Skip to main content

Research Repository

Advanced Search

All Outputs (8)

Stabilized quantum-enhanced SIEM architecture and speed-up through Hoeffding tree algorithms enable quantum cybersecurity analytics in botnet detection (2024)
Journal Article
Tehrani, M. G., Sultanow, E., Buchanan, W. J., Amir, M., Jeschke, A., Houmani, M., …Lemoudden, M. (2024). Stabilized quantum-enhanced SIEM architecture and speed-up through Hoeffding tree algorithms enable quantum cybersecurity analytics in botnet detection. Scientific Reports, 14, Article 1732. https://doi.org/10.1038/s41598-024-51941-8

For the first time, we enable the execution of hybrid quantum machine learning (HQML) methods on real quantum computers with 100 data samples and real-device-based simulations with 5000 data samples, thereby outperforming the current state of researc... Read More about Stabilized quantum-enhanced SIEM architecture and speed-up through Hoeffding tree algorithms enable quantum cybersecurity analytics in botnet detection.

Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant (2023)
Journal Article
Elmiger, M., Lemoudden, M., Pitropakis, N., & Buchanan, W. J. (2024). Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant. International Journal of Information Security, 23, 467-485. https://doi.org/10.1007/s10207-023-00751-6

The challenge of securing IT environments has reached a new complexity level as a growing number of organisations adopt cloud solutions. This trend increases the possibility of overseen attack paths in an organisation’s IT infrastructure. This paper... Read More about Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant.

Attacking Windows Hello for Business: Is It What We Were Promised? (2023)
Journal Article
Haddad, J., Pitropakis, N., Chrysoulas, C., Lemoudden, M., & Buchanan, W. J. (2023). Attacking Windows Hello for Business: Is It What We Were Promised?. Cryptography, 7(1), Article 9. https://doi.org/10.3390/cryptography7010009

Traditional password authentication methods have raised many issues in the past, including insecure practices, so it comes as no surprise that the evolution of authentication should arrive in the form of password-less solutions. This research aims to... Read More about Attacking Windows Hello for Business: Is It What We Were Promised?.

Hybrid Email Spam Detection Model Using Artificial Intelligence (2020)
Journal Article
Douzi, S., AlShahwan, F. A., Lemoudden, M., & El Ouahidi, B. (2020). Hybrid Email Spam Detection Model Using Artificial Intelligence. International Journal of Machine Learning and Computing, 10(2), 316-322. https://doi.org/10.18178/ijmlc.2020.10.2.937

The growing volume of spam Emails has generated the need for a more precise anti-spam filter to detect unsolicited Emails. One of the most common representations used in spam filters is the Bag-of-Words (BOW). Although BOW is very effective in the cl... Read More about Hybrid Email Spam Detection Model Using Artificial Intelligence.

A novel approach in detecting intrusions using NSLKDD database and MapReduce programming (2017)
Journal Article
Meryem, A., Samira, D., El Ouahidi, B., & Mouad, L. (2017). A novel approach in detecting intrusions using NSLKDD database and MapReduce programming. Procedia Computer Science, 110, 230-235. https://doi.org/10.1016/j.procs.2017.06.089

Due to the increasing usage of the cloud computing architecture, computer systems are facing many security challenges that render sensitive data visible and available to be counterfeited by malicious users and especially intruders. Log files are gene... Read More about A novel approach in detecting intrusions using NSLKDD database and MapReduce programming.

A Binary-based MapReduce Analysis for Cloud Logs (2016)
Journal Article
Lemoudden, M., Amar, M., & El Ouahidi, B. (2016). A Binary-based MapReduce Analysis for Cloud Logs. Procedia Computer Science, 83, 1213-1218. https://doi.org/10.1016/j.procs.2016.04.253

Efficiently managing and analyzing cloud logs is a difficult and expensive task due the growth in size and variety of formats. In this paper, we propose a binary-based approach for frequency mining correlated attacks in log data. This approach is con... Read More about A Binary-based MapReduce Analysis for Cloud Logs.

Identity federation scenarios for the cloud (2014)
Journal Article
Ben Bouazza, N., Lemoudden, M., El Ouahidi, B., & Bourget, D. (2014). Identity federation scenarios for the cloud. International Journal of Engineering and Technology (IJET), 6(2), 1290-1295

Traditional identity approaches in a cloud environment that demands scale and openness, suffer from a number of limits, especially when the enterprise uses multiple cloud service providers (CSPs) and user credentials are not shared with other provide... Read More about Identity federation scenarios for the cloud.

A survey of cloud computing security overview of attack vectors and defense mechanisms (2013)
Journal Article
Lemoudden, M., Ben Bouazza, N., El Ouahidi, B., & Bourget, D. (2013). A survey of cloud computing security overview of attack vectors and defense mechanisms. Journal of Theoretical and Applied Information Technology, 54(2), 325-330

Enterprises are more and more moving to the cloud to take advantages of its economic and technological model. However, Privacy and Security issues are often cited as the main obstacle to the adoption of cloud computing for enterprises; hence we need... Read More about A survey of cloud computing security overview of attack vectors and defense mechanisms.