Chamseddine Talhi
Orcid: 0000-0003-2264-8265
According to our database1,
Chamseddine Talhi
authored at least 96 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proactive and Intelligent Monitoring and Orchestration of Cloud-Native IP Multimedia Subsystem.
IEEE Open J. Commun. Soc., 2024
Optimizing CP-ABE Decryption in Urban VANETs: A Hybrid Reinforcement Learning and Differential Evolution Approach.
IEEE Open J. Commun. Soc., 2024
CRSFL: Cluster-based Resource-aware Split Federated Learning for Continuous Authentication.
J. Netw. Comput. Appl., 2024
MultiConfederated Learning: Inclusive Non-IID Data handling with Decentralized Federated Learning.
CoRR, 2024
IEEE Commun. Surv. Tutorials, 2024
Proceedings of the 20th International Conference on Wireless and Mobile Computing, 2024
Multi-Confederated Learning: Inclusive Non-IID Data handling with Decentralized Federated Learning.
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024
Proceedings of the IEEE INFOCOM 2024, 2024
VizCheck: Enhancing Phishing Attack Detection through Visual Domain Name Homograph Analysis.
Proceedings of the 7th Conference on Cloud and Internet of Things, 2024
Effective IDS under constraints of modern enterprise networks: revisiting the OpTC dataset.
Proceedings of the 7th Conference on Cloud and Internet of Things, 2024
Enhancing Port Scan and DDoS Attack Detection using Genetic and Machine Learning Algorithms.
Proceedings of the 7th Conference on Cloud and Internet of Things, 2024
Proceedings of the 6th Conference on Blockchain Research & Applications for Innovative Networks and Services , 2024
2023
Federated Learning-Enabled Jamming Detection and Waveform Classification for Distributed Tactical Wireless Networks.
IEEE Trans. Netw. Serv. Manag., December, 2023
Internet Things, July, 2023
Guest Editorial: Special Section on the Latest Developments in Federated Learning for the Management of Networked Systems and Resources.
IEEE Trans. Netw. Serv. Manag., June, 2023
Inf. Sci., April, 2023
A Multi-Objective Approach Based on Differential Evolution and Deep Learning Algorithms for VANETs.
IEEE Trans. Veh. Technol., March, 2023
Adaptive Upgrade of Client Resources for Improving the Quality of Federated Learning Model.
IEEE Internet Things J., March, 2023
Privacy-Preserving Continuous Authentication for Mobile and IoT Systems Using Warmup-Based Federated Learning.
IEEE Netw., 2023
Federated Learning-Based Jamming Detection for Tactical Terrestrial and Non-Terrestrial Networks.
Proceedings of the IEEE Global Communications Conference, 2023
2022
Frontiers Blockchain, July, 2022
Int. J. Commun. Networks Inf. Secur., April, 2022
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Engineering Management, 2022
J. King Saud Univ. Comput. Inf. Sci., 2022
TD-PSO: Task distribution approach based on particle swarm optimization for vehicular ad hoc network.
Trans. Emerg. Telecommun. Technol., 2022
Warmup and Transfer Knowledge-Based Federated Learning Approach for IoT Continuous Authentication.
CoRR, 2022
Deep-Layer Clustering to Identify Permission Usage Patterns of Android App Categories.
IEEE Access, 2022
Federated Learning-Based Jamming Detection for Distributed Tactical Wireless Networks.
Proceedings of the IEEE Military Communications Conference, 2022
Dynamic Context-Aware Security in a Tactical Network Using Attribute-Based Encryption.
Proceedings of the IEEE Military Communications Conference, 2022
An Evaluation of Machine Learning Algorithms in an Experimental Structural Health Monitoring System Incorporating LoRa IoT Connectivity.
Proceedings of the IEEE International Instrumentation and Measurement Technology Conference, 2022
Proceedings of the IEEE Global Communications Conference, 2022
Two-Layer Architecture for Signature-Based Attacks Detection over Encrypted Network Traffic.
Proceedings of the Foundations and Practice of Security - 15th International Symposium, 2022
Proceedings of the Fourth International Conference on Blockchain Computing and Applications, 2022
2021
Multi-Persona Mobility: Joint Cost-Effective and Resource-Aware Mobile-Edge Computation Offloading.
IEEE/ACM Trans. Netw., 2021
The Use of Anomaly Detection for the Detection of Different Types of DDoS Attacks in Cloud Environment.
J. Hardw. Syst. Secur., 2021
A Survey on Federated Learning: The Journey From Centralized to Distributed On-Site Learning and Beyond.
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
Proceedings of the International Symposium on Networks, Computers and Communications, 2021
2020
Internet of Things intrusion Detection: Centralized, On-Device, or Federated Learning?
IEEE Netw., 2020
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2020
2019
A Novel Ad-Hoc Mobile Edge Cloud Offering Security Services Through Intelligent Resource-Aware Offloading.
IEEE Trans. Netw. Serv. Manag., 2019
Selective Mobile Cloud Offloading to Augment Multi-Persona Performance and Viability.
IEEE Trans. Cloud Comput., 2019
Machine Learning-Based EDoS Attack Detection Technique Using Execution Trace Analysis.
J. Hardw. Syst. Secur., 2019
ITADP: An inter-tenant attack detection and prevention framework for multi-tenant SaaS.
J. Inf. Secur. Appl., 2019
Proactive machine learning-based solution for advanced manageability of multi-persona mobile computing.
Comput. Electr. Eng., 2019
Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures, 2019
Proceedings of the 29th Annual International Conference on Computer Science and Software Engineering, 2019
Proceedings of the IEEE International Conference on Blockchain, 2019
2018
J. Supercomput., 2018
J. Syst. Softw., 2018
Proceedings of the 9th International Conference on Ambient Systems, 2018
2017
Inf. Softw. Technol., 2017
Smart mobile computation offloading: Centralized selective and multi-objective approach.
Expert Syst. Appl., 2017
Network Function Virtualization as a Service for multi-tenant software defined networks.
Proceedings of the 2017 Fourth International Conference on Software Defined Systems, 2017
Proceedings of the Enhanced Quality of Life and Smart Living, 2017
SQLIIDaaS: A SQL Injection Intrusion Detection Framework as a Service for SaaS Providers.
Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing, 2017
2016
Generative versus discriminative classifiers for android anomaly-based detection system using system calls filtering and abstraction process.
Secur. Commun. Networks, 2016
From model-driven specification to design-level set-based analysis of XACML policies.
Comput. Electr. Eng., 2016
Proceedings of the 12th IEEE International Conference on Wireless and Mobile Computing, 2016
2015
Enhancing malware detection for Android systems using a system call filtering and abstraction process.
Secur. Commun. Networks, 2015
Comput. Electr. Eng., 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the 34th IEEE Symposium on Reliable Distributed Systems Workshop, 2015
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015
Towards an offloading approach that augments multi-persona performance and viability.
Proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference, 2015
Springer, ISBN: 978-3-319-16106-8, 2015
2014
Proceedings of the Mobile Web Information Systems - 11th International Conference, 2014
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014
2013
Proceedings of the Trust Management VII - 7th IFIP WG 11.11 International Conference, 2013
2012
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012
Proceedings of the 7th International Conference on Malicious and Unwanted Software, 2012
Proceedings of the 2012 Seventh International Conference on Broadband, 2012
2010
Proceedings of the Software Engineering Research, 2010
2009
J. Object Technol., 2009
Formal Verification and Validation of UML 2.0 Sequence Diagrams using Source and Destination of Messages.
Proceedings of the 4th International Workshop on Systems Software Verification, 2009
Digit. Investig., 2009
An Aspect-Oriented Approach for Software Security Hardening: from Design to Implementation.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2009
Proceedings of the 13th workshop on Aspect-oriented modeling, 2009
2008
J. Digit. Forensic Pract., 2008
Inf. Comput., 2008
2006
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2006
Proceedings of the 2006 International Conference on Privacy, 2006
2005
J. Object Technol., 2005
Proceedings of the Third Annual Conference on Privacy, 2005
Proceedings of the 16th International Workshop on Database and Expert Systems Applications (DEXA 2005), 2005
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005
2004
a synergy between efficient interpretation and fast selective dynamic compilation for the acceleration of embedded Java virtual machines.
Proceedings of the 3rd International Symposium on Principles and Practice of Programming in Java, 2004
Proceedings of the 3rd International Symposium on Principles and Practice of Programming in Java, 2004