Zobrazeno 1 - 10
of 63
pro vyhledávání: '"Said El Hajji"'
Publikováno v:
IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 5, No 1, September 2011, 149-154
This paper present a survey and discussion of the Reference Model for Open Distributed Processing (RM-ODP) viewpoints; oriented approaches to requirements engineering viewpoint and a presentation of new work in the application wireless mobile phone,
Externí odkaz:
http://arxiv.org/abs/1204.6729
Publikováno v:
Security and Communication Networks, Vol 2020 (2020)
Integrating intelligence into intrusion detection tools has received much attention in the last years. The goal is to improve the detection capability within SIEM and IDS systems in order to cope with the increasing number of attacks using sophistica
Publikováno v:
Distributed Sensing and Intelligent Systems ISBN: 9783030642570
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::07ad33d180ed4f16b7c8669d098b69cc
https://doi.org/10.1007/978-3-030-64258-7_43
https://doi.org/10.1007/978-3-030-64258-7_43
Publikováno v:
Journal of Communications. :26-32
This book constitutes the refereed proceedings of the 4th International Conference on Codes, Cryptology and Information Security, C2SI 2023, held in Rabat, Morocco, during May 29–31, 2023. The 21 full papers included in this book were carefully r
Publikováno v:
Applied Mathematical Sciences. 12:1007-1020
Publikováno v:
International Journal of Cloud Applications and Computing. 7:41-61
In this paper, we focus on attacks based on sniffing like MitM, and how to counter them from the network layer perspective. We've already developed an algorithm called pathfinder that allows us to forward segments from same packets via different path
Publikováno v:
International Journal of Cloud Applications and Computing. 7:62-76
The use of Cloud Computing in the mobile networks offer more advantages and possibilities to the mobile users such as storing, downloading and making calculation on data on demand and its offer more resources to these users such as the storage resour
Publikováno v:
Codes, Cryptology and Information Security ISBN: 9783030164577
C2SI
C2SI
Nowadays, companies are implementing security tools such as Intrusion Detection Systems (IDS) and Security Information and Event Management systems (SIEM) to deal with sophisticated computer attacks. These attacks evolve each year in terms of sophist
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::206bac69d678d789a72fe8bed38eeada
https://doi.org/10.1007/978-3-030-16458-4_25
https://doi.org/10.1007/978-3-030-16458-4_25
Autor:
Said El Hajji, Mohammed Ennahbaoui
Publikováno v:
International Journal of Security and Its Applications. 10:417-434
Covert channels are among the serious and most complicated security flaws that attempt to broke the access control policies, since they allow an unplanned communication medium within an information system. The important impact of this vulnerability g