Chamseddine Talhi
Chamseddine Talhi
Professor
Verified email at etsmtl.ca
Title
Cited by
Cited by
Year
Formal verification and validation of UML 2.0 sequence diagrams using source and destination of messages
V Lima, C Talhi, D Mouheb, M Debbabi, L Wang, M Pourzandi
Electronic Notes in Theoretical Computer Science 254, 143-160, 2009
832009
Multi-tenant isolation in a cloud environment using software defined networking
M Pourzandi, MF Ahmed, M Cheriet, C Talhi
US Patent 9,912,582, 2018
762018
Extraction of forensically sensitive information from windows physical memory
SM Hejazi, C Talhi, M Debbabi
digital investigation 6, S121-S131, 2009
552009
Execution monitoring enforcement under memory-limitation constraints
C Talhi, N Tawbi, M Debbabi
Information and Computation 206 (2-4), 158-184, 2008
522008
Smartphone malware detection: From a survey towards taxonomy
A Amamra, C Talhi, JM Robert
2012 7th International Conference on Malicious and Unwanted Software, 79-86, 2012
492012
An anomaly detection system based on variable N-gram features and one-class SVM
W Khreich, B Khosravifar, A Hamou-Lhadj, C Talhi
Information and Software Technology 91, 186-197, 2017
402017
Security evaluation of J2ME CLDC embedded Java platform.
M Debbabi, M Saleh, C Talhi, S Zhioua
J. Object Technol. 5 (2), 125-154, 2006
382006
Weaving security aspects into UML 2.0 design models
D Mouheb, C Talhi, V Lima, M Debbabi, L Wang, M Pourzandi
Proceedings of the 13th workshop on Aspect-oriented modeling, 7-12, 2009
262009
Aspect-oriented modeling for representing and integrating security concerns in UML
D Mouheb, C Talhi, M Nouh, V Lima, M Debbabi, L Wang, M Pourzandi
Software Engineering Research, Management and Applications 2010, 197-213, 2010
252010
A dynamic compiler for embedded Java virtual machines
M Debbabi, A Gherbi, L Ketari, C Talhi, N Twabi, H Yahyaoui, S Zhioua
Trinity College Dublin, 2004
242004
Usability of security specification approaches for UML design: A survey.
C Talhi, D Mouheb, V Lima, M Debbabi, L Wang, M Pourzandi
J. Object Technol. 8 (6), 102-122, 2009
222009
Java for mobile devices: A security study
M Debbabi, M Saleh, C Talhi, S Zhioua
21st Annual Computer Security Applications Conference (ACSAC'05), 10 pp.-244, 2005
222005
Selective mobile cloud offloading to augment multi-persona performance and viability
H Tout, C Talhi, N Kara, A Mourad
IEEE Transactions on Cloud Computing, 2016
182016
Combining heterogeneous anomaly detectors for improved software security
W Khreich, SS Murtaza, A Hamou-Lhadj, C Talhi
Journal of Systems and Software 137, 415-429, 2018
162018
Smart mobile computation offloading: Centralized selective and multi-objective approach
H Tout, C Talhi, N Kara, A Mourad
Expert Systems with Applications 80, 1-13, 2017
162017
Execution monitoring enforcement for limited-memory systems
C Talhi, N Tawbi, M Debbabi
Proceedings of the 2006 International Conference on Privacy, Security and …, 2006
162006
Security analysis of mobile Java
M Debbabi, M Saleh, C Talhi, S Zhioua
16th International Workshop on Database and Expert Systems Applications …, 2005
162005
Security as a service for public cloud tenants (SaaS)
M Hawedi, C Talhi, H Boucheneb
Procedia computer science 130, 1025-1030, 2018
112018
Optimal placement of sequentially ordered virtual security appliances in the cloud
A Shameli-Sendi, Y Jarraya, M Fekih-Ahmed, M Pourzandi, C Talhi, ...
2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015
112015
Enhancing smartphone malware detection performance by applying machine learning hybrid classifiers
A Amamra, C Talhi, JM Robert, M Hamiche
Computer applications for software engineering, disaster recovery, and …, 2012
112012
The system can't perform the operation now. Try again later.
Articles 1–20