@conference {Mannane20181, title = {Survey: Risk assessment models for cloud computing: Evaluation criteria}, booktitle = {Proceedings of 2017 International Conference of Cloud Computing Technologies and Applications, CloudTech 2017}, volume = {2018-January}, year = {2018}, pages = {1-5}, doi = {10.1109/CloudTech.2017.8284712}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-85046637347\&doi=10.1109\%2fCloudTech.2017.8284712\&partnerID=40\&md5=cf795cd6320ca19385451ed39a5973b6}, author = {Mannane, N. and Bencharhi, Y. and Boulafdour, B. and Regragui, B.} } @conference {Nouinou2015152, title = {Big data: Measuring how information technology can improve the economic growth and better life}, booktitle = {Proceedings of the 2015 5th World Congress on Information and Communication Technologies, WICT 2015}, year = {2015}, note = {cited By 0}, pages = {152-159}, abstract = {Today data are equivalent of oil or gold, but Succeeding with big data requires more than just data. Data-based value creation requires the identification of a framework from which predictions can be deducted and decisions can be made. Lot of index has been developed to measure the state of development of countries whether economic growth, ICT penetration or Human development. The purpose of the measuring was to assess policy implications and economic growth around the globe as well as share best practices. In this paper we are going to compare the most wildly tools of measurement of economic competiveness, Network readiness, Human development and world press freedom. Those four domains are judged to be the pillars of well-being and good live of a Human. In the second part of this paper, we examine the hypothesis that ICT penetration has positive effects on economic growth, well-being and a better life of a Human. We use the system Generalized Method of Moment for dynamic panel data analysis to extract the causal link between ICT penetration and growth. {\textcopyright} 2015 IEEE.}, doi = {10.1109/WICT.2015.7489663}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84979738903\&doi=10.1109\%2fWICT.2015.7489663\&partnerID=40\&md5=e0578db8132db6f390ffd1046c772f60}, author = {Nouinou, S. and Razafimampianina, R.M. and Regragui, B. and Doukkali, A.S.} } @conference {Razafimampianina201595, title = {A preliminary study on indicator framework for enterprise, based on COBIT 5 processes and SOA approach}, booktitle = {Proceedings of the 2015 5th World Congress on Information and Communication Technologies, WICT 2015}, year = {2015}, note = {cited By 0}, pages = {95-100}, abstract = {Organizations become dependent on Information Technology (IT) to fulfill their corporate aims, meet their business needs and deliver value to customers. For effective and efficient utilization of IT, we intend to contribute to the alignment between IT and organizational strategies. The challenge is to make the enterprise and its Information System (IS) as responsive as possible within the regard to changes in enterprise while taking into account the enterprise operational performance. When a change happens or a new opportunity comes, organizations do not know which assets are linked to which business processes and which services, especially IT services, to bring up first and which can wait until later. Our principal aim is to propose an indicator framework to track and control business-IT alignment. However, this paper is a preliminary study on this framework. We are inspired by COBIT 5 processes as indicators and believe that the Service-Oriented Architecture (SOA) applied to these processes interlinks and can interact well the different processes. The validity and applicability of our theoretical study will be evaluated for future work. {\textcopyright} 2015 IEEE.}, doi = {10.1109/WICT.2015.7489652}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84979761850\&doi=10.1109\%2fWICT.2015.7489652\&partnerID=40\&md5=1edfd0e5a575bd0443e4ef7a8c81b06a}, author = {Razafimampianina, R.M. and Nouinou, S. and Doukkali, A.S. and Regragui, B.} } @article {Bendriss2013307, title = {Automatic selection of filtering devices in a distributed intrusion prevension system}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {53}, number = {2}, year = {2013}, note = {cited By 0}, pages = {307-311}, abstract = {We presented in a previous article [1] a distributed intrusion prevention system based on honeypots for collecting malicious data. Among important questions to handle there is the choice of filtering device on which a filtering rule has to be applied. In this paper we propose a solution which will allow automatic selection of filtering device in the distributed IPMS platform. These devices will be configured to block unauthorized traffic. This solution must ensure full integration with the IPMS architecture. {\textcopyright} 2005 - 2013 JATIT \& LLS. All rights reserved.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84880649114\&partnerID=40\&md5=65a999baae635cb70cfb3cfd71d7a506}, author = {Bendriss, E. and Regragui, B.} } @article {Bendriss2013792, title = {Honeypot based intrusion management system: From a passive architecture to an ips system}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {47}, number = {2}, year = {2013}, note = {cited By 1}, pages = {792-797}, abstract = {In this paper, we are presenting an Intrusion Prevention System (IPS) based on multiple sensors in the network. These sensors are in fact honeypots built using honeyd. Honeyd is a high level honeypot which is very light and which is offering a lot of possibilities to get the most of information gathered about attackers in general. In fact, we are presenting a solution to go from passive and isolated sensors to a collaborative platform to help prevent intrusions by analyzing all collected data. To be able to do this, honeyd2db module was developed to enable honeyd to log its data into a database instead of a local file to the sensor. This aggregation of data from all sensors give us the possibility to analyze all collected logs as a hole and come out with a decision (deny network traffic on a firewall for example) using any of the known methods of data analysis. {\textcopyright} 2005 - 2013 JATIT \& LLS.}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84872851179\&partnerID=40\&md5=64123c156efa34310464200f371b9f29}, author = {Bendriss, E. and Regragui, B.} } @article {Zoukkari2012101, title = {E-Strategy formulation: A new approach based on a layered model}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {36}, number = {1}, year = {2012}, note = {cited By 1}, pages = {101-112}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84857185235\&partnerID=40\&md5=6ec655c0ef7c04077fd3b70d54e7b0ae}, author = {Zoukkari, N.B. and Doukkali, A. and Regragui, B.} } @conference {Bahtit20121, title = {Modeling of the process of ISO 27005 standard [Mod{\'e}lisation des processus de la norme ISO 27005]}, booktitle = {Proceedings of the 2nd National Days of Network Security and Systems, JNS2 2012}, year = {2012}, note = {cited By 0}, pages = {1-6}, doi = {10.1109/JNS2.2012.6249230}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84867093388\&doi=10.1109\%2fJNS2.2012.6249230\&partnerID=40\&md5=def7bdc4e881050b7aa353a371ee8ea5}, author = {Bahtit, H. and Regragui, B.} } @article {Enaanai2012113, title = {Noise abatement in the Arabic IRS results by applying a sentences morphosemantic filter (gene filter method)}, journal = {Journal of Theoretical and Applied Information Technology}, volume = {42}, number = {1}, year = {2012}, note = {cited By 0}, pages = {113-121}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84867512204\&partnerID=40\&md5=2851a8dedc46b911edc6276bfd005dfe}, author = {Enaanai, A. and Doukkali, A. and Regragui, B.} }