Program JNS 5.
|
|
- Claude Pierce
- 8 years ago
- Views:
Transcription
1 1
2 Program JNS 5 Today, Information and Communications Technologies (ICT) are changing considerably the way we communicate, work, collaborate, and build information systems. Recent progress in networking, big data processing, mobile and cloud computing, Web based applications and services, has enabled new collaborative technology services for various kinds of application domains such as e/m-government, e/m-commerce and so on. While the benefits of the massive and spread introduction of ICT in modern information Systems are indisputable, security issues remain a big challenge with regards to their use. These issues are likely to become more critical in the near future because the technology is changing so fast introducing continually new risks and vulnerabilities leading to new opportunities of successful and dangerous cyber-attacks. The National Days of Security (Journées Nationales de la Sécurité : JNS) aim to promote effective communication and coordination between Moroccan society actors working on the information systems security issue. The JNS 5 Program is a rich mix of technical and theoretical talks, Poster sessions, discussions, workshop and tutorials. Sessions Keynotes Amphi ENSA S-I, Amphi ENSA S-II Salle C4 S-III Salle C2 S IV Amphi ENSA Workshop Salle C4 Topics Invited Speakers Network and Application Security Cryptology, Watermarking & Steganography Big Data: Privacy and Security Cloud Computing and Collaborative Systems Security National Security Days: workshop Cloud Computing Challenges Presentation guidelines: All presentations should be in English or French. The time provided for oral presentation is 20 minutes (15 Min for the presentation and 05 min for discussion). The speakers should give their slides to the session chair before the beginning of each session. The posters should be displayed one hour before the beginning of the poster session. The 30% best posters (4 pages) will be published in the JNS 5 Proceeding Parallel Oral Sessions: SII and SIII. Extended versions of best papers will be invited for publication in International journals or in Revue électronique internationale en technologies de l information (eti), 2
3 Thursday May 07 Friday May 08 Registration Registration Opening Ceremony Keynote Speaker (5-6) Coffee Break Keynote Speaker (1-2) Oral Session I. Lunch Keynote Speaker (3-4) Coffee Break & Poster Session Coffee Break & Poster Session Oral Session IV Lunch Tutorial 1 Tutorial 2 Oral Session II Oral Session III A G - AMAN Poster sessions Additional Fee 200 Dh Diner GALA Keynotes Keynote 1 Sécurité dans le contexte d'internet des Objets Anas Abou El Kalam & Imane Pasquier, Université Caddi Ayyad, Maroc Thursday May Keynote 2 Private CERTs a to protect information assets against cyber attack Hicham El Achgar, IT 6, Maroc Thursday May Keynote 3 Nuclear Cyber Security Oum Keltoum Hakam, Université Ibn Tofail, Maroc Thursday May Keynote 4 Authentification : techniques et vulnérabilités Mohamed Mejri, Laval University, Canada Thursday May Keynote 5 La Sécurité et fiabilité des Systèmes mécatroniques Abdelkhalak El Hami, ENSA Rouen, France Friday May Keynote 6 L investigation informatique (aspects mémoire et réseau Younes Benzagmout; Devoteam, Maroc Friday May
4 Workshop : Cloud Computing Challenges Program Workshop Salle C Registration 1 h Opening Ceremony Coffee Break 1 h 30MIN Chair 15MIN KEYNOTE SPEAKER 30MIN ARTICLE 1 30MIN ARTICLE 2 30MIN ARTICLE 3 30MIN SESSION END 15MIN LUNCH 1h30 Tutorials Tutorial 1 (Salle C3 ) Tutorial 2 (SalleC 6 ) Tutorial 3 (Salle 14) IPv6 Security Threats and Web Application Big Data Mitigations Security Friday May Pr Bouabid El Ouahidi Mohammed-V University, Faculty of Sciences Pr. Nabil Benamar Moulay Ismail University, IPv6 expert, Internet Gouvernance Expert Bencharhi Youssef, Expert It6 4
5 ORAL SESSIONS Thursday May 07, 2015 Session I: Network and Application Security Chair: Pr. Hanan El Bakkali, ENSAIS, Rabat - Achieving Security in Dynamic Software Product Lines MOHAMED AMOUD AND OUNSA ROUDIÈS - Moroccan Distributed Honeynet System ABDELJALIL AGNAOU, ANAS ABOU EL KALAM AND ABDELLAH AIT OUAHMAN Thursday May 07, Amphi ENSA - New Multi Agent Architecture of intrusion detection Based on Learning New Attacks MOHSSINE EL AJJOURI, SIHAM BENHADOU AND HICHAM MEDROMI - Toward Protecting SCADA Systems: Log-based, intrusion-tolerance, selfhealing and Modbus Sec to protect SCADA systems from cybercriminal threats EL ANBAL MOUNIA,ANAS ABOU EL KALAM, SIHAM BENHADOU, FOUAD MOUTAOUAKKIL, HICHAM MEDROMI. - Improved Methods for Analyzing Security protocols KARTIT ALI, KAMAL IDRISSI HAMZA AND MOHAMED BELKHOURAF - La sécurité des services web : Outil de Communication Sécurisée (OCS) HASNAE L AMRANI, YOUNÈS EL BOUZEKRI EL IDRISSI AND RACHIDA AJHOUN - Détection d Intrusion à base d Agents Mobiles et Honeypot CHAIMAE SAADI and HABIBA CHAOUI Session II : Cryptology, Watermarking & Steganography Chair: Pr. My Taib Belghiti, ENSA, Kenitra - A refinement based development of the Transport Layer Security protocol BAHIJA BOULAMAAT AND MOHAMED BOUHDADI - A Variant of Guillou-Quisquater signature protocol JAOUAD ETTANFOUHI AND OMAR KHADIR Thursday May 07, Salle C 4 - Formal Verification of the Lowe modified BAN concrete Andrew Secure RPC Protocol RAJAA FILALI AND MOHAMED BOUHDADI - First Refinement of the Tatebayashi, Matsuzaki, and Newman Protocol Using Event- B Method SANAE EL MIMOUNI AND MOHAMED BOUHDADI - Study of Prophet routing protocol behavior in Vehicular Delay Tolerant Network with the presence of malicious nodes MARIA BENAMAR, NABIL BENAMAR AND DRISS EL OUADGHIRI 5
6 - Survey of multimodal biometrics systems : architecture & fusion techniques OUADIAA BARROU, ANAS ABOU EL KALAM AND SAID RAGHAY - A formal Modeling of the Biometric Signing Protocol Bahija Boulamaat and Mohamed Bouhdadi 6
7 Chair: Pr. Habiba Chaoui, ENSA Kenitra Session III: Big Data: Privacy and Security - Big Data and Text Analytics for Effective Management of Cloudgenerated Log Data MOUAD LEMOUDDEN AND EL OUAHIDI BOUABID - Trust and Privacy in Online Social Networks: A Comparative Study ZAKIA EL UAHHABI, SOUAD SADKI AND HANAN EL BAKKALI Thursday May 07, Salle C 2 - Unstructured data workflow: A functional overview and security issues FADOUA KHENNOU, YOUNESS IDRISSI KHAMLICHI AND NOUR EL HOUDA CHAOUI - Big data dans le cloud: vue d ensemble et les problèmes de sécurité CHANCEREL CODJOVI, YOUNESS IDRISSI KHAMLICHI AND ABDELKRIM HAQIQ - Towards A New Maturity Model for Information System MATRANE OSSAMA AND MOHAMED TALEA - Capturing software security practices using CBR : three case studies IKRAM EL RHAFFARI AND OUNSA ROUDIÈS Session IV: Cloud Computing and Collaborative Systems Security Chairs: Pr. Anas Abou El Kalam, ENSA Marrakech and Pr. Adnane Eddaim, ENSA Kenitra - Sécurité des données stockées dans le Cloud Computing. SALMA BOUAYAD, ABDERRAHIM ABDELLAOUI, YOUNESS IDRISSI KHAMLICHI AND HABIBA CHAOUI - Using Encryption Algorithm to enhance the Data Security in Cloud storage KARTIT ZAID, AZOUGAGHE ALI, EL MARRAKI MOHAMMED AND RADI ALI Friday May 08, Amphi ENSA - Security issues in wireless sensors network and cloud computing based solution for rpm applications ANAS BOUAYAD, NOUR EL HOUDA CHAOUI AND MOHAMED EL GHAZI - Privacy and Trust in Cloud Computing: A Comparative Study MERYEME ALOUANE, SOUAD SADKI AND HANAN EL BAKKALI - Un aperçu sur la confiance dans l adoption du Cloud Computing MOHAMED BAKOUK, YOUNESS KHAMLICHI IDRISSI AND MOHAMED MOUGHIT - Survey of Multi-agent System in Cloud security AYOUB BEN HAMMOU, ABDERRAHIM ABDELLAOUI, YOUNESS IDRISSI KHAMLICHI AND HABIBA CHAOUI 7
8 POSTER SESSIONS May 07-08, 2015 Chair: Pr. Younes El Idrissi El Bouzekri, ENSA Kenitra - Classification Of Attacks In Intrusion Detection Systems Using Neural Networks. LAFRAM ICHRAK, BERBICHE NAOUAL, EL ALAMI JAMILA. - Siem ( Security Information & Event Management) Solution Ossim (Open Source Security Information Management) D alienvault. HAMZA BENDHIBA, OTHMANE IBRAHIMI. - Mise En Place D un Smsi Conformément A La Norme Iso ZAKARIA SABIR, YOUNESS RABAA. - Big Data Privacy and Security in the healthcare : Moroccan context MOUNIA BOUHRIZ, HABIBA CHAOUI. Thursday May 07, And Friday May 08, Optimisation& Big Data NABIL BOUCHATA, HANAA HACHIMI. - La Mise En Place D une Nouvelle Architecture Honeypot-Honeynet Dans Un Environnement Cloud AMINE BELQRUCH, CHAIMAE SAADI, HABIBA CHAOUI. - Approches d'insertion de données au sein du protocole réseau TCP/IP" "covert chnnel in TCP/IP" LHOUSSINE SOLLAMI, RACHID ELGOURY, MOHAMED TARAHDA. - Sécurisation du protocole olsr de l attaque d isolement du nœud : Etat De l art; FOUAH OUAFA, ADDAIM ADNANE. - Etude de l état sécuritaire du réseau wimax HANANE EL-KHAL, TOMADER MAZRI - Collaborative filtering-based security policy: comportement des profiles FATNA ELMENDILI, YOUNÈS ELBOUZEKRI EL IDRISSI. - Etude et proposition de solution sécuritaire pour les réseaux à base de h323 et sip ; ILYAS ED-DAOUI, TOMADER MAZRI. - Les méta-heuristiques pour le traitement de Big Data MOUHCINE SALMI ET ABDESSAMAD SEDDIKID, DHANAA HACHIMI 8
9 Committees Honorary Chair - Mr. Abdelmjid Chadili, Directeur Général De La Police Judiciaire - Pr. Driss Aboutajeddine, Directeur du Centre National pour la Recherche Scientifique et Technique - Pr. Azzedine El Midaoui, President of Ibn Tofail University Kenitra - Pr. Mohammed ESAAIDI, Director of ENSIAS Rabat - Pr. Nabil Hmina, Director of ENSA Kenitra General Chair - Pr. Nabil Hmina, Director of ENSA Kenitra - Pr. Habiba Chaoui, Université Ibn Tofail, ENSA Kenitra, AMAN Steering Committee - Anas ABOU EL KALAM, President of AMAN - Hanan EL BAKKALI, Vice- President of AMAN - Mohammed ESAAIDI, IEEE Morocco Section Chair Program Chair - Pr. Habiba Chaoui, Université Ibn Tofail, ENSA Kenitra, AMAN Technical Program committee - Organizing committee - Adnane Eddaim, Pr. ENSA Kenitra - Youness Idrissi Elbouzekri, Pr. ENSA Kenitra - Tomader Mazri, Pr. ENSA Kenitra - Hicham El Achgar, Director of IT6 - Chaima Saadi, PhD Student. ENSA Kenitra - Abderahim Abdallaoui, PhD Student ENSA Kenitra - Hanaa Hachimi, Pr. ENSA Kenitra - Nissrine Krami, Pr. ENSA Kenitra - Ilhma Oumaira, Pr. ENSA Kenitra - Aouatif Amine, Pr. ENSA Kenitra - Hassan Erguig, Pr. ENSA Kenitra - Nour El Houda Chaoui, Pr. ENSA Fes - Zhor Madini, Pr. ENSA Kenitra - Hanan El Bakkali, Vice - President of AMAN - Belkasem almaghraoui, Secretaire general, ENSA, Kenitra - Aicha Koulou, ENSA Kenitra - Mounir Echchadi, ENSA Kenitra - Nabil Srif, Pr.ENSA Kenitra - Samir Belaflih; Pr. ENSA Kenitra - Abdellah Abouabdellaha, Pr. ENSA Kenitra 9
10 - Rachid Elgouri, Pr. ENSA Kenitra - Hamza Bnedhiba, ENSA Kenitra - Mustapha Alaouy, ENSA Kenitra - Benaissa Boukhari, ENSA Kenitra - Hamza Bendhiba, ENSA Kenitra - Khalil Boukri, ENSA Kenitra 10
Réf#Num Nom et Prénom Sessions Contribution: Université PC - 112 - Or ABBASSI Abdellatif Physique - Chimie
Réf#Num Nom et Prénom Sessions Contribution: Université PC - 112 - Or ABBASSI Abdellatif PC - 153 - Or ABOUELHANOUNE Younes PC - 067 - Af AFILAL Mounya PC - 104 - Or AHAJJAM Younes PC - 018 - Or ALLAOUI
More informationHow To Teach In Marocco
Nadia Naami Ph.D. Candidate in Romance Studies Department of Modern Languages and Literatures University of Miami 5202 University Drive Coral Gables, FL 33124-2074 Tel: 786-603-8795 email :n.naami@umiami.edu
More information1 Announcement Call for papers
International Congress Mycotoxins and Cancer Mycotoxins and Cancer Marrakesh from 02 till 04 december 2015 nd th Hôtel Ryad Mogador Agdal st 1 Announcement Call for papers contact@mycotoxine-marrakech2015.ma
More informationUnder the title: Quality in Higher Education, for meet the needs of Enterprise and the Moroccan Society: Approaches, Practices and Evaluation Systems
Under the title: Quality in Higher Education, for meet the needs of Enterprise and the Moroccan Society: Approaches, Practices and Evaluation Systems The Research Group on QHSE Sidi Mohamed Ben Abdellah
More informationJournal of Internet Banking and Commerce
Journal of Internet Banking and Commerce An open access Internet journal (http://www.arraydev.com/commerce/jibc/) Journal of Internet Banking and Commerce, December 2009, vol. 14, no.3 (http://www.arraydev.com/commerce/jibc/)
More informationInternational Symposium "Water, Recycling and Waste Valorisation ", ERVD 3 Conference center FMP-Fez, Morocco, 28 and 29 October 2015.
Groupe de Réflexion sur le Développement Durable 32, Rue Michlifène Lot Al Ghorfa, Rte Aïn Smen, 30 040 Fès Tél. 0672 351 191 E-mail. zerrouq1959@gmail.com Site web: www.qualisup.com International Symposium
More informationInternational Symposium ERVD'2-2014 "Water, Recycling and Waste Valorisation ", ERVD 2 Conference center FMP-Fez, 2 and 3 June 2014.
Groupe de Réflexion sur le Développement Durable 32, Rue Michlifène Lot Al Ghorfa, Rte Aïn Smen, 30 040 Fès Tél. 0672 351 191 E-mail. zerrouq1959@gmail.com Site web: www.qualisup.com International Symposium
More informationJuly 9-15, 2011, Tlemcen University 9-15 Juillet 2011, Université de Tlemcen
Information & Communication Technologies (ICT) Teaching Program Scientific Research and technological Summer University Université d été de la Recherche Scientifique et Technologique In collaboration with
More informationVulnerability Analysis of Fire Spreading in a Building using Fuzzy Logic and its Integration in a Decision Support System
Vulnerability Analysis of Fire Spreading in a Building using Fuzzy Logic and its Integration in a Decision Support System Sanae KHALI ISSA Laboratory of Computer Sciences, Systems and Telecommunication
More informationCyber security strategies, services and CyberSOC organizations. How can you deal with cyber-attacks?
Cyber security strategies, services and CyberSOC organizations. How can you deal with cyber-attacks? 1 Thierry Evangelista Marketing Director, Security Services agenda market trends & facts regarding (cyber)threats
More informationEducation. Research interests. Some projects. Research Publications
Prof.Dr BENLAHMAR Elhabib Born October 21th 1 9 7 2 PhD Computer Science Mathematic & Computer Science Departement Faculty of Sciences Ben M'sik Hassan II Mohamedia-Casablanca University B.P 7955, Sidi
More informationProgram. 2015 International Conference on Cloud Computing Technologies and Applications. June 2-4, 2015 Marrakech MOROCCO
Moroccan Association of Cloud Computing 2015 International Conference on Cloud Computing Technologies and Applications June 2-4, 2015 Marrakech MOROCCO Program Session Topics A Cloud Security(I) S-I B
More informationPerformance Modeling of TCP/IP in a Wide-Area Network
INSTITUT NATIONAL DE RECHERCHE EN INFORMATIQUE ET EN AUTOMATIQUE Performance Modeling of TCP/IP in a Wide-Area Network Eitan Altman, Jean Bolot, Philippe Nain, Driss Elouadghiri, Mohammed Erramdani, Patrick
More informationAccess Control Protocol for Cloud Systems Based On the Model TOrBAC
International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-5, November 2012 Access Control Protocol for Cloud Systems Based On the Model TOrBAC Mustapha Ben Saidi,
More informationDesigning a Multi Agent System Architecture for IT Governance Platform
Designing a Multi Agent System Architecture for IT Governance Platform S. ELHASNAOUI, H. MEDROMI, S.FARIS, H.IGUER, A. SAYOUTI (EAS- LISER) Systems Architecture Team ENSEM, Hassan II University BP.8118,
More informationComparison between purely statistical and multi-agent based approaches for occupant behaviour modeling in buildings
Comparison between purely statistical and multi-agent based approaches for occupant behaviour modeling in buildings Khadija Tijani 1,2,Ayesha Kashif 1,3,Quoc Dung Ngo 1,Stéphane Ploix 1,Benjamin Haas 2,Julie
More informationATP Co C pyr y ight 2013 B l B ue C o C at S y S s y tems I nc. All R i R ghts R e R serve v d. 1
ATP 1 LES QUESTIONS QUI DEMANDENT RÉPONSE Qui s est introduit dans notre réseau? Comment s y est-on pris? Quelles données ont été compromises? Est-ce terminé? Cela peut-il se reproduire? 2 ADVANCED THREAT
More informationThe Meeting of the Network of Schools and Institutes and the 6th Annual Conference of the GIFT-MENA Marrakech, Morocco 10-12 February 2015
The Meeting of the Network of Schools and Institutes and the 6th Annual Conference of the GIFT-MENA Marrakech, Morocco 10-12 February 2015 Governance, State Building and the Rule of Law LIST OF PARTICIPANTS
More informationJANVIER 2013 / CATALOGUE DES FORMATIONS
1 New Vision of Technology Société de Services et de Solutions en Électronique, Informatique et Télécoms Adresse géographique : Abidjan - Cocody Riviera Palmeraie Téléphone : 225 22 49 59 45 Fax : 225
More informationIntroduction to Cyber Security / Information Security
Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be
More informationMulti-Agent Architecture for Implementation of ITIL Processes: Case of Incident Management Process
Multi-Agent Architecture for Implementation of ITIL Processes: Case of Incident Management Process Youssef SEKHARA, Hicham MEDROMI, Adil SAYOUTI Equipe Architectures des Systèmes (EAS), Laboratoire d Informatique,
More informationProgram'! Governance)Innovation)Lecture)Series) )Cycle)de)conférence)Innovations)en)gouvernance)
Resilienceincriticalinfrastructureandcrime prevention: Aworkshoponcollaborationandmulti9levelgovernance Larésiliencedanslesinfrastructuresessentiellesetla préventionducrime: Unatelierdetravailsurlacollaborationetlagouvernance
More informationThe Moroccan American Pharmaceutical Sciences & Education Network Group (PharMaSeng), University Hassan II MohammediaCasablanca & FST Mohammedia
The Moroccan American Pharmaceutical Sciences & Education Network Group (PharMaSeng), University Hassan II MohammediaCasablanca & FST Mohammedia Organize a Bioinformatic International Workshop October
More informationCFT 100000930 ICT review Questions/Answers
CFT 100000930 ICT review Questions/Answers 1. Est-ce que la stratégie métier est formalisée dans un document détaillant les priorités? Yes, there are two strategic documents, the STRATEGIC ORIENTATIONS
More informationDurée 4 jours. Pré-requis
F5 - BIG-IP Application Security Manager V11.0 Présentation du cours Ce cours traite des attaques applicatives orientées Web et de la façon d utiliser Application Security Manager (ASM) pour s en protéger.
More informationAudit de sécurité avec Backtrack 5
Audit de sécurité avec Backtrack 5 DUMITRESCU Andrei EL RAOUSTI Habib Université de Versailles Saint-Quentin-En-Yvelines 24-05-2012 UVSQ - Audit de sécurité avec Backtrack 5 DUMITRESCU Andrei EL RAOUSTI
More informationDynamic Case-Based Reasoning Based on the Multi-Agent Systems: Individualized Follow-Up of Learners in Distance Learning
Dynamic Case-Based Reasoning Based on the Multi-Agent Systems: Individualized Follow-Up of Learners in Distance Learning 1, 2 A. Zouhair, 1 E. M. En-Naimi, 1 B. Amami, 2 H. Boukachour, 2 P. Person, 2 C.
More informationALTERNATIVE JAVA SECURITY POLICY MODEL
FRÉDÉRIC SAMSON ALTERNATIVE JAVA SECURITY POLICY MODEL Mémoire présenté à la Faculté des études supérieures de l Université Laval dans le cadre du programme de maîtrise en informatique pour l obtention
More informationÉtude de l impact des attaques distribuées et multi-chemins sur les solutions de sécurité réseaux
Étude de l impact des attaques distribuées et multi-chemins sur les solutions de sécurité réseaux Damien Riquet Gilles Grimaud Michaël Hauspie Team 2xS Université Lille 1, France 29 Octobre 2012 D. Riquet,
More informationNetwork Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
More informationCategorical distribution of food safety constraints in Moroccan companies
Available online at www.scholarsresearchlibrary.com Scholars Research Library Der Pharmacia Lettre, 2015, 7 (2):285-292 (http://scholarsresearchlibrary.com/archive.html) ISSN 0975-5071 USA CODEN: DPLEB4
More informationBienvenue au Forum Vector 2007
insert Insert picture and 8cm click x 7cm Align Title Graphic. Bienvenue au Forum Vector 2007 Henri Belda Vector France V2.1 2005-07-27 insert Insert picture and 8cm click x 7cm Align Title Graphic. Vector
More informationGhizlane El Boussaidi http://pages.videotron.com/ghizlane/ 3207, boul. Lévesque Est Phone : (450) 661-4397
Ghizlane El Boussaidi http://pages.videotron.com/ghizlane/ 3207, boul. Lévesque Est Phone : (450) 661-4397 Laval, Québec, Canada email : gelboussaidi@gmail.com H7E 2P4 Citizenship: Canadian EDUCATION Ph.D.
More informationSOFTWARE DEFINED SOLUTIONS JEUDI 19 NOVEMBRE 2015. Nicolas EHRMAN Sr Presales SDS
SOFTWARE DEFINED SOLUTIONS JEUDI 19 NOVEMBRE 2015 Nicolas EHRMAN Sr Presales SDS Transform your Datacenter to the next level with EMC SDS EMC SOFTWARE DEFINED STORAGE, A SUCCESS STORY 5 ÈME ÉDITEUR MONDIAL
More informationF r i d a y 1 1 t h D e c e m b e r, 2 0 1 5
F r i d a y 1 1 t h D e c e m b e r, 2 0 1 5 12:30-01:30 pm Welcome (coffee and drinks, no lunch!) 01:30-02:00 pm Introduction: Dean Faculty Medicine University Ghent G. Vanderstraeten (Belgium) Part IA
More informationHeterogeneous PLC-RF networking for LLNs
Heterogeneous PLC-RF networking for LLNs Cedric Chauvenet, Bernard Tourancheau To cite this version: Cedric Chauvenet, Bernard Tourancheau. Heterogeneous PLC-RF networking for LLNs. CFIP 2011 - Colloque
More informationInteractions et collaboration dans les Learning Games immersifs. David.Panzoli@univ-jfc.fr
Interactions et collaboration dans les Learning Games immersifs David.Panzoli@univ-jfc.fr Parcours scientifique Thèse en informatique à l IRIT (Université de Toulouse) Environnements de réalité virtuelle,
More informationSecurity Requirements Analysis of Web Applications using UML
Security Requirements Analysis of Web Applications using UML Salim Chehida 1, Mustapha kamel Rahmouni 2 1 Department of Informatics, University of Mostaganem, Algeria salimchehida@yahoo.fr 2 Department
More informationMohamed First University Faculty of Science, dépt de Physique, laboratory LETAS, Oujda, Maroc. (2)
Amelioration the performance of photovoltaic stations for pumping and lighting installed in the Douar Zragta of the rural commune of Isly Prefecture of Oujda Angad E. Baghaz 1, R. Gaamouche 1, K. Hirech
More informationSection des Unités de recherche. Evaluation report. Research unit : Troubles du comportement alimentaire de l adolescent. University Paris 11
Section des Unités de recherche Evaluation report Research unit : Troubles du comportement alimentaire de l adolescent University Paris 11 Mars 2009 Section des Unités de recherche Rapport d'évaluation
More informationSawasAfrica-MiddleEast
welcome SawasAfrica-MiddleEast Telecoms Executive Board Agadir, 3 5 December 2013 agenda 2013 AGADIR bienvenue welcome hello مرحبا bonjour Tuesday 3 December 9h00 9h05 9h15 9h45 10h10 accueil / welcome
More informationWhat is the Impact of Social Factors on the Performance of Our Students?
International Journal of Humanities and Social Science Vol. 5, No. 2; February 2015 What is the Impact of Social Factors on the Performance of Our Students? Saad El Ouardirhi AbdellahYousfi Eradias 1 research
More informationi-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors
March 25-27, 2014 Steven A. Kunsman i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors ABB Inc. March 26, 2015 Slide 1 Cyber Security for Substation
More informationIntroduction au BIM. ESEB 38170 Seyssinet-Pariset Economie de la construction email : contact@eseb.fr
Quel est l objectif? 1 La France n est pas le seul pays impliqué 2 Une démarche obligatoire 3 Une organisation plus efficace 4 Le contexte 5 Risque d erreur INTERVENANTS : - Architecte - Économiste - Contrôleur
More informationMulti-agents SIP architecture for online Feature Interaction detection and resolution
Multi-agents SIP architecture for online Feature Interaction detection and resolution Zohair Chentouf* Ahmed Khoumsi** * Dialexia Communications Inc. 1755 Saint Régis, Suite 210 Montreal (QC) H9B 2M9,
More informationCESG Certification of Cyber Security Training Courses
CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security
More informationEntschuldigen Sie mich, I did not understand, parlez-vous IT Методы обеспечения защиты?
Entschuldigen Sie mich, I did not understand, parlez-vous IT Методы обеспечения защиты? World Standards Day 2015 ILNAS 2015-10-14 Cédric Mauny, Vice-Chairman of Luxembourg National Committee ISO/IEC JTC1
More informationHow To Become A Successful Computer Scientist
EIT ICT Labs Information & Communication Technology Labs Master in ICT Comment passer 1 an ailleurs en Europe, puis revenir à UNS dans le M2 IFI Parcours UBINET EIT ICT Labs Strategy Integrating the Knowledge
More informationOperation Structure (OS)
Brief description of the paper/report Argument Original reference Use of Game theory to analyse and control Supply Chain Management Systems Gérard P. Cachon, Serguei Netessine Game Theory in Supply Chain
More informationDIRECTIVE ON ACCOUNTABILITY IN CONTRACT MANAGEMENT FOR PUBLIC BODIES. An Act respecting contracting by public bodies (chapter C-65.1, a.
DIRECTIVE ON ACCOUNTABILITY IN CONTRACT MANAGEMENT FOR PUBLIC BODIES An Act respecting contracting by public bodies (chapter C-65.1, a. 26) SUBJECT 1. The purpose of this directive is to establish the
More informationFujitsu World Tour 2015
Fujitsu World Tour 2015 Citrix Mobile Workspace Human Centric Innovation INTERNAL USE ONLY 0 Copyright 2015 FUJITSU By Numbers CA 2014 : 3,14 milliards $ 9 000+ Collaborateurs 330 000+ Clients 10 000+
More informationTUTORING IN DISTANCE EDUCATION
15_CLASS.qxd 3/26/2003 10:27 Pagina 199 SComS: New Media in Education (2003) 199-203 BARBARA CLASS* TUTORING IN DISTANCE EDUCATION Action and developmental research The research carried out for this PhD
More informationHow To Write A Network Protocol For A Cell Phone Network
CURRICULUM VITAE OF BOUDOUR Ghalem LIG - Grenoble Institute of Technology 681, rue de la passerelle Domaine universitaire - BP 72-38402 Grenoble Phone: +33 6 25 61 69 43 E-mail: boudour_ghalem@yahoo.fr
More informationNews Letter n 0 9, Fall
News Letter n 0 9, Fall Table off contentt Welcome Les midis de l IIREB Fall Activities Coming Activities Invitations Publications Contact Wellcome The beginning of the semester having started, most of
More informationParis Fintech Forum. January 28, 2016. pre registration (/index.php/pre-insciption-en/) AGENDA SPEAKERS CONNECTED EVENTS PARTNERS & SPONSORS
Page 1 sur 9 Paris Fintech Forum January 28, 2016 pre registration (/index.php/pre-insciption-en/) AGENDA SPEAKERS CONNECTED EVENTS PARTNERS & SPONSORS Page 2 sur 9 What s the Paris Fintech Forum? (http://fr.linkedin.com/in/laurentnizri)
More informationUsing an MPI Cluster in the Control of a Mobile Robots System
Using an MPI Cluster in the Control of a Mobile Robots System Mohamed Salim LMIMOUNI, Saïd BENAISSA, Hicham MEDROMI, Adil SAYOUTI Equipe Architectures des Systèmes (EAS), Laboratoire d Informatique, Systèmes
More informationCourse Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)
Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses
More informationSmarter Grids for a Smarter Planet
Smarter Grids for a Smarter Planet Marc FOROT, Solutions IBM marc_forot@fr.ibm.com Nov 26, 2009 Disclaimer (Optional location for any required disclaimer copy. To set disclaimer, or delete, go to View
More informationArchived Content. Contenu archivé
ARCHIVED - Archiving Content ARCHIVÉE - Contenu archivé Archived Content Contenu archivé Information identified as archived is provided for reference, research or recordkeeping purposes. It is not subject
More informationREPORT OF THE TRAINING COURSE
FIRST MOROCCAN BIOSAFETY ASSOCIATION TRAINING COURSE ON BIOLOGICAL RISK MANAGEMENT February 13, 2010 Tétouan, Morocco March 5, 2010 ORIGINAL: English REPORT OF THE TRAINING COURSE Prepared by Prof. Khalid
More informationThe SIST-GIRE Plate-form, an example of link between research and communication for the development
1 The SIST-GIRE Plate-form, an example of link between research and communication for the development Patrick BISSON 1, MAHAMAT 5 Abou AMANI 2, Robert DESSOUASSI 3, Christophe LE PAGE 4, Brahim 1. UMR
More informationEstelle BROSSET Senior lecturer with habilitation to supervise doctoral theses Jean Monnet Chair Section 02- Public law
Estelle BROSSET Senior lecturer with habilitation to supervise doctoral theses Jean Monnet Chair Section 02- Public law Professional address: Centre d Etudes et de Recherches Internationales et Communautaires
More informationMontreal Students Chapter (MSC CTRF) Le chapitre de Montréal étudiants (CME GRTC)
ADVISORY COMMITTEE 1. Michael Kieran, Transportation Consulting Principal, IBI Group 2. Don McKnight, McGill University 3. Mario Iacobacci, Ph.D., Director, Economics / Directeur, Analyse économique, AECOM
More informationTemperature stochastic modeling and weather derivatives pricing: empirical study with Moroccan data
Temperature stochastic modeling and weather derivatives pricing: empirical study with Moroccan data Mohammed MRAOUA Financial engineer, actuary OCP Group, Casablanca Driss BARI Meteorologist engineer (IMCL
More informationThe Register of the Domain of the State A Revolution in the Registration of Land Rights
The Register of the Domain of the State A Revolution in the Registration of Land Rights Daniel ROBERGE, Canada Key words: government, rights in public land, Internet, Register, Registration system, Cadastre
More informationAbderrahman El Kharrim
Curriculum Vitae EPIKH administrators are allowed to treat all the data below Abderrahman El Kharrim Contribution to scientific and technical research projects Date and place of birth : Nationality : Personal
More informationNetwork Security: Software IDPS versus Embedded IDPS
Network Security: Software versus Embedded Y.SENHAJI 1, H.MEDROMI 2 1 Architecture System Team Hassan II University of Casablanca ENSEM Casablanca, Morocco 2 Architecture System Team Hassan II University
More informationL évolution des progiciels métier dans un contexte SOA
L évolution des progiciels métier dans un contexte SOA Ashish SHARMA Business Development Manager Oracle Fusion Middleware Agenda Quels scénarios pour conformer
More informationthe Parliamentary Assembly of the Union for the Mediterranean
the Parliamentary Assembly of the Union for the Mediterranean Royaume du Maroc Parlement 1. Meeting venue The 8 th plenary session Rabat, 23-25 March 2012. Practical Information. All meetings of the 8
More informationQu est-ce que le Cloud? Quels sont ses points forts? Pourquoi l'adopter? Hugues De Pra Data Center Lead Cisco Belgium & Luxemburg
Qu est-ce que le Cloud? Quels sont ses points forts? Pourquoi l'adopter? Hugues De Pra Data Center Lead Cisco Belgium & Luxemburg Agenda Le Business Case pour le Cloud Computing Qu est ce que le Cloud
More informationSecurity Operations. Key technologies for your Security Operations Center. Davide Veneziano - RSA Technology Consultant
Security Operations Key technologies for your Security Operations Center Davide Veneziano - RSA Technology Consultant 1 The evolving threat landscape The right route towards a SOC model The RSA advanced
More informationWIPO LIST OF NEUTRALS BIOGRAPHICAL DATA
ARBITRATION AND MEDIATION CENTER WIPO LIST OF NEUTRALS BIOGRAPHICAL DATA Fabrizio LA SPADA La Spada Boulevard Helvétique 36 1207 Geneva Switzerland Telephone: +41 22 707 40 70 Fax: +41 22 707 40 77 Email:
More informationLIST OF PARTICIPANTS AND SPEAKERS By Country
LIST OF PARTICIPANTS AND SPEAKERS By Country BRAZIL Mr. Paulo Fontoura Valle Undersecretary of Public Debt CHILE Mr. Patricio Sepúlveda Head of Debt Office COLOMBIA Mr. Juan Manuel Quintero and Public
More informationInformation session April 2nd, 2015. Master 2 in Information System Security Management (ISSM)
Information session April 2nd, 2015 Master 2 in Information System Security Management (ISSM) Master s team Prof. Yves Le Traon Study director Rita Giannini Study coordinator Master s team Nicolas Mayer
More informationOutline. IT Security: General Trends and Research Directions. Technical Attacks. Typical attack. Automated attacks via Worms, Trojans, & Viruses
Outline IT Security: General Trends and Research Directions Sherif El-Kassas Department of Computer Science The American University in Cairo Practical considerations Academic and research perspective National
More informationCaroline Dufour. Associate professor, School of Public Policy and Administration, Faculty of Liberal Arts and Professional Studies, York University
Caroline Dufour Associate professor School of Public Policy and Administration York University 4700 Keele St., Toronto, Ontario, Canada M3J 1P3 Tel.: 1-416-736-2100, ext. 33813 DEGREES AND EDUCATION PhD
More informationImpact of Cybersecurity Innovations in Key Sectors (Technical Insights)
Impact of Cybersecurity Innovations in Key Sectors (Technical Insights) Customized cybersecurity measures help overcome Industry specific challenges September 2014 Table of Contents Section Slide Number
More informationAbout the Authors Preface Acknowledgements List of Acronyms
Contents About the Authors Preface Acknowledgements List of Acronyms xiii xv xvii xix Part One Wireless Ad Hoc, Sensor and Mesh Networking 1 1 Introduction 3 1.1 Information Security 4 1.1.1 Computer Security
More informationMenaces avancées : Pourquoi l automatisation de la remédiation est- elle nécessaire? Détection Intégrée. Réponse Automatisée.
Menaces avancées : Pourquoi l automatisation de la remédiation est- elle nécessaire? Détection Intégrée. Réponse Automatisée. Denis Gadonnet Directeur Europe du Sud dgadonnet@hexiscyber.com Stand Interdata
More informationPre Conference Workshops Using AccessData Tools to Solve Computer Forensics Problems, Eric Thompson, AccessData. Free (ISC) 2 Workshop
Day 0 09:00-18:00 Saturday Free (ISC) 2 Workshop October 4th, 2003 Pre Conference Workshops Using AccessData Tools to Solve Computer Forensics Problems, Eric Thompson, AccessData MEITSEC'2003 22/09/2003-14:06
More informationRegister. Now. 2 nd Dii DESERT ENERGY CONFERENCE CAIRO 2011 2 nd 3 rd November 2011
Register Now 2 nd Dii DESERT ENERGY CONFERENCE CAIRO 2011 2 nd 3 rd November 2011 This year has so far been dominated by the significant political transitions in North Africa and a worldwide re-evaluation
More informationArchived Content. Contenu archivé
ARCHIVED - Archiving Content ARCHIVÉE - Contenu archivé Archived Content Contenu archivé Information identified as archived is provided for reference, research or recordkeeping purposes. It is not subject
More informationUniversité Paris-Est is a research and higher education cluster PRES.
- Université Paris-Est Marne-la-Vallée - Université Paris 12 Val de Marne - École des Ponts ParisTech - ESIEE Paris - École d architecture, de la ville et des territoires à Marne-la-Vallée (EAVT) - École
More informationEnhancing Data Security in Medical Information System Using the Watermarking Techniques and Oracle SecureFile LOBs
Enhancing Data Security in Medical Information System Using the Watermarking Techniques and Oracle SecureFile LOBs Said Aminzou 1, Brahim ER-RAHA 2, Youness Idrissi Khamlichi 3, Mustapha Machkour 4, Karim
More informationNSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense
NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense Cyber Investigations Data Management Systems Security Data Security Analysis Digital Forensics Health Care Security Industrial
More informationISO 10303-xx STEP. Sommaire. étendue. STandard for the Exchange of Product model data. Hervé Panetto CRAN Herve.Panetto@cran.uhp-nancy.fr. nancy.
ISO 10303-xx STEP STandard for the Exchange of Product model data Hervé Panetto CRAN Herve.Panetto@cran.uhp-nancy.fr nancy.fr Sommaire 1. Architecture 2. Un protocole d application : AP214 3. Conclusions
More informationWYDO Newsletter. 24 June 2013. Get together and organize your own activity! Index. World Young Doctors Day Journée Mondiale des Jeunes Médecins
WYDO Newsletter The newsletter of the World Young Doctors' Organization June 2013 vol. 3, special issue 24 June 2013 World Young Doctors Day Journée Mondiale des Jeunes Médecins Theme: Internet, Social
More informationMoroccan Automotive Industy : opportunities and perspectives
Moroccan Association for Automotive Industry and Trade Moroccan Automotive Industy : opportunities and perspectives Salma ADNAN, Communication and Marketing Responsible Paris, 16/10/2013 L industrie automobile
More informationCALL FOR PAPER. International Conference on the Levers of Durable Performance in the Middle East and North Africa (MENA) 4-5 May 2015
CALL FOR PAPER International Conference on the Levers of Durable Performance in the Middle East and North Africa (MENA) 4-5 May 2015 Pau Business School (ESC Pau) is pleased to invite proposals for its
More informationEC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led
EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led Certification: ENSA Exam 312-38 Course Description This course looks at the network security in defensive view.
More informationBILAL W S SHAFEI. An-Najah National University LRC / French department An-Najah Street. P.O. Box 07 Nablus Palestine
BILAL W S SHAFEI An-Najah National University LRC / French department An-Najah Street. P.O. Box 07 Nablus Palestine +970 599292310 bshafi@najah.edu or +970 9 2345113 882225 bshafi2@hotmail.com Educational
More informationCurriculum Vitae RELEVANT EXPERIENCE. September 2012- April 2013: Dean Assistant for quality assurance. University of Jordan
Curriculum Vitae Shereen Mousa Kakish Assistant Professor of Contemporary French Literature Mobile: 00962 (0) 77 5822766 E-mail: shereen2281@yahoo.com/ shereen.kakish.1@ulaval.ca/ s_kakish@ju.edu.jo RELEVANT
More informationListe d'adresses URL
Liste de sites Internet concernés dans l' étude Le 25/02/2014 Information à propos de contrefacon.fr Le site Internet https://www.contrefacon.fr/ permet de vérifier dans une base de donnée de plus d' 1
More informationNSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs
Mandatory Knowledge Units 1.0 Core2Y 1.1 Basic Data Analysis The intent of this Knowledge Unit is to provide students with basic abilities to manipulate data into meaningful information. 1.1.1 Topics Summary
More informationCH ENSA EC-Council Network Security Administrator Detailed Course Outline
CH ENSA EC-Council Network Security Administrator Detailed Course Outline Summary Duration Vendor Audience 5 Days hands-on training EC-Council Security Professionals Level Technology Category Advance Ethical
More informationLeadership et Gouvernance Cap sur la création de valeur
Leadership et Gouvernance Cap sur la création de valeur Telindus Trend Day 2011 2011, November 24th Cédric Mauny, Technology Leader, CISM, CISSP, ITIL, ISO27001 Security, Audit and Governance Services
More informationSUMMARY OF THE DISCUSSIONS
2013 Annual Meetings INTRODUCTION The has adopted a new Policy on Disclosure and Access to Information (the "DAI Policy") which commits the Bank to make all its information public, apart from a limited
More informationSponsorship Prospectus. Better Knowledge for Better Health Un meilleur savoir pour une meilleure santé. Québec City, Québec Canada
rane.org BER 2013 um.coch -23 SEPTEM colloqui QUEBEC, 19 Sponsorship Prospectus Better Knowledge for Better Health Un meilleur savoir pour une meilleure santé Québec City, Québec Canada 20-23 September
More informationCesario Di Sarno. Security Information and Event Management in Critical Infrastructures
Cesario Di Sarno Ph.D. Student in Information Engineering University of Naples «Parthenope» Security Information and Event Management in Critical Infrastructures Fai della Paganella 11 Febbraio 2014 Critical
More informationWeighted Total Mark. Weighted Exam Mark
CMP4103 Computer Systems and Network Security Period per Week Contact Hour per Semester Weighted Total Mark Weighted Exam Mark Weighted Continuous Assessment Mark Credit Units LH PH TH CH WTM WEM WCM CU
More information