Rachid Beghdad

Learn More
This paper presents a critical study about the use of some neural networks (NNs) to detect and classify intrusions. The aim of our research is to determine which NN classifies well the attacks and leads to the higher detection rate of each attack. This study focused on two classification types of records: a single class (normal, or attack), and a(More)
This article may be used for research, teaching and private study purposes. Any substantial or systematic reproduction, redistribution , reselling , loan or sub-licensing, systematic supply or distribution in any form to anyone is expressly forbidden. The publisher does not give any warranty express or implied or make any representation that the contents(More)
Border coverage is acknowledged as important problem addressed in literature of wireless sensor networks (WSNs). In this paper, we suggest a solution to solve this problem called Border Coverage Protocol (BCP) that preserves both border and area coverage. This protocol runs in three phases: the first one is used to detect the nodes close to the border and(More)
Wireless sensor networks (WSN) are constrained by the processing speed, storage capacity, collision avoidance and energy which they are fundamental aspects in the development of communication protocols, and in this context, most research projects in this area focus on the aspect of energy, and ignore some QoS supports also interesting and unexplored, such(More)
We introduce a novel algorithm to detect unknown attacks, based on the Communicating Ant for Clustering (CAC) [1], which despite the other ants algorithm, lead to a better detection rate (DR). Secondly, having noted the low DR of R2L attacks, we improve this approach by hybridizing it with association rules approach. In addition to the measure of similarity(More)