Talal Halabi

Orcid: 0000-0002-1922-5803

According to our database1, Talal Halabi authored at least 54 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Game-theoretic Approach for DDoS Attack Mitigation in IIoT Deterministic Networking.
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024

2023
Resilience-by-design in Adaptive Multi-agent Traffic Control Systems.
ACM Trans. Priv. Secur., August, 2023

Deep learning-enabled anomaly detection for IoT systems.
Internet Things, April, 2023

Stealthy Rootkits vs Low-Power IoT Devices: A Process-level Colonel Blotto Game.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Community Detection Algorithm for Mitigating Eclipse Attacks on Blockchain-enabled Metaverse.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023

Blockchain-enabled Efficient and Secure Federated Learning in IoT and Edge Computing Networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2023

Safe Reinforcement Learning via Observation Shielding.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

Autonomous and Security-Aware Dynamic Vehicular Platoon Formation.
Proceedings of the 10th International Conference on Dependable Systems and Their Applications, 2023

A Study on the Efficiency of Intrusion Detection Systems in IoT Networks.
Proceedings of the International Conference on Computer, 2023

The Ultimate Battle Against Zero-Day Exploits: Toward Fully Autonomous Cyber-Physical Defense.
Proceedings of the IEEE International Conference on Software Services Engineering, 2023

2022
A coalitional security game against data integrity attacks in autonomous vehicle networks.
Veh. Commun., 2022

Scalable Collaborative Intrusion Detection in Autonomous Vehicular Networks: A hierarchical framework based on game theory.
Internet Things, 2022

A Review and Taxonomy on Fault Analysis in Transmission Power Systems.
Comput., 2022

Artificial Intelligence f or Cybersecurity in IoT-enabled Avionics: Challenges and Solutions.
Proceedings of the 8th IEEE World Forum on Internet of Things, 2022

Adaptive Control for Security and Resilience of Networked Cyber-Physical Systems: Where Are We?
Proceedings of the 4th IEEE International Conference on Trust, 2022

Weaponizing Actions in Multi-Agent Reinforcement Learning: Theoretical and Empirical Study on Security and Robustness.
Proceedings of the PRIMA 2022: Principles and Practice of Multi-Agent Systems, 2022

Experimental Evaluation of Homomorphic Encryption in Cloud and Edge Machine Learning.
Proceedings of the 14th International Conference on Knowledge and Systems Engineering, 2022

Towards Adaptive Cybersecurity for Green IoT.
Proceedings of the IEEE International Conference on Internet of Things and Intelligence Systems, 2022

Optimized Moving Target Defense Against DDoS Attacks in IoT Networks: When to Adapt?
Proceedings of the IEEE Global Communications Conference, 2022

Stealthy Data Corruption Attack Against Road Traffic Congestion Avoidance Applications.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

A Scary Peek into The Future: Advanced Persistent Threats in Emerging Computing Environments.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022

LSTM-Based Anomalous Behavior Detection in Multi-Agent Reinforcement Learning.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022

2021
Protecting the Internet of Vehicles Against Advanced Persistent Threats: A Bayesian Stackelberg Game.
IEEE Trans. Reliab., 2021

Machine Learning-as-a-Service Performance Evaluation on Multi-class Datasets.
Proceedings of the IEEE International Conference on Smart Internet of Things, 2021

Optimizing the Performance of Web Applications in Mobile Cloud Computing.
Proceedings of the 6th IEEE International Conference on Smart Cloud, 2021

Security Risk Assessment Methodologies in The Internet of Things: Survey and Taxonomy.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

Toward Efficient and Robust Deep Learning-based Malware Detection in Fog Computing.
Proceedings of the International Symposium on Networks, Computers and Communications, 2021

Adaptive Security Risk Mitigation in Edge Computing: Randomized Defense Meets Prospect Theory.
Proceedings of the 6th IEEE/ACM Symposium on Edge Computing, 2021

Online Energy-efficient Resource Allocation in Cloud Computing Data Centers.
Proceedings of the 24th Conference on Innovation in Clouds, 2021

Reinforcement Learning-driven Attack on Road Traffic Signal Controllers.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

Optimizing the Allocation of Secure Fog Resources based on QoS Requirements.
Proceedings of the 8th IEEE International Conference on Cyber Security and Cloud Computing, 2021

2020
Towards Security-Based Formation of Cloud Federations: A Game Theoretical Approach.
IEEE Trans. Cloud Comput., 2020

A Minimax Game for Resilient-by-design Adaptive Traffic Control Systems.
CoRR, 2020

A Game-Theoretic Approach for Distributed Attack Mitigation in Intelligent Transportation Systems.
Proceedings of the NOMS 2020, 2020

Optimizing Virtual Machine Migration in Multi-Clouds.
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020

Multi-Objective Interdependent VM Placement Model based on Cloud Reliability Evaluation.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Fog Computing Security Assessment for Device Authentication in the Internet of Things.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

Reliability-based Formation of Cloud Federations Using Game Theory.
Proceedings of the IEEE Global Communications Conference, 2020

Detecting SQL Injection Attacks in Cloud SaaS using Machine Learning.
Proceedings of the 6th IEEE International Conference on Big Data Security on Cloud, 2020

Predicting Future Malware Attacks on Cloud Systems using Machine Learning.
Proceedings of the 6th IEEE International Conference on Big Data Security on Cloud, 2020

2019
A deep learning approach for proactive multi-cloud cooperative intrusion detection system.
Future Gener. Comput. Syst., 2019

Toward Secure Resource Allocation in Mobile Cloud Computing: A Matching Game.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

A Decentralized Reputation Management System for Securing the Internet of Vehicles.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

Trust-Based Cooperative Game Model for Secure Collaboration in the Internet of Vehicles.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Reliability-Driven Task Assignment in Vehicular Crowdsourcing: A Matching Game.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2019

Cloud-based Sybil Attack Detection Scheme for Connected Vehicles.
Proceedings of the 3rd Cyber Security in Networking Conference, 2019

Security Risk-Aware Resource Provisioning Scheme for Cloud Computing Infrastructures.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
A broker-based framework for standardization and management of Cloud Security-SLAs.
Comput. Secur., 2018

Online Allocation of Cloud Resources Based on Security Satisfaction.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Cloud Security Up for Auction: a DSIC Online Mechanism for Secure IaaS Resource Allocation.
Proceedings of the 2nd Cyber Security in Networking Conference, 2018

A Cooperative Game for Online Cloud Federation Formation Based on Security Risk Assessment.
Proceedings of the 5th IEEE International Conference on Cyber Security and Cloud Computing, 2018

2017
Towards quantification and evaluation of security of Cloud Service Providers.
J. Inf. Secur. Appl., 2017

Evaluation and selection of Cloud security services based on Multi-Criteria Analysis MCA.
Proceedings of the 2017 International Conference on Computing, 2017

Service Assignment in Federated Cloud Environments Based on Multi-objective Optimization of Security.
Proceedings of the 5th IEEE International Conference on Future Internet of Things and Cloud, 2017


  Loading...