Program JNS 5. http://www.univ-ibntofail.ac.ma/ensak/jns5/



Similar documents
Réf#Num Nom et Prénom Sessions Contribution: Université PC Or ABBASSI Abdellatif Physique - Chimie

How To Teach In Marocco

1 Announcement Call for papers

Under the title: Quality in Higher Education, for meet the needs of Enterprise and the Moroccan Society: Approaches, Practices and Evaluation Systems

Journal of Internet Banking and Commerce

International Symposium "Water, Recycling and Waste Valorisation ", ERVD 3 Conference center FMP-Fez, Morocco, 28 and 29 October 2015.

International Symposium ERVD' "Water, Recycling and Waste Valorisation ", ERVD 2 Conference center FMP-Fez, 2 and 3 June 2014.

July 9-15, 2011, Tlemcen University 9-15 Juillet 2011, Université de Tlemcen

Vulnerability Analysis of Fire Spreading in a Building using Fuzzy Logic and its Integration in a Decision Support System

Cyber security strategies, services and CyberSOC organizations. How can you deal with cyber-attacks?

Education. Research interests. Some projects. Research Publications

Program International Conference on Cloud Computing Technologies and Applications. June 2-4, 2015 Marrakech MOROCCO

Performance Modeling of TCP/IP in a Wide-Area Network

Access Control Protocol for Cloud Systems Based On the Model TOrBAC

Designing a Multi Agent System Architecture for IT Governance Platform

Comparison between purely statistical and multi-agent based approaches for occupant behaviour modeling in buildings

ATP Co C pyr y ight 2013 B l B ue C o C at S y S s y tems I nc. All R i R ghts R e R serve v d. 1

The Meeting of the Network of Schools and Institutes and the 6th Annual Conference of the GIFT-MENA Marrakech, Morocco February 2015

JANVIER 2013 / CATALOGUE DES FORMATIONS

Introduction to Cyber Security / Information Security

Multi-Agent Architecture for Implementation of ITIL Processes: Case of Incident Management Process

Program'! Governance)Innovation)Lecture)Series) )Cycle)de)conférence)Innovations)en)gouvernance)

The Moroccan American Pharmaceutical Sciences & Education Network Group (PharMaSeng), University Hassan II MohammediaCasablanca & FST Mohammedia

CFT ICT review Questions/Answers

Durée 4 jours. Pré-requis

Audit de sécurité avec Backtrack 5

Dynamic Case-Based Reasoning Based on the Multi-Agent Systems: Individualized Follow-Up of Learners in Distance Learning

ALTERNATIVE JAVA SECURITY POLICY MODEL

Étude de l impact des attaques distribuées et multi-chemins sur les solutions de sécurité réseaux

Network Security Administrator

Categorical distribution of food safety constraints in Moroccan companies

Bienvenue au Forum Vector 2007

Ghizlane El Boussaidi , boul. Lévesque Est Phone : (450)

SOFTWARE DEFINED SOLUTIONS JEUDI 19 NOVEMBRE Nicolas EHRMAN Sr Presales SDS

F r i d a y 1 1 t h D e c e m b e r,

Heterogeneous PLC-RF networking for LLNs

Interactions et collaboration dans les Learning Games immersifs.

Security Requirements Analysis of Web Applications using UML

Mohamed First University Faculty of Science, dépt de Physique, laboratory LETAS, Oujda, Maroc. (2)

Section des Unités de recherche. Evaluation report. Research unit : Troubles du comportement alimentaire de l adolescent. University Paris 11

SawasAfrica-MiddleEast

What is the Impact of Social Factors on the Performance of Our Students?

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors

Introduction au BIM. ESEB Seyssinet-Pariset Economie de la construction contact@eseb.fr

Multi-agents SIP architecture for online Feature Interaction detection and resolution

CESG Certification of Cyber Security Training Courses

Entschuldigen Sie mich, I did not understand, parlez-vous IT Методы обеспечения защиты?

How To Become A Successful Computer Scientist

Operation Structure (OS)

DIRECTIVE ON ACCOUNTABILITY IN CONTRACT MANAGEMENT FOR PUBLIC BODIES. An Act respecting contracting by public bodies (chapter C-65.1, a.

Fujitsu World Tour 2015

TUTORING IN DISTANCE EDUCATION

How To Write A Network Protocol For A Cell Phone Network

News Letter n 0 9, Fall

Paris Fintech Forum. January 28, pre registration (/index.php/pre-insciption-en/) AGENDA SPEAKERS CONNECTED EVENTS PARTNERS & SPONSORS

Using an MPI Cluster in the Control of a Mobile Robots System

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Smarter Grids for a Smarter Planet

Archived Content. Contenu archivé

REPORT OF THE TRAINING COURSE

The SIST-GIRE Plate-form, an example of link between research and communication for the development

Estelle BROSSET Senior lecturer with habilitation to supervise doctoral theses Jean Monnet Chair Section 02- Public law

Montreal Students Chapter (MSC CTRF) Le chapitre de Montréal étudiants (CME GRTC)

Temperature stochastic modeling and weather derivatives pricing: empirical study with Moroccan data

The Register of the Domain of the State A Revolution in the Registration of Land Rights

Abderrahman El Kharrim

Network Security: Software IDPS versus Embedded IDPS

L évolution des progiciels métier dans un contexte SOA

the Parliamentary Assembly of the Union for the Mediterranean

Qu est-ce que le Cloud? Quels sont ses points forts? Pourquoi l'adopter? Hugues De Pra Data Center Lead Cisco Belgium & Luxemburg

Security Operations. Key technologies for your Security Operations Center. Davide Veneziano - RSA Technology Consultant

WIPO LIST OF NEUTRALS BIOGRAPHICAL DATA

LIST OF PARTICIPANTS AND SPEAKERS By Country

Information session April 2nd, Master 2 in Information System Security Management (ISSM)

Outline. IT Security: General Trends and Research Directions. Technical Attacks. Typical attack. Automated attacks via Worms, Trojans, & Viruses

Caroline Dufour. Associate professor, School of Public Policy and Administration, Faculty of Liberal Arts and Professional Studies, York University

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)

About the Authors Preface Acknowledgements List of Acronyms

Menaces avancées : Pourquoi l automatisation de la remédiation est- elle nécessaire? Détection Intégrée. Réponse Automatisée.

Pre Conference Workshops Using AccessData Tools to Solve Computer Forensics Problems, Eric Thompson, AccessData. Free (ISC) 2 Workshop

Register. Now. 2 nd Dii DESERT ENERGY CONFERENCE CAIRO nd 3 rd November 2011

Archived Content. Contenu archivé

Université Paris-Est is a research and higher education cluster PRES.

Enhancing Data Security in Medical Information System Using the Watermarking Techniques and Oracle SecureFile LOBs

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

ISO xx STEP. Sommaire. étendue. STandard for the Exchange of Product model data. Hervé Panetto CRAN nancy.

WYDO Newsletter. 24 June Get together and organize your own activity! Index. World Young Doctors Day Journée Mondiale des Jeunes Médecins

Moroccan Automotive Industy : opportunities and perspectives

CALL FOR PAPER. International Conference on the Levers of Durable Performance in the Middle East and North Africa (MENA) 4-5 May 2015

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

BILAL W S SHAFEI. An-Najah National University LRC / French department An-Najah Street. P.O. Box 07 Nablus Palestine

Curriculum Vitae RELEVANT EXPERIENCE. September April 2013: Dean Assistant for quality assurance. University of Jordan

Liste d'adresses URL

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

Leadership et Gouvernance Cap sur la création de valeur

SUMMARY OF THE DISCUSSIONS

Sponsorship Prospectus. Better Knowledge for Better Health Un meilleur savoir pour une meilleure santé. Québec City, Québec Canada

Cesario Di Sarno. Security Information and Event Management in Critical Infrastructures

Weighted Total Mark. Weighted Exam Mark

Transcription:

1

Program JNS 5 http://www.univ-ibntofail.ac.ma/ensak/jns5/ Today, Information and Communications Technologies (ICT) are changing considerably the way we communicate, work, collaborate, and build information systems. Recent progress in networking, big data processing, mobile and cloud computing, Web based applications and services, has enabled new collaborative technology services for various kinds of application domains such as e/m-government, e/m-commerce and so on. While the benefits of the massive and spread introduction of ICT in modern information Systems are indisputable, security issues remain a big challenge with regards to their use. These issues are likely to become more critical in the near future because the technology is changing so fast introducing continually new risks and vulnerabilities leading to new opportunities of successful and dangerous cyber-attacks. The National Days of Security (Journées Nationales de la Sécurité : JNS) aim to promote effective communication and coordination between Moroccan society actors working on the information systems security issue. The JNS 5 Program is a rich mix of technical and theoretical talks, Poster sessions, discussions, workshop and tutorials. Sessions Keynotes Amphi ENSA S-I, Amphi ENSA S-II Salle C4 S-III Salle C2 S IV Amphi ENSA Workshop Salle C4 Topics Invited Speakers Network and Application Security Cryptology, Watermarking & Steganography Big Data: Privacy and Security Cloud Computing and Collaborative Systems Security National Security Days: workshop Cloud Computing Challenges Presentation guidelines: All presentations should be in English or French. The time provided for oral presentation is 20 minutes (15 Min for the presentation and 05 min for discussion). The speakers should give their slides to the session chair before the beginning of each session. The posters should be displayed one hour before the beginning of the poster session. The 30% best posters (4 pages) will be published in the JNS 5 Proceeding Parallel Oral Sessions: SII and SIII. Extended versions of best papers will be invited for publication in International journals or in Revue électronique internationale en technologies de l information (eti), www.revue-eti.net. 2

8.00 9.00 10.00 10.30 12.00 13.00 14.30 16.00 16.30 18.00 20.00-22.30 Thursday May 07 Friday May 08 Registration Registration Opening Ceremony Keynote Speaker (5-6) Coffee Break Keynote Speaker (1-2) Oral Session I. Lunch Keynote Speaker (3-4) Coffee Break & Poster Session Coffee Break & Poster Session Oral Session IV Lunch Tutorial 1 Tutorial 2 Oral Session II Oral Session III A G - AMAN Poster sessions Additional Fee 200 Dh Diner GALA Keynotes Keynote 1 Sécurité dans le contexte d'internet des Objets Anas Abou El Kalam & Imane Pasquier, Université Caddi Ayyad, Maroc Thursday May 07 10.30 11.15 Keynote 2 Private CERTs a to protect information assets against cyber attack Hicham El Achgar, IT 6, Maroc Thursday May 07 11.15 12.00 Keynote 3 Nuclear Cyber Security Oum Keltoum Hakam, Université Ibn Tofail, Maroc Thursday May 07 14.30. 15.15 Keynote 4 Authentification : techniques et vulnérabilités Mohamed Mejri, Laval University, Canada Thursday May 07 15.15 16.00 Keynote 5 La Sécurité et fiabilité des Systèmes mécatroniques Abdelkhalak El Hami, ENSA Rouen, France Friday May 08 8.30 9.15 Keynote 6 L investigation informatique (aspects mémoire et réseau Younes Benzagmout; Devoteam, Maroc Friday May 08 9.15 10.00 3

Workshop : Cloud Computing Challenges Program Workshop Salle C4 8.00 Registration 1 h 9.00 10.00 Opening Ceremony Coffee Break 1 h 30MIN 10.30 Chair 15MIN 10.45 KEYNOTE SPEAKER 30MIN 11.15 ARTICLE 1 30MIN 11.45 ARTICLE 2 30MIN 12.15 ARTICLE 3 30MIN 12.45 SESSION END 15MIN 13.00 LUNCH 1h30 Tutorials Tutorial 1 (Salle C3 ) Tutorial 2 (SalleC 6 ) Tutorial 3 (Salle 14) IPv6 Security Threats and Web Application Big Data Mitigations Security Friday May 08 14.30 16.30 Pr Bouabid El Ouahidi Mohammed-V University, Faculty of Sciences Pr. Nabil Benamar Moulay Ismail University, IPv6 expert, Internet Gouvernance Expert Bencharhi Youssef, Expert It6 4

ORAL SESSIONS Thursday May 07, 2015 Session I: Network and Application Security Chair: Pr. Hanan El Bakkali, ENSAIS, Rabat - Achieving Security in Dynamic Software Product Lines MOHAMED AMOUD AND OUNSA ROUDIÈS - Moroccan Distributed Honeynet System ABDELJALIL AGNAOU, ANAS ABOU EL KALAM AND ABDELLAH AIT OUAHMAN Thursday May 07, 2015 12.00-13.00 Amphi ENSA - New Multi Agent Architecture of intrusion detection Based on Learning New Attacks MOHSSINE EL AJJOURI, SIHAM BENHADOU AND HICHAM MEDROMI - Toward Protecting SCADA Systems: Log-based, intrusion-tolerance, selfhealing and Modbus Sec to protect SCADA systems from cybercriminal threats EL ANBAL MOUNIA,ANAS ABOU EL KALAM, SIHAM BENHADOU, FOUAD MOUTAOUAKKIL, HICHAM MEDROMI. - Improved Methods for Analyzing Security protocols KARTIT ALI, KAMAL IDRISSI HAMZA AND MOHAMED BELKHOURAF - La sécurité des services web : Outil de Communication Sécurisée (OCS) HASNAE L AMRANI, YOUNÈS EL BOUZEKRI EL IDRISSI AND RACHIDA AJHOUN - Détection d Intrusion à base d Agents Mobiles et Honeypot CHAIMAE SAADI and HABIBA CHAOUI Session II : Cryptology, Watermarking & Steganography Chair: Pr. My Taib Belghiti, ENSA, Kenitra - A refinement based development of the Transport Layer Security protocol BAHIJA BOULAMAAT AND MOHAMED BOUHDADI - A Variant of Guillou-Quisquater signature protocol JAOUAD ETTANFOUHI AND OMAR KHADIR Thursday May 07, 2015 16.30-18.00 Salle C 4 - Formal Verification of the Lowe modified BAN concrete Andrew Secure RPC Protocol RAJAA FILALI AND MOHAMED BOUHDADI - First Refinement of the Tatebayashi, Matsuzaki, and Newman Protocol Using Event- B Method SANAE EL MIMOUNI AND MOHAMED BOUHDADI - Study of Prophet routing protocol behavior in Vehicular Delay Tolerant Network with the presence of malicious nodes MARIA BENAMAR, NABIL BENAMAR AND DRISS EL OUADGHIRI 5

- Survey of multimodal biometrics systems : architecture & fusion techniques OUADIAA BARROU, ANAS ABOU EL KALAM AND SAID RAGHAY - A formal Modeling of the Biometric Signing Protocol Bahija Boulamaat and Mohamed Bouhdadi 6

Chair: Pr. Habiba Chaoui, ENSA Kenitra Session III: Big Data: Privacy and Security - Big Data and Text Analytics for Effective Management of Cloudgenerated Log Data MOUAD LEMOUDDEN AND EL OUAHIDI BOUABID - Trust and Privacy in Online Social Networks: A Comparative Study ZAKIA EL UAHHABI, SOUAD SADKI AND HANAN EL BAKKALI Thursday May 07, 2015 16.30-18.00 Salle C 2 - Unstructured data workflow: A functional overview and security issues FADOUA KHENNOU, YOUNESS IDRISSI KHAMLICHI AND NOUR EL HOUDA CHAOUI - Big data dans le cloud: vue d ensemble et les problèmes de sécurité CHANCEREL CODJOVI, YOUNESS IDRISSI KHAMLICHI AND ABDELKRIM HAQIQ - Towards A New Maturity Model for Information System MATRANE OSSAMA AND MOHAMED TALEA - Capturing software security practices using CBR : three case studies IKRAM EL RHAFFARI AND OUNSA ROUDIÈS Session IV: Cloud Computing and Collaborative Systems Security Chairs: Pr. Anas Abou El Kalam, ENSA Marrakech and Pr. Adnane Eddaim, ENSA Kenitra - Sécurité des données stockées dans le Cloud Computing. SALMA BOUAYAD, ABDERRAHIM ABDELLAOUI, YOUNESS IDRISSI KHAMLICHI AND HABIBA CHAOUI - Using Encryption Algorithm to enhance the Data Security in Cloud storage KARTIT ZAID, AZOUGAGHE ALI, EL MARRAKI MOHAMMED AND RADI ALI Friday May 08, 2015 10.30-13.00 Amphi ENSA - Security issues in wireless sensors network and cloud computing based solution for rpm applications ANAS BOUAYAD, NOUR EL HOUDA CHAOUI AND MOHAMED EL GHAZI - Privacy and Trust in Cloud Computing: A Comparative Study MERYEME ALOUANE, SOUAD SADKI AND HANAN EL BAKKALI - Un aperçu sur la confiance dans l adoption du Cloud Computing MOHAMED BAKOUK, YOUNESS KHAMLICHI IDRISSI AND MOHAMED MOUGHIT - Survey of Multi-agent System in Cloud security AYOUB BEN HAMMOU, ABDERRAHIM ABDELLAOUI, YOUNESS IDRISSI KHAMLICHI AND HABIBA CHAOUI 7

POSTER SESSIONS May 07-08, 2015 Chair: Pr. Younes El Idrissi El Bouzekri, ENSA Kenitra - Classification Of Attacks In Intrusion Detection Systems Using Neural Networks. LAFRAM ICHRAK, BERBICHE NAOUAL, EL ALAMI JAMILA. - Siem ( Security Information & Event Management) Solution Ossim (Open Source Security Information Management) D alienvault. HAMZA BENDHIBA, OTHMANE IBRAHIMI. - Mise En Place D un Smsi Conformément A La Norme Iso 27001 ZAKARIA SABIR, YOUNESS RABAA. - Big Data Privacy and Security in the healthcare : Moroccan context MOUNIA BOUHRIZ, HABIBA CHAOUI. Thursday May 07, 2015 16.00-16.30 And Friday May 08, 2015 10.00 10.30 - Optimisation& Big Data NABIL BOUCHATA, HANAA HACHIMI. - La Mise En Place D une Nouvelle Architecture Honeypot-Honeynet Dans Un Environnement Cloud AMINE BELQRUCH, CHAIMAE SAADI, HABIBA CHAOUI. - Approches d'insertion de données au sein du protocole réseau TCP/IP" "covert chnnel in TCP/IP" LHOUSSINE SOLLAMI, RACHID ELGOURY, MOHAMED TARAHDA. - Sécurisation du protocole olsr de l attaque d isolement du nœud : Etat De l art; FOUAH OUAFA, ADDAIM ADNANE. - Etude de l état sécuritaire du réseau wimax HANANE EL-KHAL, TOMADER MAZRI - Collaborative filtering-based security policy: comportement des profiles FATNA ELMENDILI, YOUNÈS ELBOUZEKRI EL IDRISSI. - Etude et proposition de solution sécuritaire pour les réseaux à base de h323 et sip ; ILYAS ED-DAOUI, TOMADER MAZRI. - Les méta-heuristiques pour le traitement de Big Data MOUHCINE SALMI ET ABDESSAMAD SEDDIKID, DHANAA HACHIMI 8

Committees Honorary Chair - Mr. Abdelmjid Chadili, Directeur Général De La Police Judiciaire - Pr. Driss Aboutajeddine, Directeur du Centre National pour la Recherche Scientifique et Technique - Pr. Azzedine El Midaoui, President of Ibn Tofail University Kenitra - Pr. Mohammed ESAAIDI, Director of ENSIAS Rabat - Pr. Nabil Hmina, Director of ENSA Kenitra General Chair - Pr. Nabil Hmina, Director of ENSA Kenitra - Pr. Habiba Chaoui, Université Ibn Tofail, ENSA Kenitra, AMAN Steering Committee - Anas ABOU EL KALAM, President of AMAN - Hanan EL BAKKALI, Vice- President of AMAN - Mohammed ESAAIDI, IEEE Morocco Section Chair Program Chair - Pr. Habiba Chaoui, Université Ibn Tofail, ENSA Kenitra, AMAN Technical Program committee - http://www.univ-ibntofail.ac.ma/ensak/jns5/comite.html Organizing committee - Adnane Eddaim, Pr. ENSA Kenitra - Youness Idrissi Elbouzekri, Pr. ENSA Kenitra - Tomader Mazri, Pr. ENSA Kenitra - Hicham El Achgar, Director of IT6 - Chaima Saadi, PhD Student. ENSA Kenitra - Abderahim Abdallaoui, PhD Student ENSA Kenitra - Hanaa Hachimi, Pr. ENSA Kenitra - Nissrine Krami, Pr. ENSA Kenitra - Ilhma Oumaira, Pr. ENSA Kenitra - Aouatif Amine, Pr. ENSA Kenitra - Hassan Erguig, Pr. ENSA Kenitra - Nour El Houda Chaoui, Pr. ENSA Fes - Zhor Madini, Pr. ENSA Kenitra - Hanan El Bakkali, Vice - President of AMAN - Belkasem almaghraoui, Secretaire general, ENSA, Kenitra - Aicha Koulou, ENSA Kenitra - Mounir Echchadi, ENSA Kenitra - Nabil Srif, Pr.ENSA Kenitra - Samir Belaflih; Pr. ENSA Kenitra - Abdellah Abouabdellaha, Pr. ENSA Kenitra 9

- Rachid Elgouri, Pr. ENSA Kenitra - Hamza Bnedhiba, ENSA Kenitra - Mustapha Alaouy, ENSA Kenitra - Benaissa Boukhari, ENSA Kenitra - Hamza Bendhiba, ENSA Kenitra - Khalil Boukri, ENSA Kenitra 10