A survey on federated learning: The journey from centralized to distributed on-site learning and beyond S AbdulRahman, H Tout, H Ould-Slimane, A Mourad, C Talhi, M Guizani IEEE Internet of Things Journal 8 (7), 5476-5497, 2020 | 638 | 2020 |
Internet of things intrusion detection: Centralized, on-device, or federated learning? SA Rahman, H Tout, C Talhi, A Mourad IEEE Network 34 (6), 310-317, 2020 | 333 | 2020 |
FedMCCS: Multicriteria client selection model for optimal IoT federated learning S AbdulRahman, H Tout, A Mourad, C Talhi IEEE Internet of Things Journal 8 (6), 4723-4735, 2020 | 256 | 2020 |
Multi-tenant isolation in a cloud environment using software defined networking M Pourzandi, MF Ahmed, M Cheriet, C Talhi US Patent 9,912,582, 2018 | 241 | 2018 |
An anomaly detection system based on variable N-gram features and one-class SVM W Khreich, B Khosravifar, A Hamou-Lhadj, C Talhi Information and Software Technology 91, 186-197, 2017 | 122 | 2017 |
Formal verification and validation of UML 2.0 sequence diagrams using source and destination of messages V Lima, C Talhi, D Mouheb, M Debbabi, L Wang, M Pourzandi Electronic notes in theoretical computer science 254, 143-160, 2009 | 101 | 2009 |
A novel ad-hoc mobile edge cloud offering security services through intelligent resource-aware offloading T Dbouk, A Mourad, H Otrok, H Tout, C Talhi IEEE Transactions on Network and Service Management 16 (4), 1665-1680, 2019 | 73 | 2019 |
A theoretical model for block propagation analysis in bitcoin network Y Shahsavari, K Zhang, C Talhi IEEE Transactions on Engineering Management 69 (4), 1459-1476, 2020 | 68 | 2020 |
Extraction of forensically sensitive information from windows physical memory SM Hejazi, C Talhi, M Debbabi digital investigation 6, S121-S131, 2009 | 68 | 2009 |
Smartphone malware detection: From a survey towards taxonomy A Amamra, C Talhi, JM Robert 2012 7th International Conference on Malicious and Unwanted Software, 79-86, 2012 | 63 | 2012 |
Execution monitoring enforcement under memory-limitation constraints C Talhi, N Tawbi, M Debbabi Information and Computation 206 (2-4), 158-184, 2008 | 61 | 2008 |
A theoretical model for fork analysis in the bitcoin network Y Shahsavari, K Zhang, C Talhi 2019 IEEE international conference on Blockchain (Blockchain), 237-244, 2019 | 59 | 2019 |
The metaverse: Survey, trends, novel pipeline ecosystem & future directions H Sami, A Hammoud, M Arafeh, M Wazzeh, S Arisdakessian, M Chahoud, ... IEEE Communications Surveys & Tutorials, 2024 | 47 | 2024 |
Selective mobile cloud offloading to augment multi-persona performance and viability H Tout, C Talhi, N Kara, A Mourad IEEE Transactions on Cloud Computing 7 (2), 314-328, 2016 | 39 | 2016 |
Combining heterogeneous anomaly detectors for improved software security W Khreich, SS Murtaza, A Hamou-Lhadj, C Talhi Journal of Systems and Software 137, 415-429, 2018 | 38 | 2018 |
Security evaluation of J2ME CLDC embedded Java platform. M Debbabi, MM Saleh, C Talhi, S Zhioua J. Object Technol. 5 (2), 125-154, 2006 | 38 | 2006 |
Performance modeling and analysis of the bitcoin inventory protocol Y Shahsavari, K Zhang, C Talhi 2019 IEEE International Conference on Decentralized Applications and …, 2019 | 37 | 2019 |
Security as a service for public cloud tenants (SaaS) M Hawedi, C Talhi, H Boucheneb Procedia computer science 130, 1025-1030, 2018 | 35 | 2018 |
Privacy-preserving continuous authentication for mobile and iot systems using warmup-based federated learning M Wazzeh, H Ould-Slimane, C Talhi, A Mourad, M Guizani IEEE Network 37 (3), 224-230, 2022 | 32 | 2022 |
Aspect-oriented modeling for representing and integrating security concerns in UML D Mouheb, C Talhi, M Nouh, V Lima, M Debbabi, L Wang, M Pourzandi Software Engineering Research, Management and Applications 2010, 197-213, 2010 | 30 | 2010 |