - [c8]Anas Motii, Mahmoud El Hamlaoui:
MBSPI - A Model-Based Security Pattern Integration Approach for software architectures. FedCSIS 2024: 443-452 - [c7]Abdoul Nasser Hassane Amadou, Anas Motii, Saida Elouardi, El Houcine Bergou:
EUREKHA: Enhancing User Representation for Key Hackers Identification in Underground Forums. TrustCom 2024: 387-398 - [i1]Abdoul Nasser Hassane Amadou, Anas Motii, Saida Elouardi, El Houcine Bergou:
EUREKHA: Enhancing User Representation for Key Hackers Identification in Underground Forums. CoRR abs/2411.05479 (2024) - 2023
- [c6]Anas Motii:
MBTA: A Model-Based Threat Analysis Approach for Software Architectures. SAFECOMP 2023: 121-134
2010 – 2019
- 2017
- [b1]Anas Motii:
Ingénierie des sytèmes sécurisés: patrons, modèles et analyses. (Engineering secure software architectures: patterns, models and analysis). Paul Sabatier University, Toulouse, France, 2017 - 2016
- [c5]Anas Motii, Brahim Hamid
, Agnes Lanusse, Jean-Michel Bruel:
Guiding the Selection of Security Patterns for Real-Time Systems. ICECCS 2016: 155-164 - [c4]Anas Motii, Brahim Hamid, Agnes Lanusse, Jean-Michel Bruel:
Towards the integration of security patterns in UML component-based applications. PAME/VOLT@MoDELS 2016: 2-6 - [c3]Anas Motii, Agnes Lanusse, Brahim Hamid
, Jean-Michel Bruel:
Model-Based Real-Time Evaluation of Security Patterns: A SCADA System Case Study. SAFECOMP Workshops 2016: 375-389 - 2015
- [c2]Anas Motii, Brahim Hamid
, Agnes Lanusse, Jean-Michel Bruel:
Guiding the selection of security patterns based on security requirements and pattern classification. EuroPLoP 2015: 10:1-10:17 - [c1]Rouwaida Abdallah, Anas Motii, Nataliya Yakymets, Agnes Lanusse:
Using Model Driven Engineering to Support Multi-paradigms Security Analysis. MODELSWARD (Revised Selected Papers) 2015: 278-292
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-25 18:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint