Secure mobile multi cloud architecture for authentication and data storage K Zkik, G Orhanou, S El Hajji Cloud Security: Concepts, Methodologies, Tools, and Applications, 1108-1123, 2019 | 69 | 2019 |
SNOW 3G stream cipher operation and complexity study G Orhanou, S El Hajji, Y Bentaleb Contemporary Engineering Sciences-Hikari Ltd 3 (3), 97-111, 2010 | 45 | 2010 |
SIEM selection criteria for an efficient contextual security M Nabil, S Soukainat, A Lakbabi, O Ghizlane 2017 international symposium on networks, computers and communications …, 2017 | 44 | 2017 |
EPS confidentiality and integrity mechanisms algorithmic approach G Orhanou, SE Hajji, Y Bentaleb, J Laassiri arXiv preprint arXiv:1102.5191, 2011 | 26 | 2011 |
Neural Network‐Based Voting System with High Capacity and Low Computation for Intrusion Detection in SIEM/IDS Systems N Moukafih, G Orhanou, S El Hajji Security and Communication Networks 2020 (1), 3512737, 2020 | 24 | 2020 |
VPN IPSEC & SSL technology Security and management point of view A Lakbabi, G Orhanou, S El Hajji 2012 Next Generation Networks and Services (NGNS), 202-208, 2012 | 20 | 2012 |
Secure scheme on mobile multi cloud computing based on homomorphic encryption K Zkik, G Orhanou, S El Hajji 2016 International Conference on Engineering & MIS (ICEMIS), 1-6, 2016 | 17 | 2016 |
Network Access Control Technology-Proposition to contain new security challenges A Lakbabi, G Orhanou, SE Hajji arXiv preprint arXiv:1304.0807, 2013 | 17 | 2013 |
Attacks on Android banking applications Y Kouraogo, K Zkik, G Orhanou 2016 International Conference on Engineering & MIS (ICEMIS), 1-6, 2016 | 16 | 2016 |
An integration adaptation for real-time datawarehousing I Lebdaoui, G Orhanou, S Elhajji International Journal of Software Engineering and Its Applications 8 (11 …, 2014 | 16 | 2014 |
The new lte cryptographic algorithms eea3 and eia3 G Orhanou, S El-Hajji Appl. Math 7 (6), 2385-2390, 2013 | 16 | 2013 |
Managing big data integrity I Lebdaoui, S El Hajji, G Orhanou 2016 International Conference on Engineering & MIS (ICEMIS), 1-6, 2016 | 15 | 2016 |
Design and Implementation of a New Security Plane for Hybrid Distributed SDNs. K Zkik, S El Hajji, G Orhanou J. Commun. 14 (1), 26-32, 2019 | 14 | 2019 |
Overview of mobile agents and security S Alami-Kamouri, G Orhanou, S Elhajji 2016 International Conference on Engineering & MIS (ICEMIS), 1-5, 2016 | 12 | 2016 |
Analytical evaluation of the stream cipher ZUC G Orhanou, S El Hajji, A Lakbabi, Y Bentaleb 2012 International Conference on Multimedia Computing and Systems, 927-930, 2012 | 12 | 2012 |
New secure routing method & applications facing MitM attacks M Chliah, G Orhanou, S El Hajji 2014 International Conference on Next Generation Networks and Services (NGNS …, 2014 | 11 | 2014 |
Data integrity in real-time datawarehousing I Lebdaoui, G Orhanou, S ElHajji Proceedings of the World Congress on Engineering 3, 3-5, 2013 | 11 | 2013 |
EPS AES-based confidentiality and integrity algorithms: Complexity study G Orhanou, S El Hajji, Y Bentaleb 2011 International Conference on Multimedia Computing and Systems, 1-4, 2011 | 11 | 2011 |
Mobile agent service model for smart ambulance S Alami-Kamouri, G Orhanou, S Elhajji Cloud Infrastructures, Services, and IoT Systems for Smart Cities: Second …, 2018 | 10 | 2018 |
New Protocol E-DNSSEC to Enhance DNSSEC Security. K Chetioui, G Orhanou, S El Hajji Int. J. Netw. Secur. 20 (1), 19-24, 2018 | 10 | 2018 |