Skip to main content

Research Repository

Advanced Search

All Outputs (5)

Advanced Hybrid Technique in Detecting Cloud Web Application’s Attacks (2019)
Conference Proceeding
Amar, M., Lemoudden, M., & El Ouahidi, B. (2019). Advanced Hybrid Technique in Detecting Cloud Web Application’s Attacks. In Machine Learning for Networking: First International Conference, MLN 2018, Paris, France, November 27–29, 2018, Revised Selected Papers (79-97). https://doi.org/10.1007/978-3-030-19945-6_6

Recently cloud computing has emerged the IT world. It eventually promoted the acquisition of resources and services as needed, but it has also instilled fear and user’s renunciations. However, Machine learning processing has proven high robustness in... Read More about Advanced Hybrid Technique in Detecting Cloud Web Application’s Attacks.

An approach for meteorological data integration and stream processing (2016)
Conference Proceeding
Hdafa, M., Zouhairi, Y., Lemoudden, M., & Ziyati, E. (2016). An approach for meteorological data integration and stream processing. In 2016 Third International Conference on Systems of Collaboration (SysCo). https://doi.org/10.1109/sysco.2016.7831342

Real-time big data processing is a crucial need of meteorology today. As a matter of fact, the weather is a determining factor in decision making in different areas such as air or sea transport, so acquiring knowledge of the environment in real time... Read More about An approach for meteorological data integration and stream processing.

Log file's centralization to improve cloud security (2016)
Conference Proceeding
Amar, M., Lemoudden, M., & El Ouahidi, B. (2016). Log file's centralization to improve cloud security. In 2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech). https://doi.org/10.1109/cloudtech.2016.7847696

The usage of cloud-computing architectures and characteristics has been enhanced in recent years. This approach brings the availability of storage and user services as needed. But it also brings many drawbacks that put the privacy and the security of... Read More about Log file's centralization to improve cloud security.

Managing cloud-generated logs using big data technologies (2015)
Conference Proceeding
Lemoudden, M., & El Ouahidi, B. (2015). Managing cloud-generated logs using big data technologies. In 2015 International Conference on Wireless Networks and Mobile Communications (WINCOM). https://doi.org/10.1109/wincom.2015.7381334

Cloud computing is a fast-growing paradigm that has forcefully emerged and established itself in the next generation of IT industry and business, performing massive-scale and complex computing. As cloud technology adoption continues to progress, mass... Read More about Managing cloud-generated logs using big data technologies.

Surveying the challenges and requirements for identity in the cloud (2014)
Conference Proceeding
Ben Bouazza, N., Lemoudden, M., & El Ouahidi, B. (2014). Surveying the challenges and requirements for identity in the cloud. In Proceedings of the 4th Edition of National Security Days (JNS4). https://doi.org/10.1109/jns4.2014.6850127

Cloud technologies are increasingly important for IT department for allowing them to concentrate on strategy as opposed to maintaining data centers; the biggest advantages of the cloud is the ability to share computing resources between multiple prov... Read More about Surveying the challenges and requirements for identity in the cloud.