Ghizlane Orhanou

According to our database1, Ghizlane Orhanou authored at least 23 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
ITC: Intrusion tolerant controller for multicontroller SDN architecture.
Comput. Secur., September, 2023

2020
Neural Network-Based Voting System with High Capacity and Low Computation for Intrusion Detection in SIEM/IDS Systems.
Secur. Commun. Networks, 2020

Mobile Agent Security Based on Cryptographic Trace and SOS Agent Mechanisms.
J. Commun., 2020

Mobile agent-based SIEM for event collection and normalization externalization.
Inf. Comput. Secur., 2020

A game theoretic approach based on intrusion tolerant systems.
Int. J. Secur. Networks, 2020

Securing Communication 2FA Using Post-Quantic Cryptosystem: Case of QC-MDPC- Mceliece Cryptosystem.
Int. J. Inf. Secur. Priv., 2020

Advanced security of two-factor authentication system using stego QR code.
Int. J. Inf. Comput. Secur., 2020

2019
Design and Implementation of a New Security Plane for Hybrid Distributed SDNs.
J. Commun., 2019

Formal Verification of Confidentiality in DNSSEC and E-DNSSEC Protocols using pi-calculus and ProVerif.
Proceedings of the 10th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2019) / The 9th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2019) / Affiliated Workshops, 2019

Analysis of Neural Network Training and Cost Functions Impact on the Accuracy of IDS and SIEM Systems.
Proceedings of the Codes, Cryptology and Information Security, 2019

2018
New Protocol E-DNSSEC to Enhance DNSSEC Security.
Int. J. Netw. Secur., 2018

2017
A New Authentication and Homomorphic Encryption as a Service Model for Preserving Privacy in Clouds.
J. Comput. Sci., 2017

Secure Mobile Multi Cloud Architecture for Authentication and Data Storage.
Int. J. Cloud Appl. Comput., 2017

Countering MitM Attacks Using Evolved PathFinder Algorithm.
Int. J. Cloud Appl. Comput., 2017

SIEM selection criteria for an efficient contextual security.
Proceedings of the 2017 International Symposium on Networks, Computers and Communications, 2017

Mobile Agent Service Model for Smart Ambulance.
Proceedings of the Cloud Infrastructures, Services, and IoT Systems for Smart Cities, 2017

2016
A Modular Secure Framework Based on SDMN for Mobile Core Cloud.
Proceedings of the Mobile, Secure, and Programmable Networking, 2016

2013
Network Access Control Technology - Proposition to contain new security challenges
CoRR, 2013

2012
Security of the DNS Protocol - Implementation and Weaknesses Analyses of DNSSEC
CoRR, 2012

Analytical evaluation of the stream cipher ZUC.
Proceedings of the 2012 International Conference on Multimedia Computing and Systems, 2012

Integrity protection in UMTS Radio Access Network - Simulation approach under OPNET.
Proceedings of the 2012 International Conference on Multimedia Computing and Systems, 2012

2011
EPS Confidentiality and Integrity mechanisms Algorithmic Approach
CoRR, 2011

Specifying Data Bases Management Systems by Using RM-ODP Engineering Language
CoRR, 2011


  Loading...