| Approaches to analyze cyber terrorist communities: Survey and challenges F Saidi, Z Trabelsi, K Salah, HB Ghezala Computers & Security 66, 66-80, 2017 | 36 | 2017 |
| A novel approach for terrorist sub-communities detection based on constrained evidential clustering F Saidi, Z Trabelsi, HB Ghazela 2018 12th international conference on research challenges in information …, 2018 | 34 | 2018 |
| A novel framework for semantic classification of cyber terrorist communities on Twitter F Saidi, Z Trabelsi, E Thangaraj Engineering Applications of Artificial Intelligence 115, 105271, 2022 | 26 | 2022 |
| A hybrid deep learning-based framework for future terrorist activities modeling and prediction F Saidi, Z Trabelsi Egyptian Informatics Journal 23 (3), 437-446, 2022 | 23 | 2022 |
| Reinforcement learning-based intelligent trajectory tracking for a 5-DOF Mitsubishi robotic arm: Comparative evaluation of DDPG, LC-DDPG, and TD3-ADX ZB Hazem, F Saidi, N Guler, AH Altaif International Journal of Intelligent Robotics and Applications, 1-21, 2025 | 16 | 2025 |
| A survey of extremism online content analysis and prediction techniques in twitter based on sentiment analysis Z Trabelsi, F Saidi, E Thangaraj, T Veni Security Journal 36 (2), 221-248, 2023 | 14 | 2023 |
| Attention-based deep learning modelling for intrusion detection B AlOmar, Z Trabelsi, F Saidi ECCWS 2023 22nd European Conference on Cyber Warfare and Security, 2023 | 9 | 2023 |
| A dendritic cell algorithm based approach for malicious TCP port scanning detection N Almasalmeh, F Saidi, Z Trabelsi 2019 15th International Wireless Communications & Mobile Computing …, 2019 | 9 | 2019 |
| Fuzzy logic based intrusion detection system as a service for malicious port scanning traffic detection F Saidi, Z Trabelsi, HB Ghazela 2019 IEEE/ACS 16th International Conference on Computer Systems and …, 2019 | 7 | 2019 |
| A Hybrid Reinforcement Learning Framework Combining TD3 and PID Control for Robust Trajectory Tracking of a 5-DOF Robotic Arm ZB Hazem, F Saidi, N Guler, AH Altaif Automation 6 (4), 56, 2025 | 2 | 2025 |
| Adaptive Neuro-Fuzzy Inference System-Genetic Algorithm approach for global maximum power point tracking in PV systems under different shading conditions N Guler, ZB Hazem, A Gunes, F Saidi Green Technologies and Sustainability 3 (4), 100239, 2025 | 2 | 2025 |
| Fuzzy IDS as a service on the cloud for malicious TCP port scanning traffic detection F Saidi, Z Trabelsi, HB Ghazela Intelligent Decision Technologies, 1-10, 2020 | 2 | 2020 |
| An evidential clustering based framework for cyber terrorist cells topology identification F Saidi, Z Trabelsi, HB Ghazela 2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018 | 2 | 2018 |
| Towards a Multidimensional Model for Terrorist Attacks Analysis and Mining F Saidi, Z Trabelsi, HB Ghézala 28th International Conference on Computer Theory and Applications (ICCTA 2018), 2018 | 2 | 2018 |
| Mobile LifeLong Learners on the Cloud J Akaichi, F Saidi DIVAI 2012, 35, 2012 | 2 | 2012 |
| Smart fuzzy querying based on user's profile and context: A critical care planning system case study F Saidi, J Akaichi 2015 5th National Symposium on Information Technology: Towards New Smart …, 2015 | 1 | 2015 |
| Green Technologies and Sustainability N Guler, ZB Hazem, A Gunes, F Saidi Volume, 0 | 1 | |
| Incorporating Dark Web Education into Cybersecurity Curricula Z Trabelsi, F Saidi, B Alomar, T Qayyum 2025 IEEE Global Engineering Education Conference (EDUCON), 1-10, 2025 | | 2025 |
| IDS-GPT: A Novel Deep Learning-Powered Framework for Network Traffic Intrusion Detection F Saidi Procedia Computer Science 270, 1611-1620, 2025 | | 2025 |
| An Approach for Thwarting Malicious Secret Channel: The Case of IP Record Route Option Header-Based Covert Channels F Saidi, Z Trabelsi, HB Ghézela International Conference on Risks and Security of Internet and Systems, 177-192, 2019 | | 2019 |