Skip to main content

Research Repository

Advanced Search

Outputs (14)

Stabilized quantum-enhanced SIEM architecture and speed-up through Hoeffding tree algorithms enable quantum cybersecurity analytics in botnet detection (2024)
Journal Article
Tehrani, M. G., Sultanow, E., Buchanan, W. J., Amir, M., Jeschke, A., Houmani, M., …Lemoudden, M. (2024). Stabilized quantum-enhanced SIEM architecture and speed-up through Hoeffding tree algorithms enable quantum cybersecurity analytics in botnet detection. Scientific Reports, 14, Article 1732. https://doi.org/10.1038/s41598-024-51941-8

For the first time, we enable the execution of hybrid quantum machine learning (HQML) methods on real quantum computers with 100 data samples and real-device-based simulations with 5000 data samples, thereby outperforming the current state of researc... Read More about Stabilized quantum-enhanced SIEM architecture and speed-up through Hoeffding tree algorithms enable quantum cybersecurity analytics in botnet detection.

Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant (2023)
Journal Article
Elmiger, M., Lemoudden, M., Pitropakis, N., & Buchanan, W. J. (2024). Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant. International Journal of Information Security, 23, 467-485. https://doi.org/10.1007/s10207-023-00751-6

The challenge of securing IT environments has reached a new complexity level as a growing number of organisations adopt cloud solutions. This trend increases the possibility of overseen attack paths in an organisation’s IT infrastructure. This paper... Read More about Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant.

Attacking Windows Hello for Business: Is It What We Were Promised? (2023)
Journal Article
Haddad, J., Pitropakis, N., Chrysoulas, C., Lemoudden, M., & Buchanan, W. J. (2023). Attacking Windows Hello for Business: Is It What We Were Promised?. Cryptography, 7(1), Article 9. https://doi.org/10.3390/cryptography7010009

Traditional password authentication methods have raised many issues in the past, including insecure practices, so it comes as no surprise that the evolution of authentication should arrive in the form of password-less solutions. This research aims to... Read More about Attacking Windows Hello for Business: Is It What We Were Promised?.

Hybrid Email Spam Detection Model Using Artificial Intelligence (2020)
Journal Article
Douzi, S., AlShahwan, F. A., Lemoudden, M., & El Ouahidi, B. (2020). Hybrid Email Spam Detection Model Using Artificial Intelligence. International Journal of Machine Learning and Computing, 10(2), 316-322. https://doi.org/10.18178/ijmlc.2020.10.2.937

The growing volume of spam Emails has generated the need for a more precise anti-spam filter to detect unsolicited Emails. One of the most common representations used in spam filters is the Bag-of-Words (BOW). Although BOW is very effective in the cl... Read More about Hybrid Email Spam Detection Model Using Artificial Intelligence.

Advanced Hybrid Technique in Detecting Cloud Web Application’s Attacks (2019)
Conference Proceeding
Amar, M., Lemoudden, M., & El Ouahidi, B. (2019). Advanced Hybrid Technique in Detecting Cloud Web Application’s Attacks. In Machine Learning for Networking: First International Conference, MLN 2018, Paris, France, November 27–29, 2018, Revised Selected Papers (79-97). https://doi.org/10.1007/978-3-030-19945-6_6

Recently cloud computing has emerged the IT world. It eventually promoted the acquisition of resources and services as needed, but it has also instilled fear and user’s renunciations. However, Machine learning processing has proven high robustness in... Read More about Advanced Hybrid Technique in Detecting Cloud Web Application’s Attacks.

A novel approach in detecting intrusions using NSLKDD database and MapReduce programming (2017)
Journal Article
Meryem, A., Samira, D., El Ouahidi, B., & Mouad, L. (2017). A novel approach in detecting intrusions using NSLKDD database and MapReduce programming. Procedia Computer Science, 110, 230-235. https://doi.org/10.1016/j.procs.2017.06.089

Due to the increasing usage of the cloud computing architecture, computer systems are facing many security challenges that render sensitive data visible and available to be counterfeited by malicious users and especially intruders. Log files are gene... Read More about A novel approach in detecting intrusions using NSLKDD database and MapReduce programming.

An approach for meteorological data integration and stream processing (2016)
Conference Proceeding
Hdafa, M., Zouhairi, Y., Lemoudden, M., & Ziyati, E. (2016). An approach for meteorological data integration and stream processing. In 2016 Third International Conference on Systems of Collaboration (SysCo). https://doi.org/10.1109/sysco.2016.7831342

Real-time big data processing is a crucial need of meteorology today. As a matter of fact, the weather is a determining factor in decision making in different areas such as air or sea transport, so acquiring knowledge of the environment in real time... Read More about An approach for meteorological data integration and stream processing.

Log file's centralization to improve cloud security (2016)
Conference Proceeding
Amar, M., Lemoudden, M., & El Ouahidi, B. (2016). Log file's centralization to improve cloud security. In 2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech). https://doi.org/10.1109/cloudtech.2016.7847696

The usage of cloud-computing architectures and characteristics has been enhanced in recent years. This approach brings the availability of storage and user services as needed. But it also brings many drawbacks that put the privacy and the security of... Read More about Log file's centralization to improve cloud security.

A Binary-based MapReduce Analysis for Cloud Logs (2016)
Journal Article
Lemoudden, M., Amar, M., & El Ouahidi, B. (2016). A Binary-based MapReduce Analysis for Cloud Logs. Procedia Computer Science, 83, 1213-1218. https://doi.org/10.1016/j.procs.2016.04.253

Efficiently managing and analyzing cloud logs is a difficult and expensive task due the growth in size and variety of formats. In this paper, we propose a binary-based approach for frequency mining correlated attacks in log data. This approach is con... Read More about A Binary-based MapReduce Analysis for Cloud Logs.

Managing cloud-generated logs using big data technologies (2015)
Conference Proceeding
Lemoudden, M., & El Ouahidi, B. (2015). Managing cloud-generated logs using big data technologies. In 2015 International Conference on Wireless Networks and Mobile Communications (WINCOM). https://doi.org/10.1109/wincom.2015.7381334

Cloud computing is a fast-growing paradigm that has forcefully emerged and established itself in the next generation of IT industry and business, performing massive-scale and complex computing. As cloud technology adoption continues to progress, mass... Read More about Managing cloud-generated logs using big data technologies.

Surveying the challenges and requirements for identity in the cloud (2014)
Conference Proceeding
Ben Bouazza, N., Lemoudden, M., & El Ouahidi, B. (2014). Surveying the challenges and requirements for identity in the cloud. In Proceedings of the 4th Edition of National Security Days (JNS4). https://doi.org/10.1109/jns4.2014.6850127

Cloud technologies are increasingly important for IT department for allowing them to concentrate on strategy as opposed to maintaining data centers; the biggest advantages of the cloud is the ability to share computing resources between multiple prov... Read More about Surveying the challenges and requirements for identity in the cloud.

Identity federation scenarios for the cloud (2014)
Journal Article
Ben Bouazza, N., Lemoudden, M., El Ouahidi, B., & Bourget, D. (2014). Identity federation scenarios for the cloud. International Journal of Engineering and Technology (IJET), 6(2), 1290-1295

Traditional identity approaches in a cloud environment that demands scale and openness, suffer from a number of limits, especially when the enterprise uses multiple cloud service providers (CSPs) and user credentials are not shared with other provide... Read More about Identity federation scenarios for the cloud.

Towards achieving discernment and correlation in cloud logging (2014)
Presentation / Conference
Lemoudden, M. (2014, May). Towards achieving discernment and correlation in cloud logging. Paper presented at 13th International Conference on Software Engineering, Parallel and Distributed Systems (SEPADS14), Gdansk, Poland

Logs are of the most important pieces of analytical data in a cloud-based service infrastructure. IT actors, as well as security personnel, need access to information about user activity, authentication attempts and other security events for forensic... Read More about Towards achieving discernment and correlation in cloud logging.

A survey of cloud computing security overview of attack vectors and defense mechanisms (2013)
Journal Article
Lemoudden, M., Ben Bouazza, N., El Ouahidi, B., & Bourget, D. (2013). A survey of cloud computing security overview of attack vectors and defense mechanisms. Journal of Theoretical and Applied Information Technology, 54(2), 325-330

Enterprises are more and more moving to the cloud to take advantages of its economic and technological model. However, Privacy and Security issues are often cited as the main obstacle to the adoption of cloud computing for enterprises; hence we need... Read More about A survey of cloud computing security overview of attack vectors and defense mechanisms.