Repository logo
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Yкраї́нська
  • Log In
    New user? Click here to register.Have you forgotten your password?
Repository logo
  • Communities & Collections
  • All of DSpace
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Yкраї́нська
  • Log In
    New user? Click here to register.Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Touil, Ghassen"

Now showing 1 - 2 of 2
Results Per Page
Sort Options
  • Loading...
    Thumbnail Image
    Item
    Création d’une application mobile pour l’échange des médicaments entre pharmacies hospitalières
    (Faculté des Sciences, 2023) Zennir , Aicha; Larabi , Rayane ; Touil, Ghassen
    Au cours de ce mémoire, nous avons conçu et réalisé une application mobile pour la gestion d’échange de médicaments entre pharmacies hospitalières. Cette application offre la possibilité pour chaque établissement hospitalier (EPH) pour faire la commande par choisirai médicament pour faire l’échange. Ce travail a été réalisé en utilisant le modèle client-serveur pour application mobile. Et on utilise le réseau de Pétri et le langage de modélisation UML pour modéliser cette application. Nous avons choisi de programmer l’application avec langage « WLangage »et HFSQL pour la gestion de base de donnés.
  • Loading...
    Thumbnail Image
    Item
    Study and Deployment of an Intrusion Detection System
    (Faculty of sciences, 2022) Bellachia Mohamed, Nadir; Touil, Ghassen
    Internet has caused a great technological revolution in terms of the exchange of information, knowledge and science, which led to the inevitability of its use in personal and professional life, and the fate of people became hostage of this network. This necessity has led some to exploit it illegally by espionage, extortion, sabotage, data theft ... which has led to the emergence of protection methods such as Anti-virus systems, firewalls, security technologies, password, and encryption systems ... and other means of protection. All the security systems had loopholes and tightening loopholes that exploited by hackers. This prompted researchers to invent intrusion detection systems, which corrected many of the shortcomings of previous solutions. It should be noted that there are several types of intrusion detection systems, some of which are based on the scenario approach like IDS Snort, and some of them are based on the behavioral approach of users and applications. In our project, we installed & configured the Snort intrusion detection system, which is considered to be one of the leading systems in the intrusion detection field, and we installed the graphical display management software Splunk for easy reading and analysis of the alarms and logs that Snort generates as well as pulledpork a tool used for automatic management of Snort rules. With the advancements in the attack techniques and viciousness, the question we ask ourselves is whether Snort is still viable as an Intrusion detection system or is it an obsolete tool that can no longer handle the latest attack developments.

DSpace software copyright © 2002-2025 LYRASIS

  • Cookie settings
  • Privacy policy
  • End User Agreement
  • Send Feedback