Laboratoire Mathématiques informatique et applications


Principales publications en 2013 (journal et proceeding de congrès indexées par SCOPUS, ISI web of Sciences, DBLP, MrLookup (AMS)) :

1. A. Lakbabi, G. Orhanou, S. El Hajji : « Virtualization and Cloud Security », 3ème édition des Journées Nationales de la Sécurité – JNS3, ENSIAS – Rabat, 2013
2. A. Lakbabi, S. El Hajji, G. Orhanou, K. Chetioui: “New security perspective for Virtualized plateforms”, Proceeding of The 2013 International Conference of Information Security and Internet Engineering, the World Congress on Engineering 2013 (WCE 2013), London, U.K., 2013
3. B. Benyacoub & S. El Bernoussi & A. Zoglat, »credit scoring model based on Baum-Welch method with Genetic Algorithm », THE 10th ACS/IEEE, International Conference On Computer Systems And Applications. AICCSA 2013, Fes/Ifrane, Morocco, 2013.
4. G. Orhanou and S. El Hajji: “The new LTE cryptographic algorithms EEA3 and EIA3 – Verification, Implementation and Analytical Evaluation”, European Journal of Scientific Research, Volume 106 – Issue 4, 2013.
5. H. Lakhbab, S. El Bernoussi, « A new hybrid approach for tackling Thomson problem », International Conference on Industrial Engineering and Systems Management (IESM’2013).
6. H. Zarhouni, S. El Hajji,S. H. Shah, F. K. Khan, “WSN & Cloud Computing framework for E-medication”, Proceedings of Planetary Scientific Research Center (PSRC), ISBN: 978-93-82242-31-4, London (UK), 2013
7. I. Lebdaoui, G. Orhanou, S. El Hajji: “Data integrity in Real-time Datawarehousing”, Proceeding of The 2013 International Conference of Data Mining and Knowledge Engineering, the World Congress on Engineering 2013 (WCE 2013) London, U.K., 2013
8. J. Laassiri, S. Krit and S. El Hajji, “Review On The Attacks And Security Protocols for Wireless Sensor Networks”, European Journalof Scientific Research, April 2013
9. J. Mikram and F. Zinoun: “An Improved Version of Poincaré-Dulac Theorem for Improved Nilpotent Normal Forms”, Int. Journal of Math. Analysis, Vol. 7, 2013
10. J. Mikram, F. Zinoun and A. El Abdllaoui: “POINCARÉ CODE, a Package of Open-source Implements for Normalizations and Computer Algebra Reductions near Equilibria of Coupled Ordinary Differential Equations”, Computer Physics Communications,2013
11. K. Chetioui, G. Orhanou, S. El Hajji, A. Lakbabi : « DNS Protocol Security – DNSSEC, DNScurve and DNScrypt Security Features », 3ème édition des Journées Nationales de la Sécurité – JNS3, ENSIAS – Rabat, 2013
12. M. Chhiti, N| Mahdou, M. Tamekkante. « Self injective amalgamated duplication of a ring along an ideal”. Journal of Algebra and its Applications. 2013.
13. M. Chliah, G. Orhanou, S. El Hajji : « Security implementation at routing protocols level », 3èmeédition des Journées Nationales de la Sécurité – JNS3,ENSIAS – Rabat, 2013
14. M. Douiri and S. Elbernoussi: An Effective Ant Colony Optimization Algorithm for the Minimum Sum Coloring Problem”, ICCCI 2013, LNAI 8083, pp. 346–355, 2013.
15. M. Ennahbaoui S. ElHajji, Study of Access Control Models, Proceedings of the World Congress on Engineering 2013, Vol II, WCE 2013, London,U.K, , 2013
16. M. Ennahbaoui, S. El Hajji: “Mutation Analysis for Security”, International”,Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 4, Page: 7 à 18, April 2013
17. N. Mahdou, M. Tamekkante: “On (weak) gorenstein global dimensions.” Acta Mathematica Universitatis Comenianae. 2013
18. N. Mahdou, M. Tamekkante, S. Yassemi:”Coherent power series ring and weak gorenstein global dimension”, Glasgow Mathematical Journal, 2013
19. S.M Douiri, M.B.O. Medeni, S. El Bernoussi. E. M. Souidi:”A new steganographic method for grayscale image using graph coloring problem”. Applied Mathematics and Information Sciences, 2013.