Program JNS 5.

Size: px
Start display at page:

Download "Program JNS 5. http://www.univ-ibntofail.ac.ma/ensak/jns5/"

Transcription

1 1

2 Program JNS 5 Today, Information and Communications Technologies (ICT) are changing considerably the way we communicate, work, collaborate, and build information systems. Recent progress in networking, big data processing, mobile and cloud computing, Web based applications and services, has enabled new collaborative technology services for various kinds of application domains such as e/m-government, e/m-commerce and so on. While the benefits of the massive and spread introduction of ICT in modern information Systems are indisputable, security issues remain a big challenge with regards to their use. These issues are likely to become more critical in the near future because the technology is changing so fast introducing continually new risks and vulnerabilities leading to new opportunities of successful and dangerous cyber-attacks. The National Days of Security (Journées Nationales de la Sécurité : JNS) aim to promote effective communication and coordination between Moroccan society actors working on the information systems security issue. The JNS 5 Program is a rich mix of technical and theoretical talks, Poster sessions, discussions, workshop and tutorials. Sessions Keynotes Amphi ENSA S-I, Amphi ENSA S-II Salle C4 S-III Salle C2 S IV Amphi ENSA Workshop Salle C4 Topics Invited Speakers Network and Application Security Cryptology, Watermarking & Steganography Big Data: Privacy and Security Cloud Computing and Collaborative Systems Security National Security Days: workshop Cloud Computing Challenges Presentation guidelines: All presentations should be in English or French. The time provided for oral presentation is 20 minutes (15 Min for the presentation and 05 min for discussion). The speakers should give their slides to the session chair before the beginning of each session. The posters should be displayed one hour before the beginning of the poster session. The 30% best posters (4 pages) will be published in the JNS 5 Proceeding Parallel Oral Sessions: SII and SIII. Extended versions of best papers will be invited for publication in International journals or in Revue électronique internationale en technologies de l information (eti), 2

3 Thursday May 07 Friday May 08 Registration Registration Opening Ceremony Keynote Speaker (5-6) Coffee Break Keynote Speaker (1-2) Oral Session I. Lunch Keynote Speaker (3-4) Coffee Break & Poster Session Coffee Break & Poster Session Oral Session IV Lunch Tutorial 1 Tutorial 2 Oral Session II Oral Session III A G - AMAN Poster sessions Additional Fee 200 Dh Diner GALA Keynotes Keynote 1 Sécurité dans le contexte d'internet des Objets Anas Abou El Kalam & Imane Pasquier, Université Caddi Ayyad, Maroc Thursday May Keynote 2 Private CERTs a to protect information assets against cyber attack Hicham El Achgar, IT 6, Maroc Thursday May Keynote 3 Nuclear Cyber Security Oum Keltoum Hakam, Université Ibn Tofail, Maroc Thursday May Keynote 4 Authentification : techniques et vulnérabilités Mohamed Mejri, Laval University, Canada Thursday May Keynote 5 La Sécurité et fiabilité des Systèmes mécatroniques Abdelkhalak El Hami, ENSA Rouen, France Friday May Keynote 6 L investigation informatique (aspects mémoire et réseau Younes Benzagmout; Devoteam, Maroc Friday May

4 Workshop : Cloud Computing Challenges Program Workshop Salle C Registration 1 h Opening Ceremony Coffee Break 1 h 30MIN Chair 15MIN KEYNOTE SPEAKER 30MIN ARTICLE 1 30MIN ARTICLE 2 30MIN ARTICLE 3 30MIN SESSION END 15MIN LUNCH 1h30 Tutorials Tutorial 1 (Salle C3 ) Tutorial 2 (SalleC 6 ) Tutorial 3 (Salle 14) IPv6 Security Threats and Web Application Big Data Mitigations Security Friday May Pr Bouabid El Ouahidi Mohammed-V University, Faculty of Sciences Pr. Nabil Benamar Moulay Ismail University, IPv6 expert, Internet Gouvernance Expert Bencharhi Youssef, Expert It6 4

5 ORAL SESSIONS Thursday May 07, 2015 Session I: Network and Application Security Chair: Pr. Hanan El Bakkali, ENSAIS, Rabat - Achieving Security in Dynamic Software Product Lines MOHAMED AMOUD AND OUNSA ROUDIÈS - Moroccan Distributed Honeynet System ABDELJALIL AGNAOU, ANAS ABOU EL KALAM AND ABDELLAH AIT OUAHMAN Thursday May 07, Amphi ENSA - New Multi Agent Architecture of intrusion detection Based on Learning New Attacks MOHSSINE EL AJJOURI, SIHAM BENHADOU AND HICHAM MEDROMI - Toward Protecting SCADA Systems: Log-based, intrusion-tolerance, selfhealing and Modbus Sec to protect SCADA systems from cybercriminal threats EL ANBAL MOUNIA,ANAS ABOU EL KALAM, SIHAM BENHADOU, FOUAD MOUTAOUAKKIL, HICHAM MEDROMI. - Improved Methods for Analyzing Security protocols KARTIT ALI, KAMAL IDRISSI HAMZA AND MOHAMED BELKHOURAF - La sécurité des services web : Outil de Communication Sécurisée (OCS) HASNAE L AMRANI, YOUNÈS EL BOUZEKRI EL IDRISSI AND RACHIDA AJHOUN - Détection d Intrusion à base d Agents Mobiles et Honeypot CHAIMAE SAADI and HABIBA CHAOUI Session II : Cryptology, Watermarking & Steganography Chair: Pr. My Taib Belghiti, ENSA, Kenitra - A refinement based development of the Transport Layer Security protocol BAHIJA BOULAMAAT AND MOHAMED BOUHDADI - A Variant of Guillou-Quisquater signature protocol JAOUAD ETTANFOUHI AND OMAR KHADIR Thursday May 07, Salle C 4 - Formal Verification of the Lowe modified BAN concrete Andrew Secure RPC Protocol RAJAA FILALI AND MOHAMED BOUHDADI - First Refinement of the Tatebayashi, Matsuzaki, and Newman Protocol Using Event- B Method SANAE EL MIMOUNI AND MOHAMED BOUHDADI - Study of Prophet routing protocol behavior in Vehicular Delay Tolerant Network with the presence of malicious nodes MARIA BENAMAR, NABIL BENAMAR AND DRISS EL OUADGHIRI 5

6 - Survey of multimodal biometrics systems : architecture & fusion techniques OUADIAA BARROU, ANAS ABOU EL KALAM AND SAID RAGHAY - A formal Modeling of the Biometric Signing Protocol Bahija Boulamaat and Mohamed Bouhdadi 6

7 Chair: Pr. Habiba Chaoui, ENSA Kenitra Session III: Big Data: Privacy and Security - Big Data and Text Analytics for Effective Management of Cloudgenerated Log Data MOUAD LEMOUDDEN AND EL OUAHIDI BOUABID - Trust and Privacy in Online Social Networks: A Comparative Study ZAKIA EL UAHHABI, SOUAD SADKI AND HANAN EL BAKKALI Thursday May 07, Salle C 2 - Unstructured data workflow: A functional overview and security issues FADOUA KHENNOU, YOUNESS IDRISSI KHAMLICHI AND NOUR EL HOUDA CHAOUI - Big data dans le cloud: vue d ensemble et les problèmes de sécurité CHANCEREL CODJOVI, YOUNESS IDRISSI KHAMLICHI AND ABDELKRIM HAQIQ - Towards A New Maturity Model for Information System MATRANE OSSAMA AND MOHAMED TALEA - Capturing software security practices using CBR : three case studies IKRAM EL RHAFFARI AND OUNSA ROUDIÈS Session IV: Cloud Computing and Collaborative Systems Security Chairs: Pr. Anas Abou El Kalam, ENSA Marrakech and Pr. Adnane Eddaim, ENSA Kenitra - Sécurité des données stockées dans le Cloud Computing. SALMA BOUAYAD, ABDERRAHIM ABDELLAOUI, YOUNESS IDRISSI KHAMLICHI AND HABIBA CHAOUI - Using Encryption Algorithm to enhance the Data Security in Cloud storage KARTIT ZAID, AZOUGAGHE ALI, EL MARRAKI MOHAMMED AND RADI ALI Friday May 08, Amphi ENSA - Security issues in wireless sensors network and cloud computing based solution for rpm applications ANAS BOUAYAD, NOUR EL HOUDA CHAOUI AND MOHAMED EL GHAZI - Privacy and Trust in Cloud Computing: A Comparative Study MERYEME ALOUANE, SOUAD SADKI AND HANAN EL BAKKALI - Un aperçu sur la confiance dans l adoption du Cloud Computing MOHAMED BAKOUK, YOUNESS KHAMLICHI IDRISSI AND MOHAMED MOUGHIT - Survey of Multi-agent System in Cloud security AYOUB BEN HAMMOU, ABDERRAHIM ABDELLAOUI, YOUNESS IDRISSI KHAMLICHI AND HABIBA CHAOUI 7

8 POSTER SESSIONS May 07-08, 2015 Chair: Pr. Younes El Idrissi El Bouzekri, ENSA Kenitra - Classification Of Attacks In Intrusion Detection Systems Using Neural Networks. LAFRAM ICHRAK, BERBICHE NAOUAL, EL ALAMI JAMILA. - Siem ( Security Information & Event Management) Solution Ossim (Open Source Security Information Management) D alienvault. HAMZA BENDHIBA, OTHMANE IBRAHIMI. - Mise En Place D un Smsi Conformément A La Norme Iso ZAKARIA SABIR, YOUNESS RABAA. - Big Data Privacy and Security in the healthcare : Moroccan context MOUNIA BOUHRIZ, HABIBA CHAOUI. Thursday May 07, And Friday May 08, Optimisation& Big Data NABIL BOUCHATA, HANAA HACHIMI. - La Mise En Place D une Nouvelle Architecture Honeypot-Honeynet Dans Un Environnement Cloud AMINE BELQRUCH, CHAIMAE SAADI, HABIBA CHAOUI. - Approches d'insertion de données au sein du protocole réseau TCP/IP" "covert chnnel in TCP/IP" LHOUSSINE SOLLAMI, RACHID ELGOURY, MOHAMED TARAHDA. - Sécurisation du protocole olsr de l attaque d isolement du nœud : Etat De l art; FOUAH OUAFA, ADDAIM ADNANE. - Etude de l état sécuritaire du réseau wimax HANANE EL-KHAL, TOMADER MAZRI - Collaborative filtering-based security policy: comportement des profiles FATNA ELMENDILI, YOUNÈS ELBOUZEKRI EL IDRISSI. - Etude et proposition de solution sécuritaire pour les réseaux à base de h323 et sip ; ILYAS ED-DAOUI, TOMADER MAZRI. - Les méta-heuristiques pour le traitement de Big Data MOUHCINE SALMI ET ABDESSAMAD SEDDIKID, DHANAA HACHIMI 8

9 Committees Honorary Chair - Mr. Abdelmjid Chadili, Directeur Général De La Police Judiciaire - Pr. Driss Aboutajeddine, Directeur du Centre National pour la Recherche Scientifique et Technique - Pr. Azzedine El Midaoui, President of Ibn Tofail University Kenitra - Pr. Mohammed ESAAIDI, Director of ENSIAS Rabat - Pr. Nabil Hmina, Director of ENSA Kenitra General Chair - Pr. Nabil Hmina, Director of ENSA Kenitra - Pr. Habiba Chaoui, Université Ibn Tofail, ENSA Kenitra, AMAN Steering Committee - Anas ABOU EL KALAM, President of AMAN - Hanan EL BAKKALI, Vice- President of AMAN - Mohammed ESAAIDI, IEEE Morocco Section Chair Program Chair - Pr. Habiba Chaoui, Université Ibn Tofail, ENSA Kenitra, AMAN Technical Program committee - Organizing committee - Adnane Eddaim, Pr. ENSA Kenitra - Youness Idrissi Elbouzekri, Pr. ENSA Kenitra - Tomader Mazri, Pr. ENSA Kenitra - Hicham El Achgar, Director of IT6 - Chaima Saadi, PhD Student. ENSA Kenitra - Abderahim Abdallaoui, PhD Student ENSA Kenitra - Hanaa Hachimi, Pr. ENSA Kenitra - Nissrine Krami, Pr. ENSA Kenitra - Ilhma Oumaira, Pr. ENSA Kenitra - Aouatif Amine, Pr. ENSA Kenitra - Hassan Erguig, Pr. ENSA Kenitra - Nour El Houda Chaoui, Pr. ENSA Fes - Zhor Madini, Pr. ENSA Kenitra - Hanan El Bakkali, Vice - President of AMAN - Belkasem almaghraoui, Secretaire general, ENSA, Kenitra - Aicha Koulou, ENSA Kenitra - Mounir Echchadi, ENSA Kenitra - Nabil Srif, Pr.ENSA Kenitra - Samir Belaflih; Pr. ENSA Kenitra - Abdellah Abouabdellaha, Pr. ENSA Kenitra 9

10 - Rachid Elgouri, Pr. ENSA Kenitra - Hamza Bnedhiba, ENSA Kenitra - Mustapha Alaouy, ENSA Kenitra - Benaissa Boukhari, ENSA Kenitra - Hamza Bendhiba, ENSA Kenitra - Khalil Boukri, ENSA Kenitra 10

Réf#Num Nom et Prénom Sessions Contribution: Université PC - 112 - Or ABBASSI Abdellatif Physique - Chimie

Réf#Num Nom et Prénom Sessions Contribution: Université PC - 112 - Or ABBASSI Abdellatif Physique - Chimie Réf#Num Nom et Prénom Sessions Contribution: Université PC - 112 - Or ABBASSI Abdellatif PC - 153 - Or ABOUELHANOUNE Younes PC - 067 - Af AFILAL Mounya PC - 104 - Or AHAJJAM Younes PC - 018 - Or ALLAOUI

More information

How To Teach In Marocco

How To Teach In Marocco Nadia Naami Ph.D. Candidate in Romance Studies Department of Modern Languages and Literatures University of Miami 5202 University Drive Coral Gables, FL 33124-2074 Tel: 786-603-8795 email :n.naami@umiami.edu

More information

1 Announcement Call for papers

1 Announcement Call for papers International Congress Mycotoxins and Cancer Mycotoxins and Cancer Marrakesh from 02 till 04 december 2015 nd th Hôtel Ryad Mogador Agdal st 1 Announcement Call for papers contact@mycotoxine-marrakech2015.ma

More information

Under the title: Quality in Higher Education, for meet the needs of Enterprise and the Moroccan Society: Approaches, Practices and Evaluation Systems

Under the title: Quality in Higher Education, for meet the needs of Enterprise and the Moroccan Society: Approaches, Practices and Evaluation Systems Under the title: Quality in Higher Education, for meet the needs of Enterprise and the Moroccan Society: Approaches, Practices and Evaluation Systems The Research Group on QHSE Sidi Mohamed Ben Abdellah

More information

Journal of Internet Banking and Commerce

Journal of Internet Banking and Commerce Journal of Internet Banking and Commerce An open access Internet journal (http://www.arraydev.com/commerce/jibc/) Journal of Internet Banking and Commerce, December 2009, vol. 14, no.3 (http://www.arraydev.com/commerce/jibc/)

More information

International Symposium "Water, Recycling and Waste Valorisation ", ERVD 3 Conference center FMP-Fez, Morocco, 28 and 29 October 2015.

International Symposium Water, Recycling and Waste Valorisation , ERVD 3 Conference center FMP-Fez, Morocco, 28 and 29 October 2015. Groupe de Réflexion sur le Développement Durable 32, Rue Michlifène Lot Al Ghorfa, Rte Aïn Smen, 30 040 Fès Tél. 0672 351 191 E-mail. zerrouq1959@gmail.com Site web: www.qualisup.com International Symposium

More information

International Symposium ERVD'2-2014 "Water, Recycling and Waste Valorisation ", ERVD 2 Conference center FMP-Fez, 2 and 3 June 2014.

International Symposium ERVD'2-2014 Water, Recycling and Waste Valorisation , ERVD 2 Conference center FMP-Fez, 2 and 3 June 2014. Groupe de Réflexion sur le Développement Durable 32, Rue Michlifène Lot Al Ghorfa, Rte Aïn Smen, 30 040 Fès Tél. 0672 351 191 E-mail. zerrouq1959@gmail.com Site web: www.qualisup.com International Symposium

More information

July 9-15, 2011, Tlemcen University 9-15 Juillet 2011, Université de Tlemcen

July 9-15, 2011, Tlemcen University 9-15 Juillet 2011, Université de Tlemcen Information & Communication Technologies (ICT) Teaching Program Scientific Research and technological Summer University Université d été de la Recherche Scientifique et Technologique In collaboration with

More information

Vulnerability Analysis of Fire Spreading in a Building using Fuzzy Logic and its Integration in a Decision Support System

Vulnerability Analysis of Fire Spreading in a Building using Fuzzy Logic and its Integration in a Decision Support System Vulnerability Analysis of Fire Spreading in a Building using Fuzzy Logic and its Integration in a Decision Support System Sanae KHALI ISSA Laboratory of Computer Sciences, Systems and Telecommunication

More information

Cyber security strategies, services and CyberSOC organizations. How can you deal with cyber-attacks?

Cyber security strategies, services and CyberSOC organizations. How can you deal with cyber-attacks? Cyber security strategies, services and CyberSOC organizations. How can you deal with cyber-attacks? 1 Thierry Evangelista Marketing Director, Security Services agenda market trends & facts regarding (cyber)threats

More information

Education. Research interests. Some projects. Research Publications

Education. Research interests. Some projects. Research Publications Prof.Dr BENLAHMAR Elhabib Born October 21th 1 9 7 2 PhD Computer Science Mathematic & Computer Science Departement Faculty of Sciences Ben M'sik Hassan II Mohamedia-Casablanca University B.P 7955, Sidi

More information

Program. 2015 International Conference on Cloud Computing Technologies and Applications. June 2-4, 2015 Marrakech MOROCCO

Program. 2015 International Conference on Cloud Computing Technologies and Applications. June 2-4, 2015 Marrakech MOROCCO Moroccan Association of Cloud Computing 2015 International Conference on Cloud Computing Technologies and Applications June 2-4, 2015 Marrakech MOROCCO Program Session Topics A Cloud Security(I) S-I B

More information

Performance Modeling of TCP/IP in a Wide-Area Network

Performance Modeling of TCP/IP in a Wide-Area Network INSTITUT NATIONAL DE RECHERCHE EN INFORMATIQUE ET EN AUTOMATIQUE Performance Modeling of TCP/IP in a Wide-Area Network Eitan Altman, Jean Bolot, Philippe Nain, Driss Elouadghiri, Mohammed Erramdani, Patrick

More information

Access Control Protocol for Cloud Systems Based On the Model TOrBAC

Access Control Protocol for Cloud Systems Based On the Model TOrBAC International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-5, November 2012 Access Control Protocol for Cloud Systems Based On the Model TOrBAC Mustapha Ben Saidi,

More information

Designing a Multi Agent System Architecture for IT Governance Platform

Designing a Multi Agent System Architecture for IT Governance Platform Designing a Multi Agent System Architecture for IT Governance Platform S. ELHASNAOUI, H. MEDROMI, S.FARIS, H.IGUER, A. SAYOUTI (EAS- LISER) Systems Architecture Team ENSEM, Hassan II University BP.8118,

More information

Comparison between purely statistical and multi-agent based approaches for occupant behaviour modeling in buildings

Comparison between purely statistical and multi-agent based approaches for occupant behaviour modeling in buildings Comparison between purely statistical and multi-agent based approaches for occupant behaviour modeling in buildings Khadija Tijani 1,2,Ayesha Kashif 1,3,Quoc Dung Ngo 1,Stéphane Ploix 1,Benjamin Haas 2,Julie

More information

ATP Co C pyr y ight 2013 B l B ue C o C at S y S s y tems I nc. All R i R ghts R e R serve v d. 1

ATP Co C pyr y ight 2013 B l B ue C o C at S y S s y tems I nc. All R i R ghts R e R serve v d. 1 ATP 1 LES QUESTIONS QUI DEMANDENT RÉPONSE Qui s est introduit dans notre réseau? Comment s y est-on pris? Quelles données ont été compromises? Est-ce terminé? Cela peut-il se reproduire? 2 ADVANCED THREAT

More information

The Meeting of the Network of Schools and Institutes and the 6th Annual Conference of the GIFT-MENA Marrakech, Morocco 10-12 February 2015

The Meeting of the Network of Schools and Institutes and the 6th Annual Conference of the GIFT-MENA Marrakech, Morocco 10-12 February 2015 The Meeting of the Network of Schools and Institutes and the 6th Annual Conference of the GIFT-MENA Marrakech, Morocco 10-12 February 2015 Governance, State Building and the Rule of Law LIST OF PARTICIPANTS

More information

JANVIER 2013 / CATALOGUE DES FORMATIONS

JANVIER 2013 / CATALOGUE DES FORMATIONS 1 New Vision of Technology Société de Services et de Solutions en Électronique, Informatique et Télécoms Adresse géographique : Abidjan - Cocody Riviera Palmeraie Téléphone : 225 22 49 59 45 Fax : 225

More information

Introduction to Cyber Security / Information Security

Introduction to Cyber Security / Information Security Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be

More information

Multi-Agent Architecture for Implementation of ITIL Processes: Case of Incident Management Process

Multi-Agent Architecture for Implementation of ITIL Processes: Case of Incident Management Process Multi-Agent Architecture for Implementation of ITIL Processes: Case of Incident Management Process Youssef SEKHARA, Hicham MEDROMI, Adil SAYOUTI Equipe Architectures des Systèmes (EAS), Laboratoire d Informatique,

More information

Program'! Governance)Innovation)Lecture)Series) )Cycle)de)conférence)Innovations)en)gouvernance)

Program'! Governance)Innovation)Lecture)Series) )Cycle)de)conférence)Innovations)en)gouvernance) Resilienceincriticalinfrastructureandcrime prevention: Aworkshoponcollaborationandmulti9levelgovernance Larésiliencedanslesinfrastructuresessentiellesetla préventionducrime: Unatelierdetravailsurlacollaborationetlagouvernance

More information

The Moroccan American Pharmaceutical Sciences & Education Network Group (PharMaSeng), University Hassan II MohammediaCasablanca & FST Mohammedia

The Moroccan American Pharmaceutical Sciences & Education Network Group (PharMaSeng), University Hassan II MohammediaCasablanca & FST Mohammedia The Moroccan American Pharmaceutical Sciences & Education Network Group (PharMaSeng), University Hassan II MohammediaCasablanca & FST Mohammedia Organize a Bioinformatic International Workshop October

More information

CFT 100000930 ICT review Questions/Answers

CFT 100000930 ICT review Questions/Answers CFT 100000930 ICT review Questions/Answers 1. Est-ce que la stratégie métier est formalisée dans un document détaillant les priorités? Yes, there are two strategic documents, the STRATEGIC ORIENTATIONS

More information

Durée 4 jours. Pré-requis

Durée 4 jours. Pré-requis F5 - BIG-IP Application Security Manager V11.0 Présentation du cours Ce cours traite des attaques applicatives orientées Web et de la façon d utiliser Application Security Manager (ASM) pour s en protéger.

More information

Audit de sécurité avec Backtrack 5

Audit de sécurité avec Backtrack 5 Audit de sécurité avec Backtrack 5 DUMITRESCU Andrei EL RAOUSTI Habib Université de Versailles Saint-Quentin-En-Yvelines 24-05-2012 UVSQ - Audit de sécurité avec Backtrack 5 DUMITRESCU Andrei EL RAOUSTI

More information

Dynamic Case-Based Reasoning Based on the Multi-Agent Systems: Individualized Follow-Up of Learners in Distance Learning

Dynamic Case-Based Reasoning Based on the Multi-Agent Systems: Individualized Follow-Up of Learners in Distance Learning Dynamic Case-Based Reasoning Based on the Multi-Agent Systems: Individualized Follow-Up of Learners in Distance Learning 1, 2 A. Zouhair, 1 E. M. En-Naimi, 1 B. Amami, 2 H. Boukachour, 2 P. Person, 2 C.

More information

ALTERNATIVE JAVA SECURITY POLICY MODEL

ALTERNATIVE JAVA SECURITY POLICY MODEL FRÉDÉRIC SAMSON ALTERNATIVE JAVA SECURITY POLICY MODEL Mémoire présenté à la Faculté des études supérieures de l Université Laval dans le cadre du programme de maîtrise en informatique pour l obtention

More information

Étude de l impact des attaques distribuées et multi-chemins sur les solutions de sécurité réseaux

Étude de l impact des attaques distribuées et multi-chemins sur les solutions de sécurité réseaux Étude de l impact des attaques distribuées et multi-chemins sur les solutions de sécurité réseaux Damien Riquet Gilles Grimaud Michaël Hauspie Team 2xS Université Lille 1, France 29 Octobre 2012 D. Riquet,

More information

Network Security Administrator

Network Security Administrator Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze

More information

Categorical distribution of food safety constraints in Moroccan companies

Categorical distribution of food safety constraints in Moroccan companies Available online at www.scholarsresearchlibrary.com Scholars Research Library Der Pharmacia Lettre, 2015, 7 (2):285-292 (http://scholarsresearchlibrary.com/archive.html) ISSN 0975-5071 USA CODEN: DPLEB4

More information

Bienvenue au Forum Vector 2007

Bienvenue au Forum Vector 2007 insert Insert picture and 8cm click x 7cm Align Title Graphic. Bienvenue au Forum Vector 2007 Henri Belda Vector France V2.1 2005-07-27 insert Insert picture and 8cm click x 7cm Align Title Graphic. Vector

More information

Ghizlane El Boussaidi http://pages.videotron.com/ghizlane/ 3207, boul. Lévesque Est Phone : (450) 661-4397

Ghizlane El Boussaidi http://pages.videotron.com/ghizlane/ 3207, boul. Lévesque Est Phone : (450) 661-4397 Ghizlane El Boussaidi http://pages.videotron.com/ghizlane/ 3207, boul. Lévesque Est Phone : (450) 661-4397 Laval, Québec, Canada email : gelboussaidi@gmail.com H7E 2P4 Citizenship: Canadian EDUCATION Ph.D.

More information

SOFTWARE DEFINED SOLUTIONS JEUDI 19 NOVEMBRE 2015. Nicolas EHRMAN Sr Presales SDS

SOFTWARE DEFINED SOLUTIONS JEUDI 19 NOVEMBRE 2015. Nicolas EHRMAN Sr Presales SDS SOFTWARE DEFINED SOLUTIONS JEUDI 19 NOVEMBRE 2015 Nicolas EHRMAN Sr Presales SDS Transform your Datacenter to the next level with EMC SDS EMC SOFTWARE DEFINED STORAGE, A SUCCESS STORY 5 ÈME ÉDITEUR MONDIAL

More information

F r i d a y 1 1 t h D e c e m b e r, 2 0 1 5

F r i d a y 1 1 t h D e c e m b e r, 2 0 1 5 F r i d a y 1 1 t h D e c e m b e r, 2 0 1 5 12:30-01:30 pm Welcome (coffee and drinks, no lunch!) 01:30-02:00 pm Introduction: Dean Faculty Medicine University Ghent G. Vanderstraeten (Belgium) Part IA

More information

Heterogeneous PLC-RF networking for LLNs

Heterogeneous PLC-RF networking for LLNs Heterogeneous PLC-RF networking for LLNs Cedric Chauvenet, Bernard Tourancheau To cite this version: Cedric Chauvenet, Bernard Tourancheau. Heterogeneous PLC-RF networking for LLNs. CFIP 2011 - Colloque

More information

Interactions et collaboration dans les Learning Games immersifs. David.Panzoli@univ-jfc.fr

Interactions et collaboration dans les Learning Games immersifs. David.Panzoli@univ-jfc.fr Interactions et collaboration dans les Learning Games immersifs David.Panzoli@univ-jfc.fr Parcours scientifique Thèse en informatique à l IRIT (Université de Toulouse) Environnements de réalité virtuelle,

More information

Security Requirements Analysis of Web Applications using UML

Security Requirements Analysis of Web Applications using UML Security Requirements Analysis of Web Applications using UML Salim Chehida 1, Mustapha kamel Rahmouni 2 1 Department of Informatics, University of Mostaganem, Algeria salimchehida@yahoo.fr 2 Department

More information

Mohamed First University Faculty of Science, dépt de Physique, laboratory LETAS, Oujda, Maroc. (2)

Mohamed First University Faculty of Science, dépt de Physique, laboratory LETAS, Oujda, Maroc. (2) Amelioration the performance of photovoltaic stations for pumping and lighting installed in the Douar Zragta of the rural commune of Isly Prefecture of Oujda Angad E. Baghaz 1, R. Gaamouche 1, K. Hirech

More information

Section des Unités de recherche. Evaluation report. Research unit : Troubles du comportement alimentaire de l adolescent. University Paris 11

Section des Unités de recherche. Evaluation report. Research unit : Troubles du comportement alimentaire de l adolescent. University Paris 11 Section des Unités de recherche Evaluation report Research unit : Troubles du comportement alimentaire de l adolescent University Paris 11 Mars 2009 Section des Unités de recherche Rapport d'évaluation

More information

SawasAfrica-MiddleEast

SawasAfrica-MiddleEast welcome SawasAfrica-MiddleEast Telecoms Executive Board Agadir, 3 5 December 2013 agenda 2013 AGADIR bienvenue welcome hello مرحبا bonjour Tuesday 3 December 9h00 9h05 9h15 9h45 10h10 accueil / welcome

More information

What is the Impact of Social Factors on the Performance of Our Students?

What is the Impact of Social Factors on the Performance of Our Students? International Journal of Humanities and Social Science Vol. 5, No. 2; February 2015 What is the Impact of Social Factors on the Performance of Our Students? Saad El Ouardirhi AbdellahYousfi Eradias 1 research

More information

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors March 25-27, 2014 Steven A. Kunsman i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors ABB Inc. March 26, 2015 Slide 1 Cyber Security for Substation

More information

Introduction au BIM. ESEB 38170 Seyssinet-Pariset Economie de la construction email : contact@eseb.fr

Introduction au BIM. ESEB 38170 Seyssinet-Pariset Economie de la construction email : contact@eseb.fr Quel est l objectif? 1 La France n est pas le seul pays impliqué 2 Une démarche obligatoire 3 Une organisation plus efficace 4 Le contexte 5 Risque d erreur INTERVENANTS : - Architecte - Économiste - Contrôleur

More information

Multi-agents SIP architecture for online Feature Interaction detection and resolution

Multi-agents SIP architecture for online Feature Interaction detection and resolution Multi-agents SIP architecture for online Feature Interaction detection and resolution Zohair Chentouf* Ahmed Khoumsi** * Dialexia Communications Inc. 1755 Saint Régis, Suite 210 Montreal (QC) H9B 2M9,

More information

CESG Certification of Cyber Security Training Courses

CESG Certification of Cyber Security Training Courses CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security

More information

Entschuldigen Sie mich, I did not understand, parlez-vous IT Методы обеспечения защиты?

Entschuldigen Sie mich, I did not understand, parlez-vous IT Методы обеспечения защиты? Entschuldigen Sie mich, I did not understand, parlez-vous IT Методы обеспечения защиты? World Standards Day 2015 ILNAS 2015-10-14 Cédric Mauny, Vice-Chairman of Luxembourg National Committee ISO/IEC JTC1

More information

How To Become A Successful Computer Scientist

How To Become A Successful Computer Scientist EIT ICT Labs Information & Communication Technology Labs Master in ICT Comment passer 1 an ailleurs en Europe, puis revenir à UNS dans le M2 IFI Parcours UBINET EIT ICT Labs Strategy Integrating the Knowledge

More information

Operation Structure (OS)

Operation Structure (OS) Brief description of the paper/report Argument Original reference Use of Game theory to analyse and control Supply Chain Management Systems Gérard P. Cachon, Serguei Netessine Game Theory in Supply Chain

More information

DIRECTIVE ON ACCOUNTABILITY IN CONTRACT MANAGEMENT FOR PUBLIC BODIES. An Act respecting contracting by public bodies (chapter C-65.1, a.

DIRECTIVE ON ACCOUNTABILITY IN CONTRACT MANAGEMENT FOR PUBLIC BODIES. An Act respecting contracting by public bodies (chapter C-65.1, a. DIRECTIVE ON ACCOUNTABILITY IN CONTRACT MANAGEMENT FOR PUBLIC BODIES An Act respecting contracting by public bodies (chapter C-65.1, a. 26) SUBJECT 1. The purpose of this directive is to establish the

More information

Fujitsu World Tour 2015

Fujitsu World Tour 2015 Fujitsu World Tour 2015 Citrix Mobile Workspace Human Centric Innovation INTERNAL USE ONLY 0 Copyright 2015 FUJITSU By Numbers CA 2014 : 3,14 milliards $ 9 000+ Collaborateurs 330 000+ Clients 10 000+

More information

TUTORING IN DISTANCE EDUCATION

TUTORING IN DISTANCE EDUCATION 15_CLASS.qxd 3/26/2003 10:27 Pagina 199 SComS: New Media in Education (2003) 199-203 BARBARA CLASS* TUTORING IN DISTANCE EDUCATION Action and developmental research The research carried out for this PhD

More information

How To Write A Network Protocol For A Cell Phone Network

How To Write A Network Protocol For A Cell Phone Network CURRICULUM VITAE OF BOUDOUR Ghalem LIG - Grenoble Institute of Technology 681, rue de la passerelle Domaine universitaire - BP 72-38402 Grenoble Phone: +33 6 25 61 69 43 E-mail: boudour_ghalem@yahoo.fr

More information

News Letter n 0 9, Fall

News Letter n 0 9, Fall News Letter n 0 9, Fall Table off contentt Welcome Les midis de l IIREB Fall Activities Coming Activities Invitations Publications Contact Wellcome The beginning of the semester having started, most of

More information

Paris Fintech Forum. January 28, 2016. pre registration (/index.php/pre-insciption-en/) AGENDA SPEAKERS CONNECTED EVENTS PARTNERS & SPONSORS

Paris Fintech Forum. January 28, 2016. pre registration (/index.php/pre-insciption-en/) AGENDA SPEAKERS CONNECTED EVENTS PARTNERS & SPONSORS Page 1 sur 9 Paris Fintech Forum January 28, 2016 pre registration (/index.php/pre-insciption-en/) AGENDA SPEAKERS CONNECTED EVENTS PARTNERS & SPONSORS Page 2 sur 9 What s the Paris Fintech Forum? (http://fr.linkedin.com/in/laurentnizri)

More information

Using an MPI Cluster in the Control of a Mobile Robots System

Using an MPI Cluster in the Control of a Mobile Robots System Using an MPI Cluster in the Control of a Mobile Robots System Mohamed Salim LMIMOUNI, Saïd BENAISSA, Hicham MEDROMI, Adil SAYOUTI Equipe Architectures des Systèmes (EAS), Laboratoire d Informatique, Systèmes

More information

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses

More information

Smarter Grids for a Smarter Planet

Smarter Grids for a Smarter Planet Smarter Grids for a Smarter Planet Marc FOROT, Solutions IBM marc_forot@fr.ibm.com Nov 26, 2009 Disclaimer (Optional location for any required disclaimer copy. To set disclaimer, or delete, go to View

More information

Archived Content. Contenu archivé

Archived Content. Contenu archivé ARCHIVED - Archiving Content ARCHIVÉE - Contenu archivé Archived Content Contenu archivé Information identified as archived is provided for reference, research or recordkeeping purposes. It is not subject

More information

REPORT OF THE TRAINING COURSE

REPORT OF THE TRAINING COURSE FIRST MOROCCAN BIOSAFETY ASSOCIATION TRAINING COURSE ON BIOLOGICAL RISK MANAGEMENT February 13, 2010 Tétouan, Morocco March 5, 2010 ORIGINAL: English REPORT OF THE TRAINING COURSE Prepared by Prof. Khalid

More information

The SIST-GIRE Plate-form, an example of link between research and communication for the development

The SIST-GIRE Plate-form, an example of link between research and communication for the development 1 The SIST-GIRE Plate-form, an example of link between research and communication for the development Patrick BISSON 1, MAHAMAT 5 Abou AMANI 2, Robert DESSOUASSI 3, Christophe LE PAGE 4, Brahim 1. UMR

More information

Estelle BROSSET Senior lecturer with habilitation to supervise doctoral theses Jean Monnet Chair Section 02- Public law

Estelle BROSSET Senior lecturer with habilitation to supervise doctoral theses Jean Monnet Chair Section 02- Public law Estelle BROSSET Senior lecturer with habilitation to supervise doctoral theses Jean Monnet Chair Section 02- Public law Professional address: Centre d Etudes et de Recherches Internationales et Communautaires

More information

Montreal Students Chapter (MSC CTRF) Le chapitre de Montréal étudiants (CME GRTC)

Montreal Students Chapter (MSC CTRF) Le chapitre de Montréal étudiants (CME GRTC) ADVISORY COMMITTEE 1. Michael Kieran, Transportation Consulting Principal, IBI Group 2. Don McKnight, McGill University 3. Mario Iacobacci, Ph.D., Director, Economics / Directeur, Analyse économique, AECOM

More information

Temperature stochastic modeling and weather derivatives pricing: empirical study with Moroccan data

Temperature stochastic modeling and weather derivatives pricing: empirical study with Moroccan data Temperature stochastic modeling and weather derivatives pricing: empirical study with Moroccan data Mohammed MRAOUA Financial engineer, actuary OCP Group, Casablanca Driss BARI Meteorologist engineer (IMCL

More information

The Register of the Domain of the State A Revolution in the Registration of Land Rights

The Register of the Domain of the State A Revolution in the Registration of Land Rights The Register of the Domain of the State A Revolution in the Registration of Land Rights Daniel ROBERGE, Canada Key words: government, rights in public land, Internet, Register, Registration system, Cadastre

More information

Abderrahman El Kharrim

Abderrahman El Kharrim Curriculum Vitae EPIKH administrators are allowed to treat all the data below Abderrahman El Kharrim Contribution to scientific and technical research projects Date and place of birth : Nationality : Personal

More information

Network Security: Software IDPS versus Embedded IDPS

Network Security: Software IDPS versus Embedded IDPS Network Security: Software versus Embedded Y.SENHAJI 1, H.MEDROMI 2 1 Architecture System Team Hassan II University of Casablanca ENSEM Casablanca, Morocco 2 Architecture System Team Hassan II University

More information

L évolution des progiciels métier dans un contexte SOA

L évolution des progiciels métier dans un contexte SOA L évolution des progiciels métier dans un contexte SOA Ashish SHARMA Business Development Manager Oracle Fusion Middleware Agenda Quels scénarios pour conformer

More information

the Parliamentary Assembly of the Union for the Mediterranean

the Parliamentary Assembly of the Union for the Mediterranean the Parliamentary Assembly of the Union for the Mediterranean Royaume du Maroc Parlement 1. Meeting venue The 8 th plenary session Rabat, 23-25 March 2012. Practical Information. All meetings of the 8

More information

Qu est-ce que le Cloud? Quels sont ses points forts? Pourquoi l'adopter? Hugues De Pra Data Center Lead Cisco Belgium & Luxemburg

Qu est-ce que le Cloud? Quels sont ses points forts? Pourquoi l'adopter? Hugues De Pra Data Center Lead Cisco Belgium & Luxemburg Qu est-ce que le Cloud? Quels sont ses points forts? Pourquoi l'adopter? Hugues De Pra Data Center Lead Cisco Belgium & Luxemburg Agenda Le Business Case pour le Cloud Computing Qu est ce que le Cloud

More information

Security Operations. Key technologies for your Security Operations Center. Davide Veneziano - RSA Technology Consultant

Security Operations. Key technologies for your Security Operations Center. Davide Veneziano - RSA Technology Consultant Security Operations Key technologies for your Security Operations Center Davide Veneziano - RSA Technology Consultant 1 The evolving threat landscape The right route towards a SOC model The RSA advanced

More information

WIPO LIST OF NEUTRALS BIOGRAPHICAL DATA

WIPO LIST OF NEUTRALS BIOGRAPHICAL DATA ARBITRATION AND MEDIATION CENTER WIPO LIST OF NEUTRALS BIOGRAPHICAL DATA Fabrizio LA SPADA La Spada Boulevard Helvétique 36 1207 Geneva Switzerland Telephone: +41 22 707 40 70 Fax: +41 22 707 40 77 Email:

More information

LIST OF PARTICIPANTS AND SPEAKERS By Country

LIST OF PARTICIPANTS AND SPEAKERS By Country LIST OF PARTICIPANTS AND SPEAKERS By Country BRAZIL Mr. Paulo Fontoura Valle Undersecretary of Public Debt CHILE Mr. Patricio Sepúlveda Head of Debt Office COLOMBIA Mr. Juan Manuel Quintero and Public

More information

Information session April 2nd, 2015. Master 2 in Information System Security Management (ISSM)

Information session April 2nd, 2015. Master 2 in Information System Security Management (ISSM) Information session April 2nd, 2015 Master 2 in Information System Security Management (ISSM) Master s team Prof. Yves Le Traon Study director Rita Giannini Study coordinator Master s team Nicolas Mayer

More information

Outline. IT Security: General Trends and Research Directions. Technical Attacks. Typical attack. Automated attacks via Worms, Trojans, & Viruses

Outline. IT Security: General Trends and Research Directions. Technical Attacks. Typical attack. Automated attacks via Worms, Trojans, & Viruses Outline IT Security: General Trends and Research Directions Sherif El-Kassas Department of Computer Science The American University in Cairo Practical considerations Academic and research perspective National

More information

Caroline Dufour. Associate professor, School of Public Policy and Administration, Faculty of Liberal Arts and Professional Studies, York University

Caroline Dufour. Associate professor, School of Public Policy and Administration, Faculty of Liberal Arts and Professional Studies, York University Caroline Dufour Associate professor School of Public Policy and Administration York University 4700 Keele St., Toronto, Ontario, Canada M3J 1P3 Tel.: 1-416-736-2100, ext. 33813 DEGREES AND EDUCATION PhD

More information

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights) Impact of Cybersecurity Innovations in Key Sectors (Technical Insights) Customized cybersecurity measures help overcome Industry specific challenges September 2014 Table of Contents Section Slide Number

More information

About the Authors Preface Acknowledgements List of Acronyms

About the Authors Preface Acknowledgements List of Acronyms Contents About the Authors Preface Acknowledgements List of Acronyms xiii xv xvii xix Part One Wireless Ad Hoc, Sensor and Mesh Networking 1 1 Introduction 3 1.1 Information Security 4 1.1.1 Computer Security

More information

Menaces avancées : Pourquoi l automatisation de la remédiation est- elle nécessaire? Détection Intégrée. Réponse Automatisée.

Menaces avancées : Pourquoi l automatisation de la remédiation est- elle nécessaire? Détection Intégrée. Réponse Automatisée. Menaces avancées : Pourquoi l automatisation de la remédiation est- elle nécessaire? Détection Intégrée. Réponse Automatisée. Denis Gadonnet Directeur Europe du Sud dgadonnet@hexiscyber.com Stand Interdata

More information

Pre Conference Workshops Using AccessData Tools to Solve Computer Forensics Problems, Eric Thompson, AccessData. Free (ISC) 2 Workshop

Pre Conference Workshops Using AccessData Tools to Solve Computer Forensics Problems, Eric Thompson, AccessData. Free (ISC) 2 Workshop Day 0 09:00-18:00 Saturday Free (ISC) 2 Workshop October 4th, 2003 Pre Conference Workshops Using AccessData Tools to Solve Computer Forensics Problems, Eric Thompson, AccessData MEITSEC'2003 22/09/2003-14:06

More information

Register. Now. 2 nd Dii DESERT ENERGY CONFERENCE CAIRO 2011 2 nd 3 rd November 2011

Register. Now. 2 nd Dii DESERT ENERGY CONFERENCE CAIRO 2011 2 nd 3 rd November 2011 Register Now 2 nd Dii DESERT ENERGY CONFERENCE CAIRO 2011 2 nd 3 rd November 2011 This year has so far been dominated by the significant political transitions in North Africa and a worldwide re-evaluation

More information

Archived Content. Contenu archivé

Archived Content. Contenu archivé ARCHIVED - Archiving Content ARCHIVÉE - Contenu archivé Archived Content Contenu archivé Information identified as archived is provided for reference, research or recordkeeping purposes. It is not subject

More information

Université Paris-Est is a research and higher education cluster PRES.

Université Paris-Est is a research and higher education cluster PRES. - Université Paris-Est Marne-la-Vallée - Université Paris 12 Val de Marne - École des Ponts ParisTech - ESIEE Paris - École d architecture, de la ville et des territoires à Marne-la-Vallée (EAVT) - École

More information

Enhancing Data Security in Medical Information System Using the Watermarking Techniques and Oracle SecureFile LOBs

Enhancing Data Security in Medical Information System Using the Watermarking Techniques and Oracle SecureFile LOBs Enhancing Data Security in Medical Information System Using the Watermarking Techniques and Oracle SecureFile LOBs Said Aminzou 1, Brahim ER-RAHA 2, Youness Idrissi Khamlichi 3, Mustapha Machkour 4, Karim

More information

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial

More information

ISO 10303-xx STEP. Sommaire. étendue. STandard for the Exchange of Product model data. Hervé Panetto CRAN Herve.Panetto@cran.uhp-nancy.fr. nancy.

ISO 10303-xx STEP. Sommaire. étendue. STandard for the Exchange of Product model data. Hervé Panetto CRAN Herve.Panetto@cran.uhp-nancy.fr. nancy. ISO 10303-xx STEP STandard for the Exchange of Product model data Hervé Panetto CRAN Herve.Panetto@cran.uhp-nancy.fr nancy.fr Sommaire 1. Architecture 2. Un protocole d application : AP214 3. Conclusions

More information

WYDO Newsletter. 24 June 2013. Get together and organize your own activity! Index. World Young Doctors Day Journée Mondiale des Jeunes Médecins

WYDO Newsletter. 24 June 2013. Get together and organize your own activity! Index. World Young Doctors Day Journée Mondiale des Jeunes Médecins WYDO Newsletter The newsletter of the World Young Doctors' Organization June 2013 vol. 3, special issue 24 June 2013 World Young Doctors Day Journée Mondiale des Jeunes Médecins Theme: Internet, Social

More information

Moroccan Automotive Industy : opportunities and perspectives

Moroccan Automotive Industy : opportunities and perspectives Moroccan Association for Automotive Industry and Trade Moroccan Automotive Industy : opportunities and perspectives Salma ADNAN, Communication and Marketing Responsible Paris, 16/10/2013 L industrie automobile

More information

CALL FOR PAPER. International Conference on the Levers of Durable Performance in the Middle East and North Africa (MENA) 4-5 May 2015

CALL FOR PAPER. International Conference on the Levers of Durable Performance in the Middle East and North Africa (MENA) 4-5 May 2015 CALL FOR PAPER International Conference on the Levers of Durable Performance in the Middle East and North Africa (MENA) 4-5 May 2015 Pau Business School (ESC Pau) is pleased to invite proposals for its

More information

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led Certification: ENSA Exam 312-38 Course Description This course looks at the network security in defensive view.

More information

BILAL W S SHAFEI. An-Najah National University LRC / French department An-Najah Street. P.O. Box 07 Nablus Palestine

BILAL W S SHAFEI. An-Najah National University LRC / French department An-Najah Street. P.O. Box 07 Nablus Palestine BILAL W S SHAFEI An-Najah National University LRC / French department An-Najah Street. P.O. Box 07 Nablus Palestine +970 599292310 bshafi@najah.edu or +970 9 2345113 882225 bshafi2@hotmail.com Educational

More information

Curriculum Vitae RELEVANT EXPERIENCE. September 2012- April 2013: Dean Assistant for quality assurance. University of Jordan

Curriculum Vitae RELEVANT EXPERIENCE. September 2012- April 2013: Dean Assistant for quality assurance. University of Jordan Curriculum Vitae Shereen Mousa Kakish Assistant Professor of Contemporary French Literature Mobile: 00962 (0) 77 5822766 E-mail: shereen2281@yahoo.com/ shereen.kakish.1@ulaval.ca/ s_kakish@ju.edu.jo RELEVANT

More information

Liste d'adresses URL

Liste d'adresses URL Liste de sites Internet concernés dans l' étude Le 25/02/2014 Information à propos de contrefacon.fr Le site Internet https://www.contrefacon.fr/ permet de vérifier dans une base de donnée de plus d' 1

More information

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs Mandatory Knowledge Units 1.0 Core2Y 1.1 Basic Data Analysis The intent of this Knowledge Unit is to provide students with basic abilities to manipulate data into meaningful information. 1.1.1 Topics Summary

More information

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

CH ENSA EC-Council Network Security Administrator Detailed Course Outline CH ENSA EC-Council Network Security Administrator Detailed Course Outline Summary Duration Vendor Audience 5 Days hands-on training EC-Council Security Professionals Level Technology Category Advance Ethical

More information

Leadership et Gouvernance Cap sur la création de valeur

Leadership et Gouvernance Cap sur la création de valeur Leadership et Gouvernance Cap sur la création de valeur Telindus Trend Day 2011 2011, November 24th Cédric Mauny, Technology Leader, CISM, CISSP, ITIL, ISO27001 Security, Audit and Governance Services

More information

SUMMARY OF THE DISCUSSIONS

SUMMARY OF THE DISCUSSIONS 2013 Annual Meetings INTRODUCTION The has adopted a new Policy on Disclosure and Access to Information (the "DAI Policy") which commits the Bank to make all its information public, apart from a limited

More information

Sponsorship Prospectus. Better Knowledge for Better Health Un meilleur savoir pour une meilleure santé. Québec City, Québec Canada

Sponsorship Prospectus. Better Knowledge for Better Health Un meilleur savoir pour une meilleure santé. Québec City, Québec Canada rane.org BER 2013 um.coch -23 SEPTEM colloqui QUEBEC, 19 Sponsorship Prospectus Better Knowledge for Better Health Un meilleur savoir pour une meilleure santé Québec City, Québec Canada 20-23 September

More information

Cesario Di Sarno. Security Information and Event Management in Critical Infrastructures

Cesario Di Sarno. Security Information and Event Management in Critical Infrastructures Cesario Di Sarno Ph.D. Student in Information Engineering University of Naples «Parthenope» Security Information and Event Management in Critical Infrastructures Fai della Paganella 11 Febbraio 2014 Critical

More information

Weighted Total Mark. Weighted Exam Mark

Weighted Total Mark. Weighted Exam Mark CMP4103 Computer Systems and Network Security Period per Week Contact Hour per Semester Weighted Total Mark Weighted Exam Mark Weighted Continuous Assessment Mark Credit Units LH PH TH CH WTM WEM WCM CU

More information