Djamel Benredjem

Learn More
We present what we believe to be the first measurement of the spectral properties of a soft x-ray laser seeded by a high-order harmonic beam. Using an interferometric method, the spectral profile of a seeded Ni-like krypton soft x-ray laser (32.8 nm) generated by optical field ionization has been experimentally determined, and the shortest possible pulse(More)
—This paper presents the results of a case study on software vulnerability solutions in the Linux kernel. Our major contribution is the introduction of a classification of methods used to solve vulnerabilities. Our research shows that precondition validation, error handling, and redesign are the most used methods in solving vulnerabilities in the Linux(More)
The Maxwell-Bloch code COLAX has been upgraded to use detailed hydrodynamical and collisional-radiative simulations of a soft x-ray laser plasma with traveling-wave pumping. The seeding of short pulses of high-order harmonics of the pump laser into the x-ray laser medium has been simulated. The amplification is shown to be a dynamic, two-stage process: the(More)
The functions standardized as part of ISO C 1999 and their addendums improved very little the security options from the previously available library. The largest flaw remained that no function asked for the buffer size of destination buffers for any function copying data into a user-supplied buffer. According to earlier research we performed, we know that(More)
The purpose behind this article is to describe the features of Ftklipse, an extendable platform for computer forensics. This document designed to provide a detailed specification for the developers of Ftklipse. Ftklipse is a thick-client solution for forensics investigation. It is designed to collect and preserve evidence, to analyze it and to report on it.(More)
This document presents brief software specification of a secure file exchange system prototype involving mutual authentication of the users via their browser and the application server with PKI-based certificates as credentials, the use of LDAP for credential management, and authentication between the application and database servers to maintain a high(More)
We report on the software engineering design and implementation of an web- and LDAP-based secure file exchange system with bi-directional authentication of all parties involved in the process that is the user's browsers and the application server mutually authenticate, and the application and database servers authenticate using certificates, credentials,(More)
The purpose of this work is to design and implement a plugin-based environment that allows to integrate forensic tools working together to support programming tasks and addition of new tools. Integration is done through GUI components. The end-system environment must have user friendly GUI, configuration capabilities, plug-in capabilities to insert/inject(More)