Formal verification and validation of UML 2.0 sequence diagrams using source and destination of messages V Lima, C Talhi, D Mouheb, M Debbabi, L Wang, M Pourzandi Electronic Notes in Theoretical Computer Science 254, 143-160, 2009 | 83 | 2009 |
Multi-tenant isolation in a cloud environment using software defined networking M Pourzandi, MF Ahmed, M Cheriet, C Talhi US Patent 9,912,582, 2018 | 78 | 2018 |
Extraction of forensically sensitive information from windows physical memory SM Hejazi, C Talhi, M Debbabi digital investigation 6, S121-S131, 2009 | 55 | 2009 |
Execution monitoring enforcement under memory-limitation constraints C Talhi, N Tawbi, M Debbabi Information and Computation 206 (2-4), 158-184, 2008 | 52 | 2008 |
Smartphone malware detection: From a survey towards taxonomy A Amamra, C Talhi, JM Robert 2012 7th International Conference on Malicious and Unwanted Software, 79-86, 2012 | 50 | 2012 |
An anomaly detection system based on variable N-gram features and one-class SVM W Khreich, B Khosravifar, A Hamou-Lhadj, C Talhi Information and Software Technology 91, 186-197, 2017 | 41 | 2017 |
Security evaluation of J2ME CLDC embedded Java platform. M Debbabi, M Saleh, C Talhi, S Zhioua J. Object Technol. 5 (2), 125-154, 2006 | 38 | 2006 |
Weaving security aspects into UML 2.0 design models D Mouheb, C Talhi, V Lima, M Debbabi, L Wang, M Pourzandi Proceedings of the 13th workshop on Aspect-oriented modeling, 7-12, 2009 | 26 | 2009 |
Aspect-oriented modeling for representing and integrating security concerns in UML D Mouheb, C Talhi, M Nouh, V Lima, M Debbabi, L Wang, M Pourzandi Software Engineering Research, Management and Applications 2010, 197-213, 2010 | 25 | 2010 |
A dynamic compiler for embedded Java virtual machines M Debbabi, A Gherbi, L Ketari, C Talhi, N Twabi, H Yahyaoui, S Zhioua Trinity College Dublin, 2004 | 24 | 2004 |
Usability of security specification approaches for UML design: A survey. C Talhi, D Mouheb, V Lima, M Debbabi, L Wang, M Pourzandi J. Object Technol. 8 (6), 102-122, 2009 | 22 | 2009 |
Java for mobile devices: A security study M Debbabi, M Saleh, C Talhi, S Zhioua 21st Annual Computer Security Applications Conference (ACSAC'05), 10 pp.-244, 2005 | 22 | 2005 |
Selective mobile cloud offloading to augment multi-persona performance and viability H Tout, C Talhi, N Kara, A Mourad IEEE Transactions on Cloud Computing, 2016 | 19 | 2016 |
Smart mobile computation offloading: Centralized selective and multi-objective approach H Tout, C Talhi, N Kara, A Mourad Expert Systems with Applications 80, 1-13, 2017 | 18 | 2017 |
Combining heterogeneous anomaly detectors for improved software security W Khreich, SS Murtaza, A Hamou-Lhadj, C Talhi Journal of Systems and Software 137, 415-429, 2018 | 16 | 2018 |
Execution monitoring enforcement for limited-memory systems C Talhi, N Tawbi, M Debbabi Proceedings of the 2006 International Conference on Privacy, Security and …, 2006 | 16 | 2006 |
Security analysis of mobile Java M Debbabi, M Saleh, C Talhi, S Zhioua 16th International Workshop on Database and Expert Systems Applications …, 2005 | 16 | 2005 |
A novel ad-hoc mobile edge cloud offering security services through intelligent resource-aware offloading T Dbouk, A Mourad, H Otrok, H Tout, C Talhi IEEE Transactions on Network and Service Management 16 (4), 1665-1680, 2019 | 12 | 2019 |
Security as a service for public cloud tenants (SaaS) M Hawedi, C Talhi, H Boucheneb Procedia computer science 130, 1025-1030, 2018 | 12 | 2018 |
Optimal placement of sequentially ordered virtual security appliances in the cloud A Shameli-Sendi, Y Jarraya, M Fekih-Ahmed, M Pourzandi, C Talhi, ... 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015 | 12 | 2015 |