http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
A. Hendaoui,N. Émond,S. Dorval,M. Chaker,E. Haddad 한국물리학회 2013 Current Applied Physics Vol.13 No.5
This work involves the study of the positive emittance-switching (i.e. emittance that increases with increasing the temperature) of thermochromic VO2 films deposited using reactive pulsed laser deposition (RPLD) on Al substrates. The temperature dependence of the emittance of a 260 nm-thick VO2 film on Al substrate revealed a maximum of the emittance of 0.29 around 68 C. It is attributed to an increase in the infrared radiation absorption by the VO2 film due to the coexistence of both insulating and metallic phases in the vicinity of the transition temperature of VO2. The emittance tunability between 25 C and 68 C is 0.21. Since practical SRD application requires both high emittance at high temperature and large tunability, we demonstrate, by both simulation and fabrication, that these goals can be accomplished to some extent by a top dielectric a-Si:H/SiO2 l/4 stack layer. In fact, the addition of a-Si:H/SiO2 l/4 overlayer results in an increase of the maximum value of the emittance by 114% (from 0.29 to 0.62) as well as an increase of the tunability by 81% (from 0.21 to 0.38). This work reports an important improvement of the positive emittance-switching efficiency of the VO2-based structures and holds promise for a new generation of smart radiator devices (SRDs) for a passive thermal control of spacecrafts.
ALRUWAILI, Anfal,Hendaoui, Saloua International Journal of Computer ScienceNetwork S 2021 International journal of computer science and netw Vol.21 No.8
Banking systems are sensitive to data privacy since users' data, if not well protected, may be used to perform fake transactions. Blockchains, public and private, are frequently used in such systems thanks to their efficiency and high security. Public blockchains fail to fully protect users' data, despite their power in the accuracy of the transactions. The private blockchain is better used to protect the privacy of the sensitive data. They are not open and they apply authorization to login into the blockchain. However, they have a lower security compared to public blockchain. We propose in this paper a hybrid public-private architecture that profits from network virtualization. The main novelty of this proposal is the use of network virtualization that helps to reduce the complexity and efficiency of the computations. Simulations have been conducted to evaluate the performance of the proposed solution. Findings prove the efficiency of the scheme in reducing complexity and enhancing data privacy by guarantee high security. The contribution conducted by this proposal is that the results are verified by the centralized controller that ensures a correct validation of the resulted blockchains. In addition, computation complexity is to be reduced by profiting from the cooperation performed by the virtual agents.
Improved Multi-layer Authentication Scheme by Merging One-time Password with Voice Biometric Factor
ALRUWAILI, Amal,Hendaoui, Saloua International Journal of Computer ScienceNetwork S 2021 International journal of computer science and netw Vol.21 No.9
In this proposal, we aim to enhance the security of systems accounts by improving the authentication techniques. We mainly intend to enhance the accuracy of the one-time passwords via including voice biometric and recognition techniques. The recognition will be performed on the server to avoid redirecting voice signatures by hackers. Further, to enhance the privacy of data and to ensure that the active user is legitimate, we propose to periodically update the activated sessions using a user-selected biometric factor. Finally, we recommend adding a pre-transaction re-authentication which will guarantee enhanced security for sensitive operations. The main novelty of this proposal is the use of the voice factor in the verification of the one-time password and the various levels of authentications for a full-security guarantee. The improvement provided by this proposal is mainly designed for sensitive applications. From conducted simulations, findings prove the efficiency of the proposed scheme in reducing the probability of hacking users' sessions.
Access Control Models for XML Databases in the Cloud
Alfaqir, Shumukh,Hendaoui, Saloua,Alhablani, Fatimah,Alenzi, Wesam International Journal of Computer ScienceNetwork S 2022 International journal of computer science and netw Vol.22 No.5
Security is still a great concern to this day, albeit we have come a long way to mitigate its numerous threats. No-SQL databases are rapidly becoming the new database de-facto, as more and more apps are being developed every day. However, No-SQL databases security could be improved. In this paper, we discuss a way to improve the security of XML-based databases with the use of trust labels to be used as an access control model.
Improved User Privacy in SocialNetworks Based on Hash Function
Alrwuili, Kawthar,Hendaoui, Saloua International Journal of Computer ScienceNetwork S 2022 International journal of computer science and netw Vol.22 No.1
In recent years, data privacy has become increasingly important. The goal of network cryptography is to protect data while it is being transmitted over the internet or a network. Social media and smartphone apps collect a lot of personal data which if exposed, might be damaging to privacy. As a result, sensitive data is exposed and data is shared without the data owner's consent. Personal Information is one of the concerns in data privacy. Protecting user data and sensitive information is the first step to keeping user data private. Many applications user data can be found on other websites. In this paper, we discuss the issue of privacy and suggest a mechanism for keeping user data hidden in other applications.
Using SQLMAP to Detect SQLI Vulnerabilities
Almadhy, Waad,Alruwaili, Amal,Hendaoui, Saloua International Journal of Computer ScienceNetwork S 2022 International journal of computer science and netw Vol.22 No.1
One of the most discussed topics is cyber security when it comes to web application and how to protect it and protect databases. One of the most widely used and widespread techniques is SQLI, and it is used by hackers and hackers. In this research, we touched on the concept of SQLI and what are its different types, and then we detected a SQLI vulnerability in a website using SQLMAP. Finally, we mentioned different ways to avoid and protect against SQLI.
Alibrahim, Thikra S,Hendaoui, Saloua International Journal of Computer ScienceNetwork S 2022 International journal of computer science and netw Vol.22 No.1
One of the most essential foundations upon which big institutions rely in delivering cloud computing and hosting services, as well as other kinds of multiple digital services, is the security of infrastructures for digital and information services throughout the world. Distributed denial-of-service (DDoS) assaults are one of the most common types of threats to networks and data centers. Denial of service attacks of all types operates on the premise of flooding the target with a massive volume of requests and data until it reaches a size bigger than the target's energy, at which point it collapses or goes out of service. where it takes advantage of a flaw in the Transport Control Protocol's transmitting and receiving (3-way Handshake) (TCP). The current study's major focus is on an architecture that stops DDoS attacks assaults by producing code for DDoS attacks using a cloud controller and calculating Round-Tripe Time (RTT).
Novel VNFI Security Management Function Block For Improved Security Framework For SDN/NFV Networks
Alruwaili, Rahaf Hamoud,Alanazi, Haifa Khaled,Hendaoui, Saloua International Journal of Computer ScienceNetwork S 2022 International journal of computer science and netw Vol.22 No.10
Software Defined Networking (SDN) is a novel approach that have accelerated the development of numerous technologies such as policy-based access control, network virtualization, and others. It allows to boost network architectural flexibility and expedite the return on investment. However, this increases the system's complexity, necessitating the expenditure of dollars to assure the system's security. Network Function Virtualization (NFV) opens up new possibilities for network engineers, but it also raises security concerns. A number of Internet service providers and network equipment manufacturers are grappling with the difficulty of developing and characterizing NFVs and related technologies. Through Moodle's efforts to maintain security, this paper presents a detailed review of security-related challenges in software-defined networks and network virtualization services.