Mouad Lemoudden

Orcid: 0000-0002-0114-1054

According to our database1, Mouad Lemoudden authored at least 10 papers between 2015 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Post-Quantum Migration of the Tor Application.
J. Cybersecur. Priv., 2025

Post Quantum Migration of Tor.
IACR Cryptol. ePrint Arch., 2025

2024
Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant.
Int. J. Inf. Sec., February, 2024

TIPS: Threat Sharing Information Platform for Enhanced Security.
CoRR, 2024

Image Encryption in Frequency Domain Using Hybrid Chaotic Maps, Hashing, and Lifting Wavelet Transform.
Proceedings of the Intelligent Systems and Pattern Recognition, 2024

2023
Attacking Windows Hello for Business: Is It What We Were Promised?
Cryptogr., March, 2023

2018
Advanced Hybrid Technique in Detecting Cloud Web Application's Attacks.
Proceedings of the Machine Learning for Networking - First International Conference, 2018

2017
A novel approach in detecting intrusions using NSLKDD database and MapReduce programming.
Proceedings of the 14th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2017) / 12th International Conference on Future Networks and Communications (FNC 2017) / Affiliated Workshops, 2017

2016
A Binary-based MapReduce Analysis for Cloud Logs.
Proceedings of the 7th International Conference on Ambient Systems, 2016

2015
Managing cloud-generated logs using big data technologies.
Proceedings of the International Conference on Wireless Networks and Mobile Communications, 2015


  Loading...