default search action
Said El Hajji 0001
Person information
- affiliation: Mohammed V University, Computing and Applications - Information Security, Rabat, Morocco
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j13]Nouhad Sanoussi, Kaouthar Chetioui, Ghizlane Orhanou, Said El Hajji:
ITC: Intrusion tolerant controller for multicontroller SDN architecture. Comput. Secur. 132: 103351 (2023) - [e3]Said El Hajji, Sihem Mesnager, El Mamoun Souidi:
Codes, Cryptology and Information Security - 4th International Conference, C2SI 2023, Rabat, Morocco, May 29-31, 2023, Proceedings. Lecture Notes in Computer Science 13874, Springer 2023, ISBN 978-3-031-33016-2 [contents] - 2022
- [c10]Safaa Elgharbi, Mouna Essaouini, Bouchra Abouzaid, Said El Hajji, Hassan Safouhi:
Application of double exponential Sinc collocation method for the energy levels of the three-dimensional Schrödinger equation. ISIVC 2022: 1-5 - 2020
- [j12]Kouraogo Yacouba, Ghizlane Orhanou, Said Elhajji:
Advanced security of two-factor authentication system using stego QR code. Int. J. Inf. Comput. Secur. 12(4): 436-449 (2020) - [j11]Kouraogo Yacouba, Ghizlane Orhanou, Said Elhajji:
Securing Communication 2FA Using Post-Quantic Cryptosystem: Case of QC-MDPC- Mceliece Cryptosystem. Int. J. Inf. Secur. Priv. 14(2): 102-115 (2020) - [j10]Nouhad Sanoussi, Ghizlane Orhanou, Said El Hajji:
A game theoretic approach based on intrusion tolerant systems. Int. J. Secur. Networks 15(3): 175-181 (2020) - [j9]Nabil Moukafih, Ghizlane Orhanou, Said Elhajji:
Mobile agent-based SIEM for event collection and normalization externalization. Inf. Comput. Secur. 28(1): 15-34 (2020) - [j8]Sophia Alami-Kamouri, Nabil Moukafih, Ghizlane Orhanou, Said Elhajji:
Mobile Agent Security Based on Cryptographic Trace and SOS Agent Mechanisms. J. Commun. 15(3): 221-230 (2020) - [j7]Nabil Moukafih, Ghizlane Orhanou, Said Elhajji:
Neural Network-Based Voting System with High Capacity and Low Computation for Intrusion Detection in SIEM/IDS Systems. Secur. Commun. Networks 2020: 3512737:1-3512737:15 (2020)
2010 – 2019
- 2019
- [j6]Karim Zkik, Said El Hajji, Ghizlane Orhanou:
Design and Implementation of a New Security Plane for Hybrid Distributed SDNs. J. Commun. 14(1): 26-32 (2019) - [c9]Said El Hajji, Nabil Moukafih, Ghizlane Orhanou:
Analysis of Neural Network Training and Cost Functions Impact on the Accuracy of IDS and SIEM Systems. C2SI 2019: 433-451 - 2018
- [j5]Kaouthar Chetioui, Ghizlane Orhanou, Said El Hajji:
New Protocol E-DNSSEC to Enhance DNSSEC Security. Int. J. Netw. Secur. 20(1): 19-24 (2018) - 2017
- [j4]Mouhcine Chliah, Ghizlane Orhanou, Said El Hajji:
Countering MitM Attacks Using Evolved PathFinder Algorithm. Int. J. Cloud Appl. Comput. 7(2): 41-61 (2017) - [j3]Karim Zkik, Ghizlane Orhanou, Said El Hajji:
Secure Mobile Multi Cloud Architecture for Authentication and Data Storage. Int. J. Cloud Appl. Comput. 7(2): 62-76 (2017) - [j2]Noreddine El Janati El Idrissi, Guillaume Bouffard, Jean-Louis Lanet, Said El Hajji:
Trust can be misplaced. J. Cryptogr. Eng. 7(1): 21-34 (2017) - [c8]Hind Idrissi, Mohammed Ennahbaoui, Said El Hajji, El Mamoun Souidi:
A Secure Cloud-Based IDPS Using Cryptographic Traces and Revocation Protocol. C2SI 2017: 365-382 - [c7]Sophia Alami-Kamouri, Ghizlane Orhanou, Said El Hajji:
Mobile Agent Service Model for Smart Ambulance. IISSC/CN4IoT 2017: 105-111 - [e2]Said El Hajji, Abderrahmane Nitaj, El Mamoun Souidi:
Codes, Cryptology and Information Security - Second International Conference, C2SI 2017, Rabat, Morocco, April 10-12, 2017, Proceedings - In Honor of Claude Carlet. Lecture Notes in Computer Science 10194, Springer 2017, ISBN 978-3-319-55588-1 [contents] - 2016
- [c6]Karim Zkik, Tarik Tachihante, Ghizlane Orhanou, Said El Hajji:
A Modular Secure Framework Based on SDMN for Mobile Core Cloud. MSPN 2016: 137-152 - 2015
- [c5]Noreddine El Janati El Idrissi, Said El Hajji, Jean-Louis Lanet:
Countermeasures Mitigation for Designing Rich Shell Code in Java Card. C2SI 2015: 149-161 - [e1]Said El Hajji, Abderrahmane Nitaj, Claude Carlet, El Mamoun Souidi:
Codes, Cryptology, and Information Security - First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger. Lecture Notes in Computer Science 9084, Springer 2015, ISBN 978-3-319-18680-1 [contents] - 2014
- [c4]Hind Idrissi, Mohammed Ennahbaoui, El Mamoun Souidi, Arnaud Revel, Said Elhajji:
Access control using mobile agents. ICMCS 2014: 1216-1221 - [i7]Maha Tebaa, Said El Hajji:
Secure Cloud Computing through Homomorphic Encryption. CoRR abs/1409.0829 (2014) - 2013
- [i6]Abdelmajid Lakbabi, Ghizlane Orhanou, Said El Hajji:
Network Access Control Technology - Proposition to contain new security challenges. CoRR abs/1304.0807 (2013) - [i5]Mohammed Ennahbaoui, Said El Hajji:
Mutation Analysis for Security. CoRR abs/1309.6149 (2013) - 2012
- [c3]Ghizlane Orhanou, Said El Hajji, Abdelmajid Lakbabi:
Integrity protection in UMTS Radio Access Network - Simulation approach under OPNET. ICMCS 2012: 876-881 - [c2]Ghizlane Orhanou, Said El Hajji, Abdelmajid Lakbabi, Youssef Bentaleb:
Analytical evaluation of the stream cipher ZUC. ICMCS 2012: 927-930 - [i4]Krit Salahddine, Jalal Laassiri, Said El Hajji:
Specification and Verification of Uplink Framework for Application of Software Engineering using RM-ODP. CoRR abs/1204.6729 (2012) - [i3]Kaouthar Chetioui, Ghizlane Orhanou, Said El Hajji, Abdelmajid Lakbabi:
Security of the DNS Protocol - Implementation and Weaknesses Analyses of DNSSEC. CoRR abs/1207.7109 (2012) - 2011
- [i2]Jalal Laassiri, Said El Hajji, Mohamed Bouhdadi, Ghizlane Orhanou, Youssef Balouki:
Specifying Data Bases Management Systems by Using RM-ODP Engineering Language. CoRR abs/1102.5190 (2011) - [i1]Ghizlane Orhanou, Said El Hajji, Youssef Bentaleb, Jalal Laassiri:
EPS Confidentiality and Integrity mechanisms Algorithmic Approach. CoRR abs/1102.5191 (2011) - 2010
- [c1]Hafid Belhaj, Youssef Balouki, Mohamed Bouhdadi, Said El Hajji:
Using Event B to Specify QoS in ODP Enterprise Language. PRO-VE 2010: 478-485
2000 – 2009
- 2002
- [j1]Said Elhajji, Mohammed Errachid:
Analysis of a bifurcation problem. Math. Comput. Simul. 58(3): 231-245 (2002)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint