Chamseddine Talhi
Chamseddine Talhi
Professor
Dirección de correo verificada de etsmtl.ca
Título
Citado por
Citado por
Año
Formal verification and validation of UML 2.0 sequence diagrams using source and destination of messages
V Lima, C Talhi, D Mouheb, M Debbabi, L Wang, M Pourzandi
Electronic Notes in Theoretical Computer Science 254, 143-160, 2009
832009
Multi-tenant isolation in a cloud environment using software defined networking
M Pourzandi, MF Ahmed, M Cheriet, C Talhi
US Patent 9,912,582, 2018
782018
Extraction of forensically sensitive information from windows physical memory
SM Hejazi, C Talhi, M Debbabi
digital investigation 6, S121-S131, 2009
552009
Execution monitoring enforcement under memory-limitation constraints
C Talhi, N Tawbi, M Debbabi
Information and Computation 206 (2-4), 158-184, 2008
522008
Smartphone malware detection: From a survey towards taxonomy
A Amamra, C Talhi, JM Robert
2012 7th International Conference on Malicious and Unwanted Software, 79-86, 2012
502012
An anomaly detection system based on variable N-gram features and one-class SVM
W Khreich, B Khosravifar, A Hamou-Lhadj, C Talhi
Information and Software Technology 91, 186-197, 2017
412017
Security evaluation of J2ME CLDC embedded Java platform.
M Debbabi, M Saleh, C Talhi, S Zhioua
J. Object Technol. 5 (2), 125-154, 2006
382006
Weaving security aspects into UML 2.0 design models
D Mouheb, C Talhi, V Lima, M Debbabi, L Wang, M Pourzandi
Proceedings of the 13th workshop on Aspect-oriented modeling, 7-12, 2009
262009
Aspect-oriented modeling for representing and integrating security concerns in UML
D Mouheb, C Talhi, M Nouh, V Lima, M Debbabi, L Wang, M Pourzandi
Software Engineering Research, Management and Applications 2010, 197-213, 2010
252010
A dynamic compiler for embedded Java virtual machines
M Debbabi, A Gherbi, L Ketari, C Talhi, N Twabi, H Yahyaoui, S Zhioua
Trinity College Dublin, 2004
242004
Usability of security specification approaches for UML design: A survey.
C Talhi, D Mouheb, V Lima, M Debbabi, L Wang, M Pourzandi
J. Object Technol. 8 (6), 102-122, 2009
222009
Java for mobile devices: A security study
M Debbabi, M Saleh, C Talhi, S Zhioua
21st Annual Computer Security Applications Conference (ACSAC'05), 10 pp.-244, 2005
222005
Selective mobile cloud offloading to augment multi-persona performance and viability
H Tout, C Talhi, N Kara, A Mourad
IEEE Transactions on Cloud Computing, 2016
192016
Smart mobile computation offloading: Centralized selective and multi-objective approach
H Tout, C Talhi, N Kara, A Mourad
Expert Systems with Applications 80, 1-13, 2017
182017
Combining heterogeneous anomaly detectors for improved software security
W Khreich, SS Murtaza, A Hamou-Lhadj, C Talhi
Journal of Systems and Software 137, 415-429, 2018
162018
Execution monitoring enforcement for limited-memory systems
C Talhi, N Tawbi, M Debbabi
Proceedings of the 2006 International Conference on Privacy, Security and …, 2006
162006
Security analysis of mobile Java
M Debbabi, M Saleh, C Talhi, S Zhioua
16th International Workshop on Database and Expert Systems Applications …, 2005
162005
A novel ad-hoc mobile edge cloud offering security services through intelligent resource-aware offloading
T Dbouk, A Mourad, H Otrok, H Tout, C Talhi
IEEE Transactions on Network and Service Management 16 (4), 1665-1680, 2019
122019
Security as a service for public cloud tenants (SaaS)
M Hawedi, C Talhi, H Boucheneb
Procedia computer science 130, 1025-1030, 2018
122018
Optimal placement of sequentially ordered virtual security appliances in the cloud
A Shameli-Sendi, Y Jarraya, M Fekih-Ahmed, M Pourzandi, C Talhi, ...
2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015
122015
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20