Skip to main content

Research Repository

Advanced Search

Attacking Windows Hello for Business: Is It What We Were Promised? (2023)
Journal Article
Haddad, J., Pitropakis, N., Chrysoulas, C., Lemoudden, M., & Buchanan, W. J. (2023). Attacking Windows Hello for Business: Is It What We Were Promised?. Cryptography, 7(1), Article 9. https://doi.org/10.3390/cryptography7010009

Traditional password authentication methods have raised many issues in the past, including insecure practices, so it comes as no surprise that the evolution of authentication should arrive in the form of password-less solutions. This research aims to... Read More about Attacking Windows Hello for Business: Is It What We Were Promised?.

Hybrid Email Spam Detection Model Using Artificial Intelligence (2020)
Journal Article
Douzi, S., AlShahwan, F. A., Lemoudden, M., & El Ouahidi, B. (2020). Hybrid Email Spam Detection Model Using Artificial Intelligence. International Journal of Machine Learning and Computing, 10(2), 316-322. https://doi.org/10.18178/ijmlc.2020.10.2.937

The growing volume of spam Emails has generated the need for a more precise anti-spam filter to detect unsolicited Emails. One of the most common representations used in spam filters is the Bag-of-Words (BOW). Although BOW is very effective in the cl... Read More about Hybrid Email Spam Detection Model Using Artificial Intelligence.

Advanced Hybrid Technique in Detecting Cloud Web Application’s Attacks (2019)
Conference Proceeding
Amar, M., Lemoudden, M., & El Ouahidi, B. (2019). Advanced Hybrid Technique in Detecting Cloud Web Application’s Attacks. In Machine Learning for Networking: First International Conference, MLN 2018, Paris, France, November 27–29, 2018, Revised Selected Papers (79-97). https://doi.org/10.1007/978-3-030-19945-6_6

Recently cloud computing has emerged the IT world. It eventually promoted the acquisition of resources and services as needed, but it has also instilled fear and user’s renunciations. However, Machine learning processing has proven high robustness in... Read More about Advanced Hybrid Technique in Detecting Cloud Web Application’s Attacks.

A novel approach in detecting intrusions using NSLKDD database and MapReduce programming (2017)
Journal Article
Meryem, A., Samira, D., El Ouahidi, B., & Mouad, L. (2017). A novel approach in detecting intrusions using NSLKDD database and MapReduce programming. Procedia Computer Science, 110, 230-235. https://doi.org/10.1016/j.procs.2017.06.089

Due to the increasing usage of the cloud computing architecture, computer systems are facing many security challenges that render sensitive data visible and available to be counterfeited by malicious users and especially intruders. Log files are gene... Read More about A novel approach in detecting intrusions using NSLKDD database and MapReduce programming.

An approach for meteorological data integration and stream processing (2016)
Conference Proceeding
Hdafa, M., Zouhairi, Y., Lemoudden, M., & Ziyati, E. (2016). An approach for meteorological data integration and stream processing. In 2016 Third International Conference on Systems of Collaboration (SysCo). https://doi.org/10.1109/sysco.2016.7831342

Real-time big data processing is a crucial need of meteorology today. As a matter of fact, the weather is a determining factor in decision making in different areas such as air or sea transport, so acquiring knowledge of the environment in real time... Read More about An approach for meteorological data integration and stream processing.

Log file's centralization to improve cloud security (2016)
Conference Proceeding
Amar, M., Lemoudden, M., & El Ouahidi, B. (2016). Log file's centralization to improve cloud security. In 2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech). https://doi.org/10.1109/cloudtech.2016.7847696

The usage of cloud-computing architectures and characteristics has been enhanced in recent years. This approach brings the availability of storage and user services as needed. But it also brings many drawbacks that put the privacy and the security of... Read More about Log file's centralization to improve cloud security.

A Binary-based MapReduce Analysis for Cloud Logs (2016)
Journal Article
Lemoudden, M., Amar, M., & El Ouahidi, B. (2016). A Binary-based MapReduce Analysis for Cloud Logs. Procedia Computer Science, 83, 1213-1218. https://doi.org/10.1016/j.procs.2016.04.253

Efficiently managing and analyzing cloud logs is a difficult and expensive task due the growth in size and variety of formats. In this paper, we propose a binary-based approach for frequency mining correlated attacks in log data. This approach is con... Read More about A Binary-based MapReduce Analysis for Cloud Logs.

Managing cloud-generated logs using big data technologies (2015)
Conference Proceeding
Lemoudden, M., & El Ouahidi, B. (2015). Managing cloud-generated logs using big data technologies. In 2015 International Conference on Wireless Networks and Mobile Communications (WINCOM). https://doi.org/10.1109/wincom.2015.7381334

Cloud computing is a fast-growing paradigm that has forcefully emerged and established itself in the next generation of IT industry and business, performing massive-scale and complex computing. As cloud technology adoption continues to progress, mass... Read More about Managing cloud-generated logs using big data technologies.

Identity federation scenarios for the cloud (2014)
Journal Article
Ben Bouazza, N., Lemoudden, M., El Ouahidi, B., & Bourget, D. (2014). Identity federation scenarios for the cloud. International Journal of Engineering and Technology (IJET), 6(2), 1290-1295

Traditional identity approaches in a cloud environment that demands scale and openness, suffer from a number of limits, especially when the enterprise uses multiple cloud service providers (CSPs) and user credentials are not shared with other provide... Read More about Identity federation scenarios for the cloud.

Surveying the challenges and requirements for identity in the cloud (2014)
Conference Proceeding
Ben Bouazza, N., Lemoudden, M., & El Ouahidi, B. (2014). Surveying the challenges and requirements for identity in the cloud. In Proceedings of the 4th Edition of National Security Days (JNS4). https://doi.org/10.1109/jns4.2014.6850127

Cloud technologies are increasingly important for IT department for allowing them to concentrate on strategy as opposed to maintaining data centers; the biggest advantages of the cloud is the ability to share computing resources between multiple prov... Read More about Surveying the challenges and requirements for identity in the cloud.

Towards achieving discernment and correlation in cloud logging (2014)
Presentation / Conference
Lemoudden, M. (2014, May). Towards achieving discernment and correlation in cloud logging. Paper presented at 13th International Conference on Software Engineering, Parallel and Distributed Systems (SEPADS14), Gdansk, Poland

Logs are of the most important pieces of analytical data in a cloud-based service infrastructure. IT actors, as well as security personnel, need access to information about user activity, authentication attempts and other security events for forensic... Read More about Towards achieving discernment and correlation in cloud logging.

A survey of cloud computing security overview of attack vectors and defense mechanisms (2013)
Journal Article
Lemoudden, M., Ben Bouazza, N., El Ouahidi, B., & Bourget, D. (2013). A survey of cloud computing security overview of attack vectors and defense mechanisms. Journal of Theoretical and Applied Information Technology, 54(2), 325-330

Enterprises are more and more moving to the cloud to take advantages of its economic and technological model. However, Privacy and Security issues are often cited as the main obstacle to the adoption of cloud computing for enterprises; hence we need... Read More about A survey of cloud computing security overview of attack vectors and defense mechanisms.