Mouad Lemoudden
mouad lemoudden

Mouad Lemoudden

Lecturer

Biography

Dr. Mouad Lemoudden is a Lecturer of cybersecurity at the School of Computing of 麻豆社区. He is also member of the Blockpass Identity Lab. Mouad Lemoudden has a research background in applying new data-centric tools to cyber security. His current research interests include cloud computing security, network security, intrusion detection, adversarial behaviours, distributed ledger technology, forensics, identity, and privacy. He is an Associate Fellow of the Higher Education Academy (AFHEA).
Mouad is dedicated to integrating his research with teaching, as his cloud computing and distributed systems security expertise has a strong connection to the taught modules. His lectures are frequently updated to reflect the rapid evolution of the taught area. This allows the students opportunity to stay up to date recent advances. This also has a positive impact on supervision, whether it's Honours Project or the MSc Dissertation. As a result, interest in research is elevated among students, who are subsequently encouraged to carry out research.
Prior to joining ENU in 2020, Mouad Lemoudden has worked as Postdoctoral Researcher for the French National Institute for Research in Digital Science and Technology (Inria), where he was involved in a Directorate General of Armaments (the French Government Defence procurement and technology agency) project that focuses on creating a research testbed for intrusion detection system evaluation and modelling digital user profiles. Dr. Lemoudden has received his PhD in Computer Science in 2017 from the Mohammed V University in Rabat, Morocco. His PhD research focused on managing the logs of cloud computing systems using big data techniques for cybersecurity.
Dr. Lemoudden has published several quality scholarly articles. He has also been invited to serve as a reviewer for several conferences and journals. In addition, Dr. Lemoudden has been involved in supervising Research Master and PhD students since he accomplished his PhD in 2017.

Date


10 results

Post-Quantum Migration of the Tor Application

Journal Article
Berger, D., Lemoudden, M., & Buchanan, W. J. (2025)
Post-Quantum Migration of the Tor Application. Journal of Cybersecurity and Privacy, 5(2), Article 13. https://doi.org/10.3390/jcp5020013
The efficiency of Shor's and Grover's algorithms and the advancement of quantum computers implies that the cryptography used until now to protect one's privacy is potentially ...

Stabilized quantum-enhanced SIEM architecture and speed-up through Hoeffding tree algorithms enable quantum cybersecurity analytics in botnet detection

Journal Article
Tehrani, M. G., Sultanow, E., Buchanan, W. J., Amir, M., Jeschke, A., Houmani, M., Chow, R., & Lemoudden, M. (2024)
Stabilized quantum-enhanced SIEM architecture and speed-up through Hoeffding tree algorithms enable quantum cybersecurity analytics in botnet detection. Scientific Reports, 14, Article 1732. https://doi.org/10.1038/s41598-024-51941-8
For the first time, we enable the execution of hybrid quantum machine learning (HQML) methods on real quantum computers with 100 data samples and real-device-based simulations...

Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant

Journal Article
Elmiger, M., Lemoudden, M., Pitropakis, N., & Buchanan, W. J. (2024)
Start thinking in graphs: using graphs to address critical attack paths in a Microsoft cloud tenant. International Journal of Information Security, 23, 467-485. https://doi.org/10.1007/s10207-023-00751-6
The challenge of securing IT environments has reached a new complexity level as a growing number of organisations adopt cloud solutions. This trend increases the possibility o...

Advanced Hybrid Technique in Detecting Cloud Web Application鈥檚 Attacks

Presentation / Conference Contribution
Amar, M., Lemoudden, M., & El Ouahidi, B. (2018, November)
Advanced Hybrid Technique in Detecting Cloud Web Application鈥檚 Attacks. Presented at International Conference on Machine Learning for Networking, Paris, France
Recently cloud computing has emerged the IT world. It eventually promoted the acquisition of resources and services as needed, but it has also instilled fear and user鈥檚 renunc...

An approach for meteorological data integration and stream processing

Presentation / Conference Contribution
Hdafa, M., Zouhairi, Y., Lemoudden, M., & Ziyati, E. (2016, November)
An approach for meteorological data integration and stream processing. Presented at 2016 Third International Conference on Systems of Collaboration (SysCo), Casablanca, Morocco
Real-time big data processing is a crucial need of meteorology today. As a matter of fact, the weather is a determining factor in decision making in different areas such as ai...

Log file's centralization to improve cloud security

Presentation / Conference Contribution
Amar, M., Lemoudden, M., & El Ouahidi, B. (2016, May)
Log file's centralization to improve cloud security. Presented at 2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech), Marrakech, Morocco
The usage of cloud-computing architectures and characteristics has been enhanced in recent years. This approach brings the availability of storage and user services as needed....

Managing cloud-generated logs using big data technologies

Presentation / Conference Contribution
Lemoudden, M., & El Ouahidi, B. (2015, October)
Managing cloud-generated logs using big data technologies. Presented at 2015 International Conference on Wireless Networks and Mobile Communications (WINCOM), Marrakech, Morocco
Cloud computing is a fast-growing paradigm that has forcefully emerged and established itself in the next generation of IT industry and business, performing massive-scale and ...

Surveying the challenges and requirements for identity in the cloud

Presentation / Conference Contribution
Ben Bouazza, N., Lemoudden, M., & El Ouahidi, B. (2014, May)
Surveying the challenges and requirements for identity in the cloud. Presented at 2014 4th Edition of National Security Days (JNS4), Tetuan, Morocco
Cloud technologies are increasingly important for IT department for allowing them to concentrate on strategy as opposed to maintaining data centers; the biggest advantages of ...

Towards achieving discernment and correlation in cloud logging

Presentation / Conference Contribution
Lemoudden, M. (2014, May)
Towards achieving discernment and correlation in cloud logging. Paper presented at 13th International Conference on Software Engineering, Parallel and Distributed Systems (SEPADS14), Gdansk, Poland
Logs are of the most important pieces of analytical data in a cloud-based service infrastructure. IT actors, as well as security personnel, need access to information about us...

A survey of cloud computing security overview of attack vectors and defense mechanisms

Journal Article
Lemoudden, M., Ben Bouazza, N., El Ouahidi, B., & Bourget, D. (2013)
A survey of cloud computing security overview of attack vectors and defense mechanisms. Journal of Theoretical and Applied Information Technology, 54(2), 325-330
Enterprises are more and more moving to the cloud to take advantages of its economic and technological model. However, Privacy and Security issues are often cited as the main ...

Current Post Grad projects