Said El Hajji

Orcid: 0000-0001-9864-4872

Affiliations:
  • Mohammed V University, Computing and Applications - Information Security, Rabat, Morocco


According to our database1, Said El Hajji authored at least 30 papers between 2002 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
ITC: Intrusion tolerant controller for multicontroller SDN architecture.
Comput. Secur., September, 2023

2022
Application of double exponential Sinc collocation method for the energy levels of the three-dimensional Schrödinger equation.
Proceedings of the 11th International Symposium on Signal, Image, Video and Communications, 2022

2020
Neural Network-Based Voting System with High Capacity and Low Computation for Intrusion Detection in SIEM/IDS Systems.
Secur. Commun. Networks, 2020

Mobile Agent Security Based on Cryptographic Trace and SOS Agent Mechanisms.
J. Commun., 2020

Mobile agent-based SIEM for event collection and normalization externalization.
Inf. Comput. Secur., 2020

A game theoretic approach based on intrusion tolerant systems.
Int. J. Secur. Networks, 2020

Securing Communication 2FA Using Post-Quantic Cryptosystem: Case of QC-MDPC- Mceliece Cryptosystem.
Int. J. Inf. Secur. Priv., 2020

Advanced security of two-factor authentication system using stego QR code.
Int. J. Inf. Comput. Secur., 2020

2019
Design and Implementation of a New Security Plane for Hybrid Distributed SDNs.
J. Commun., 2019

Analysis of Neural Network Training and Cost Functions Impact on the Accuracy of IDS and SIEM Systems.
Proceedings of the Codes, Cryptology and Information Security, 2019

2018
New Protocol E-DNSSEC to Enhance DNSSEC Security.
Int. J. Netw. Secur., 2018

2017
Trust can be misplaced.
J. Cryptogr. Eng., 2017

Secure Mobile Multi Cloud Architecture for Authentication and Data Storage.
Int. J. Cloud Appl. Comput., 2017

Countering MitM Attacks Using Evolved PathFinder Algorithm.
Int. J. Cloud Appl. Comput., 2017

Mobile Agent Service Model for Smart Ambulance.
Proceedings of the Cloud Infrastructures, Services, and IoT Systems for Smart Cities, 2017

A Secure Cloud-Based IDPS Using Cryptographic Traces and Revocation Protocol.
Proceedings of the Codes, Cryptology and Information Security, 2017

2016
A Modular Secure Framework Based on SDMN for Mobile Core Cloud.
Proceedings of the Mobile, Secure, and Programmable Networking, 2016

2015
Countermeasures Mitigation for Designing Rich Shell Code in Java Card.
Proceedings of the Codes, Cryptology, and Information Security, 2015

2014
Secure Cloud Computing through Homomorphic Encryption.
CoRR, 2014

Access control using mobile agents.
Proceedings of the 4th International Conference on Multimedia Computing and Systems, 2014

2013
Network Access Control Technology - Proposition to contain new security challenges
CoRR, 2013

Mutation Analysis for Security.
CoRR, 2013

2012
Security of the DNS Protocol - Implementation and Weaknesses Analyses of DNSSEC
CoRR, 2012

Specification and Verification of Uplink Framework for Application of Software Engineering using RM-ODP
CoRR, 2012

Analytical evaluation of the stream cipher ZUC.
Proceedings of the 2012 International Conference on Multimedia Computing and Systems, 2012

Integrity protection in UMTS Radio Access Network - Simulation approach under OPNET.
Proceedings of the 2012 International Conference on Multimedia Computing and Systems, 2012

2011
EPS Confidentiality and Integrity mechanisms Algorithmic Approach
CoRR, 2011

Specifying Data Bases Management Systems by Using RM-ODP Engineering Language
CoRR, 2011

2010
Using Event B to Specify QoS in ODP Enterprise Language.
Proceedings of the Collaborative Networks for a Sustainable World, 2010

2002
Analysis of a bifurcation problem.
Math. Comput. Simul., 2002


  Loading...