default search action
Ghizlane Orhanou
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c8]Youssef Regragui, Abdellah Mazighi, Lahoucine Ballihi, Ghizlane Orhanou:
Impact Evaluation of Feature Selection Algorithms on Machine Learning-Based Intrusion Detection. WINCOM 2024: 1-6 - 2023
- [j12]Nouhad Sanoussi, Kaouthar Chetioui, Ghizlane Orhanou, Said El Hajji:
ITC: Intrusion tolerant controller for multicontroller SDN architecture. Comput. Secur. 132: 103351 (2023) - 2020
- [j11]Kouraogo Yacouba, Ghizlane Orhanou, Said Elhajji:
Advanced security of two-factor authentication system using stego QR code. Int. J. Inf. Comput. Secur. 12(4): 436-449 (2020) - [j10]Kouraogo Yacouba, Ghizlane Orhanou, Said Elhajji:
Securing Communication 2FA Using Post-Quantic Cryptosystem: Case of QC-MDPC- Mceliece Cryptosystem. Int. J. Inf. Secur. Priv. 14(2): 102-115 (2020) - [j9]Nouhad Sanoussi, Ghizlane Orhanou, Said El Hajji:
A game theoretic approach based on intrusion tolerant systems. Int. J. Secur. Networks 15(3): 175-181 (2020) - [j8]Nabil Moukafih, Ghizlane Orhanou, Said Elhajji:
Mobile agent-based SIEM for event collection and normalization externalization. Inf. Comput. Secur. 28(1): 15-34 (2020) - [j7]Sophia Alami-Kamouri, Nabil Moukafih, Ghizlane Orhanou, Said Elhajji:
Mobile Agent Security Based on Cryptographic Trace and SOS Agent Mechanisms. J. Commun. 15(3): 221-230 (2020) - [j6]Nabil Moukafih, Ghizlane Orhanou, Said Elhajji:
Neural Network-Based Voting System with High Capacity and Low Computation for Intrusion Detection in SIEM/IDS Systems. Secur. Commun. Networks 2020: 3512737:1-3512737:15 (2020)
2010 – 2019
- 2019
- [j5]Karim Zkik, Said El Hajji, Ghizlane Orhanou:
Design and Implementation of a New Security Plane for Hybrid Distributed SDNs. J. Commun. 14(1): 26-32 (2019) - [c7]Said El Hajji, Nabil Moukafih, Ghizlane Orhanou:
Analysis of Neural Network Training and Cost Functions Impact on the Accuracy of IDS and SIEM Systems. C2SI 2019: 433-451 - [c6]Kaouthar Chetioui, Ghizlane Orhanou, Hicham Bensaid, Ilias Cherkaoui, Youness Chibi:
Formal Verification of Confidentiality in DNSSEC and E-DNSSEC Protocols using pi-calculus and ProVerif. EUSPN/ICTH 2019: 752-757 - 2018
- [j4]Kaouthar Chetioui, Ghizlane Orhanou, Said El Hajji:
New Protocol E-DNSSEC to Enhance DNSSEC Security. Int. J. Netw. Secur. 20(1): 19-24 (2018) - 2017
- [j3]Mouhcine Chliah, Ghizlane Orhanou, Said El Hajji:
Countering MitM Attacks Using Evolved PathFinder Algorithm. Int. J. Cloud Appl. Comput. 7(2): 41-61 (2017) - [j2]Karim Zkik, Ghizlane Orhanou, Said El Hajji:
Secure Mobile Multi Cloud Architecture for Authentication and Data Storage. Int. J. Cloud Appl. Comput. 7(2): 62-76 (2017) - [j1]Karim Zkik, Maha Tebaa, Tarik Tachihante, Ghizlane Orhanou:
A New Authentication and Homomorphic Encryption as a Service Model for Preserving Privacy in Clouds. J. Comput. Sci. 13(12): 702-717 (2017) - [c5]Sophia Alami-Kamouri, Ghizlane Orhanou, Said El Hajji:
Mobile Agent Service Model for Smart Ambulance. IISSC/CN4IoT 2017: 105-111 - [c4]Nabil Moukafih, Sabir Soukainat, Abdelmajid Lakbabi, Ghizlane Orhanou:
SIEM selection criteria for an efficient contextual security. ISNCC 2017: 1-6 - 2016
- [c3]Karim Zkik, Tarik Tachihante, Ghizlane Orhanou, Said El Hajji:
A Modular Secure Framework Based on SDMN for Mobile Core Cloud. MSPN 2016: 137-152 - 2013
- [i4]Abdelmajid Lakbabi, Ghizlane Orhanou, Said El Hajji:
Network Access Control Technology - Proposition to contain new security challenges. CoRR abs/1304.0807 (2013) - 2012
- [c2]Ghizlane Orhanou, Said El Hajji, Abdelmajid Lakbabi:
Integrity protection in UMTS Radio Access Network - Simulation approach under OPNET. ICMCS 2012: 876-881 - [c1]Ghizlane Orhanou, Said El Hajji, Abdelmajid Lakbabi, Youssef Bentaleb:
Analytical evaluation of the stream cipher ZUC. ICMCS 2012: 927-930 - [i3]Kaouthar Chetioui, Ghizlane Orhanou, Said El Hajji, Abdelmajid Lakbabi:
Security of the DNS Protocol - Implementation and Weaknesses Analyses of DNSSEC. CoRR abs/1207.7109 (2012) - 2011
- [i2]Jalal Laassiri, Said El Hajji, Mohamed Bouhdadi, Ghizlane Orhanou, Youssef Balouki:
Specifying Data Bases Management Systems by Using RM-ODP Engineering Language. CoRR abs/1102.5190 (2011) - [i1]Ghizlane Orhanou, Said El Hajji, Youssef Bentaleb, Jalal Laassiri:
EPS Confidentiality and Integrity mechanisms Algorithmic Approach. CoRR abs/1102.5191 (2011)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-26 00:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint