Chamseddine Talhi
Chamseddine Talhi
Professor
Dirección de correo verificada de etsmtl.ca
Título
Citado por
Citado por
Año
Formal verification and validation of UML 2.0 sequence diagrams using source and destination of messages
V Lima, C Talhi, D Mouheb, M Debbabi, L Wang, M Pourzandi
Electronic notes in theoretical computer science 254, 143-160, 2009
792009
Multi-tenant isolation in a cloud environment using software defined networking
M Pourzandi, MF Ahmed, M Cheriet, C Talhi
US Patent 9,912,582, 2018
562018
Extraction of forensically sensitive information from windows physical memory
SM Hejazi, C Talhi, M Debbabi
digital investigation 6, S121-S131, 2009
522009
Execution monitoring enforcement under memory-limitation constraints
C Talhi, N Tawbi, M Debbabi
Information and Computation 206 (2-4), 158-184, 2008
512008
Smartphone malware detection: From a survey towards taxonomy
A Amamra, C Talhi, JM Robert
2012 7th International Conference on Malicious and Unwanted Software, 79-86, 2012
452012
Security evaluation of J2ME CLDC embedded Java platform.
M Debbabi, M Saleh, C Talhi, S Zhioua
Journal of Object Technology 5 (2), 125-154, 2006
372006
An anomaly detection system based on variable N-gram features and one-class SVM
W Khreich, B Khosravifar, A Hamou-Lhadj, C Talhi
Information and Software Technology 91, 186-197, 2017
262017
Aspect-oriented modeling for representing and integrating security concerns in UML
D Mouheb, C Talhi, M Nouh, V Lima, M Debbabi, L Wang, M Pourzandi
Software Engineering Research, Management and Applications 2010, 197-213, 2010
252010
Weaving security aspects into UML 2.0 design models
D Mouheb, C Talhi, V Lima, M Debbabi, L Wang, M Pourzandi
Proceedings of the 13th workshop on Aspect-oriented modeling, 7-12, 2009
252009
Java for mobile devices: A security study
M Debbabi, M Saleh, C Talhi, S Zhioua
21st Annual Computer Security Applications Conference (ACSAC'05), 10 pp.-244, 2005
232005
A dynamic compiler for embedded Java virtual machines
M Debbabi, A Gherbi, L Ketari, C Talhi, N Tawbi, H Yahyaoui, S Zhioua
Proceedings of the 3rd international symposium on Principles and practice of …, 2004
232004
Usability of security specification approaches for UML design: A survey.
C Talhi, D Mouheb, V Lima, M Debbabi, L Wang, M Pourzandi
Journal of Object Technology 8 (6), 102-122, 2009
202009
Security analysis of mobile Java
M Debbabi, M Saleh, C Talhi, S Zhioua
16th International Workshop on Database and Expert Systems Applications …, 2005
172005
Execution monitoring enforcement for limited-memory systems
C Talhi, N Tawbi, M Debbabi
Proceedings of the 2006 International Conference on Privacy, Security and …, 2006
162006
Combining heterogeneous anomaly detectors for improved software security
W Khreich, SS Murtaza, A Hamou-Lhadj, C Talhi
Journal of Systems and Software 137, 415-429, 2018
142018
Optimal placement of sequentially ordered virtual security appliances in the cloud
A Shameli-Sendi, Y Jarraya, M Fekih-Ahmed, M Pourzandi, C Talhi, ...
2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015
112015
Enhancing smartphone malware detection performance by applying machine learning hybrid classifiers
A Amamra, C Talhi, JM Robert, M Hamiche
Computer applications for software engineering, disaster recovery, and …, 2012
112012
Embedded Java security: security for mobile devices
M Debbabi, M Saleh, C Talhi, S Zhioua
Springer Science & Business Media, 2007
112007
Selective mobile cloud offloading to augment multi-persona performance and viability
H Tout, C Talhi, N Kara, A Mourad
IEEE Transactions on Cloud Computing, 2016
102016
Accelerating embedded Java for mobile devices
M Debbabi, A Mourad, C Talhi, H Yahyaoui
IEEE Communications Magazine 43 (9), 80-85, 2005
102005
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20