Chamseddine Talhi

Orcid: 0000-0003-2264-8265

According to our database1, Chamseddine Talhi authored at least 96 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Proactive and Intelligent Monitoring and Orchestration of Cloud-Native IP Multimedia Subsystem.
IEEE Open J. Commun. Soc., 2024

Optimizing CP-ABE Decryption in Urban VANETs: A Hybrid Reinforcement Learning and Differential Evolution Approach.
IEEE Open J. Commun. Soc., 2024

CRSFL: Cluster-based Resource-aware Split Federated Learning for Continuous Authentication.
J. Netw. Comput. Appl., 2024

MultiConfederated Learning: Inclusive Non-IID Data handling with Decentralized Federated Learning.
CoRR, 2024

The Metaverse: Survey, Trends, Novel Pipeline Ecosystem & Future Directions.
IEEE Commun. Surv. Tutorials, 2024

Resource-Aware Split Federated Learning for Fall Detection in the Metaverse.
Proceedings of the 20th International Conference on Wireless and Mobile Computing, 2024

Multi-Confederated Learning: Inclusive Non-IID Data handling with Decentralized Federated Learning.
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024

Utility-Preserving Face Anonymization via Differentially Private Feature Operations.
Proceedings of the IEEE INFOCOM 2024, 2024

VizCheck: Enhancing Phishing Attack Detection through Visual Domain Name Homograph Analysis.
Proceedings of the 7th Conference on Cloud and Internet of Things, 2024

Effective IDS under constraints of modern enterprise networks: revisiting the OpTC dataset.
Proceedings of the 7th Conference on Cloud and Internet of Things, 2024

Enhancing Port Scan and DDoS Attack Detection using Genetic and Machine Learning Algorithms.
Proceedings of the 7th Conference on Cloud and Internet of Things, 2024

BlockFed: A Novel Federated Learning Framework Based On Hierarchical Aggregation.
Proceedings of the 6th Conference on Blockchain Research & Applications for Innovative Networks and Services , 2024

2023
Federated Learning-Enabled Jamming Detection and Waveform Classification for Distributed Tactical Wireless Networks.
IEEE Trans. Netw. Serv. Manag., December, 2023

ModularFed: Leveraging modularity in federated learning frameworks.
Internet Things, July, 2023

Guest Editorial: Special Section on the Latest Developments in Federated Learning for the Management of Networked Systems and Resources.
IEEE Trans. Netw. Serv. Manag., June, 2023

Data independent warmup scheme for non-IID federated learning.
Inf. Sci., April, 2023

A Multi-Objective Approach Based on Differential Evolution and Deep Learning Algorithms for VANETs.
IEEE Trans. Veh. Technol., March, 2023

Adaptive Upgrade of Client Resources for Improving the Quality of Federated Learning Model.
IEEE Internet Things J., March, 2023

Privacy-Preserving Continuous Authentication for Mobile and IoT Systems Using Warmup-Based Federated Learning.
IEEE Netw., 2023

Federated Learning-Based Jamming Detection for Tactical Terrestrial and Non-Terrestrial Networks.
Proceedings of the IEEE Global Communications Conference, 2023

2022
Toward Quantifying Decentralization of Blockchain Networks With Relay Nodes.
Frontiers Blockchain, July, 2022

Lightweight Scheme for Smart Home Environments using Offloading Technique.
Int. J. Commun. Networks Inf. Secur., April, 2022

Multi-Tenant Intrusion Detection Framework as a Service for SaaS.
IEEE Trans. Serv. Comput., 2022

A Theoretical Model for Block Propagation Analysis in Bitcoin Network.
IEEE Trans. Engineering Management, 2022

Probing AndroVul dataset for studies on Android malware classification.
J. King Saud Univ. Comput. Inf. Sci., 2022

TD-PSO: Task distribution approach based on particle swarm optimization for vehicular ad hoc network.
Trans. Emerg. Telecommun. Technol., 2022

Warmup and Transfer Knowledge-Based Federated Learning Approach for IoT Continuous Authentication.
CoRR, 2022

Deep-Layer Clustering to Identify Permission Usage Patterns of Android App Categories.
IEEE Access, 2022

Federated Learning-Based Jamming Detection for Distributed Tactical Wireless Networks.
Proceedings of the IEEE Military Communications Conference, 2022

Dynamic Context-Aware Security in a Tactical Network Using Attribute-Based Encryption.
Proceedings of the IEEE Military Communications Conference, 2022

An Evaluation of Machine Learning Algorithms in an Experimental Structural Health Monitoring System Incorporating LoRa IoT Connectivity.
Proceedings of the IEEE International Instrumentation and Measurement Technology Conference, 2022

Independent and Identically Distributed (IID) Data Assessment in Federated Learning.
Proceedings of the IEEE Global Communications Conference, 2022

Two-Layer Architecture for Signature-Based Attacks Detection over Encrypted Network Traffic.
Proceedings of the Foundations and Practice of Security - 15th International Symposium, 2022

Performance Modeling and Analysis of Hotstuff for Blockchain Consensus.
Proceedings of the Fourth International Conference on Blockchain Computing and Applications, 2022

2021
Multi-Persona Mobility: Joint Cost-Effective and Resource-Aware Mobile-Edge Computation Offloading.
IEEE/ACM Trans. Netw., 2021

The Use of Anomaly Detection for the Detection of Different Types of DDoS Attacks in Cloud Environment.
J. Hardw. Syst. Secur., 2021

A Survey on Federated Learning: The Journey From Centralized to Distributed On-Site Learning and Beyond.
IEEE Internet Things J., 2021

FedMCCS: Multicriteria Client Selection Model for Optimal IoT Federated Learning.
IEEE Internet Things J., 2021

Federated Learning for Anomaly-Based Intrusion Detection.
Proceedings of the International Symposium on Networks, Computers and Communications, 2021

2020
Internet of Things intrusion Detection: Centralized, On-Device, or Federated Learning?
IEEE Netw., 2020

LCA-ABE: Lightweight Context-Aware Encryption for Android Applications.
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020

P-Code Based Classification to Detect Malicious VBA Macro.
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020

A Framework for Automated Monitoring and Orchestration of Cloud-Native applications.
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020

Monetization using Blockchains for IoT Data Marketplace.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2020

2019
A Novel Ad-Hoc Mobile Edge Cloud Offering Security Services Through Intelligent Resource-Aware Offloading.
IEEE Trans. Netw. Serv. Manag., 2019

Selective Mobile Cloud Offloading to Augment Multi-Persona Performance and Viability.
IEEE Trans. Cloud Comput., 2019

Machine Learning-Based EDoS Attack Detection Technique Using Execution Trace Analysis.
J. Hardw. Syst. Secur., 2019

ITADP: An inter-tenant attack detection and prevention framework for multi-tenant SaaS.
J. Inf. Secur. Appl., 2019

Proactive machine learning-based solution for advanced manageability of multi-persona mobile computing.
Comput. Electr. Eng., 2019

Performance Modeling and Analysis of the Bitcoin Inventory Protocol.
Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures, 2019

AndroVul: a repository for Android security vulnerabilities.
Proceedings of the 29th Annual International Conference on Computer Science and Software Engineering, 2019

A Theoretical Model for Fork Analysis in the Bitcoin Network.
Proceedings of the IEEE International Conference on Blockchain, 2019

2018
Multi-tenant intrusion detection system for public cloud (MTIDS).
J. Supercomput., 2018

Combining heterogeneous anomaly detectors for improved software security.
J. Syst. Softw., 2018

Security as a Service for Public Cloud Tenants(SaaS).
Proceedings of the 9th International Conference on Ambient Systems, 2018

2017
An anomaly detection system based on variable N-gram features and one-class SVM.
Inf. Softw. Technol., 2017

Smart mobile computation offloading: Centralized selective and multi-objective approach.
Expert Syst. Appl., 2017

Network Function Virtualization as a Service for multi-tenant software defined networks.
Proceedings of the 2017 Fourth International Conference on Software Defined Systems, 2017

Attribute-Based Encryption for Preserving Smart Home Data Privacy.
Proceedings of the Enhanced Quality of Life and Smart Living, 2017

SQLIIDaaS: A SQL Injection Intrusion Detection Framework as a Service for SaaS Providers.
Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing, 2017

2016
Generative versus discriminative classifiers for android anomaly-based detection system using system calls filtering and abstraction process.
Secur. Commun. Networks, 2016

From model-driven specification to design-level set-based analysis of XACML policies.
Comput. Electr. Eng., 2016

Towards ad-hoc cloud based approach for mobile intrusion detection.
Proceedings of the 12th IEEE International Conference on Wireless and Mobile Computing, 2016

2015
Enhancing malware detection for Android systems using a system call filtering and abstraction process.
Secur. Commun. Networks, 2015

AOMD approach for context-adaptable and conflict-free Web services composition.
Comput. Electr. Eng., 2015

CaptureMe: Attacking the User Credential in Mobile Banking Applications.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

On the Use of Mobile GPU for Accelerating Malware Detection Using Trace Analysis.
Proceedings of the 34th IEEE Symposium on Reliable Distributed Systems Workshop, 2015

On-device anomaly detection for resource-limited systems.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015

Optimal placement of sequentially ordered virtual security appliances in the cloud.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Towards flexible, scalable and autonomic virtual tenant slices.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

Towards an offloading approach that augments multi-persona performance and viability.
Proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference, 2015

Aspect-Oriented Security Hardening of UML Design Models
Springer, ISBN: 978-3-319-16106-8, 2015

2014
Securing Business Data on Android Smartphones.
Proceedings of the Mobile Web Information Systems - 11th International Conference, 2014

A Software-Defined Scalable and Autonomous Architecture for Multi-tenancy.
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014

2013
Impact of Dataset Representation on Smartphone Malware Detection Performance.
Proceedings of the Trust Management VII - 7th IFIP WG 11.11 International Conference, 2013

2012
Towards a BPEL model-driven approach for Web services security.
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012

Smartphone malware detection: From a survey towards taxonomy.
Proceedings of the 7th International Conference on Malicious and Unwanted Software, 2012

Performance Evaluation of Multi-pattern Matching Algorithms on Smartphone.
Proceedings of the 2012 Seventh International Conference on Broadband, 2012

2010
Aspect-Oriented Modeling for Representing and Integrating Security Concerns in UML.
Proceedings of the Software Engineering Research, 2010

2009
Usability of Security Specification Approaches for UML Design: A Survey.
J. Object Technol., 2009

Formal Verification and Validation of UML 2.0 Sequence Diagrams using Source and Destination of Messages.
Proceedings of the 4th International Workshop on Systems Software Verification, 2009

Extraction of forensically sensitive information from windows physical memory.
Digit. Investig., 2009

An Aspect-Oriented Approach for Software Security Hardening: from Design to Implementation.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2009

Weaving security aspects into UML 2.0 design models.
Proceedings of the 13th workshop on Aspect-oriented modeling, 2009

2008
Automated Windows Memory File Extraction for Cyber Forensics Investigation.
J. Digit. Forensic Pract., 2008

Execution monitoring enforcement under memory-limitation constraints.
Inf. Comput., 2008

2006
Security Evaluation of J2ME CLDC Embedded Java Platform.
J. Object Technol., 2006

Common Criteria Approach to J2ME CLDC Security Requirements.
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2006

Execution monitoring enforcement for limited-memory systems.
Proceedings of the 2006 International Conference on Privacy, 2006

2005
E-Bunny: A Dynamic Compiler for Embedded Java Virtual Machines.
J. Object Technol., 2005

Accelerating embedded Java for mobile devices.
IEEE Commun. Mag., 2005

Security Analysis of Wireless Java.
Proceedings of the Third Annual Conference on Privacy, 2005

Security Analysis of Mobile Java.
Proceedings of the 16th International Workshop on Database and Expert Systems Applications (DEXA 2005), 2005

Java for Mobile Devices: A Security Study.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2004
a synergy between efficient interpretation and fast selective dynamic compilation for the acceleration of embedded Java virtual machines.
Proceedings of the 3rd International Symposium on Principles and Practice of Programming in Java, 2004

A dynamic compiler for embedded Java virtual machines.
Proceedings of the 3rd International Symposium on Principles and Practice of Programming in Java, 2004


  Loading...