Secure mobile multi cloud architecture for authentication and data storage K Zkik, G Orhanou, S El Hajji International Journal of Cloud Applications and Computing (IJCAC) 7 (2), 62-76, 2017 | 69 | 2017 |
SNOW 3G stream cipher operation and complexity study G Orhanou, S El Hajji, Y Bentaleb Contemporary Engineering Sciences-Hikari Ltd 3 (3), 97-111, 2010 | 45 | 2010 |
SIEM selection criteria for an efficient contextual security M Nabil, S Soukainat, A Lakbabi, O Ghizlane 2017 international symposium on networks, computers and communications …, 2017 | 40 | 2017 |
EPS confidentiality and integrity mechanisms algorithmic approach G Orhanou, SE Hajji, Y Bentaleb, J Laassiri arXiv preprint arXiv:1102.5191, 2011 | 24 | 2011 |
Neural network-based voting system with high capacity and low computation for intrusion detection in SIEM/IDS systems N Moukafih, G Orhanou, S El Hajji Security and Communication Networks 2020, 1-15, 2020 | 23 | 2020 |
VPN IPSEC & SSL technology Security and management point of view A Lakbabi, G Orhanou, S El Hajji 2012 Next Generation Networks and Services (NGNS), 202-208, 2012 | 21 | 2012 |
Secure scheme on mobile multi cloud computing based on homomorphic encryption K Zkik, G Orhanou, S El Hajji 2016 International Conference on Engineering & MIS (ICEMIS), 1-6, 2016 | 16 | 2016 |
Attacks on Android banking applications Y Kouraogo, K Zkik, G Orhanou 2016 International Conference on Engineering & MIS (ICEMIS), 1-6, 2016 | 15 | 2016 |
The new lte cryptographic algorithms eea3 and eia3 G Orhanou, S El-Hajji Appl. Math 7 (6), 2385-2390, 2013 | 15 | 2013 |
Managing big data integrity I Lebdaoui, S El Hajji, G Orhanou 2016 International Conference on Engineering & MIS (ICEMIS), 1-6, 2016 | 14 | 2016 |
An integration adaptation for real-time Datawarehousing I Lebdaoui, G Orhanou, S Elhajji International Journal of Software Engineering and its Applications 8 (11 …, 2014 | 14 | 2014 |
Network Access Control Technology-Proposition to contain new security challenges A Lakbabi, G Orhanou, SE Hajji arXiv preprint arXiv:1304.0807, 2013 | 14 | 2013 |
Design and Implementation of a New Security Plane for Hybrid Distributed SDNs. K Zkik, S El Hajji, G Orhanou J. Commun. 14 (1), 26-32, 2019 | 13 | 2019 |
Analytical evaluation of the stream cipher ZUC G Orhanou, S El Hajji, A Lakbabi, Y Bentaleb 2012 International Conference on Multimedia Computing and Systems, 927-930, 2012 | 12 | 2012 |
Overview of mobile agents and security S Alami-Kamouri, G Orhanou, S Elhajji 2016 International Conference on Engineering & MIS (ICEMIS), 1-5, 2016 | 11 | 2016 |
New Protocol E-DNSSEC to Enhance DNSSEC Security. K Chetioui, G Orhanou, S El Hajji Int. J. Netw. Secur. 20 (1), 19-24, 2018 | 10 | 2018 |
Data integrity in real-time datawarehousing I Lebdaoui, G Orhanou, S ElHajji Proceedings of the World Congress on Engineering 3, 3-5, 2013 | 10 | 2013 |
Mobile agent service model for smart ambulance S Alami-Kamouri, G Orhanou, S Elhajji Cloud Infrastructures, Services, and IoT Systems for Smart Cities: Second …, 2018 | 9 | 2018 |
EPS AES-based confidentiality and integrity algorithms: Complexity study G Orhanou, S El Hajji, Y Bentaleb 2011 International Conference on Multimedia Computing and Systems, 1-4, 2011 | 9 | 2011 |
Analysis of neural network training and cost functions impact on the accuracy of IDS and SIEM systems S El Hajji, N Moukafih, G Orhanou Codes, Cryptology and Information Security: Third International Conference …, 2019 | 8 | 2019 |