Name
Affiliation
Papers
CHAMSEDDINE TALHI
concordia university wisconsin
49
Collaborators
Citations 
PageRank 
64
192
23.98
Referers 
Referees 
References 
496
1154
525
Search Limit
1001000
Title
Citations
PageRank
Year
FedMCCS: Multicriteria Client Selection Model for Optimal IoT Federated Learning80.472021
A Survey on Federated Learning: The Journey From Centralized to Distributed On-Site Learning and Beyond150.712021
Multi-Persona Mobility: Joint Cost-Effective and Resource-Aware Mobile-Edge Computation Offloading30.362021
Internet of Things Intrusion Detection: Centralized, On-Device, or Federated Learning?110.552020
LCA-ABE: Lightweight Context-Aware Encryption for Android Applications00.342020
ITADP: An inter-tenant attack detection and prevention framework for multi-tenant SaaS00.342019
Machine Learning-Based EDoS Attack Detection Technique Using Execution Trace Analysis.00.342019
Proactive machine learning-based solution for advanced manageability of multi-persona mobile computing.00.342019
Selective Mobile Cloud Offloading to Augment Multi-Persona Performance and Viability20.352019
A Novel Ad-Hoc Mobile Edge Cloud Offering Security Services Through Intelligent Resource-Aware Offloading10.352019
Multi-tenant intrusion detection system for public cloud (MTIDS).10.352018
Security as a Service for Public Cloud Tenants(SaaS).00.342018
Combining heterogeneous anomaly detectors for improved software security.30.382018
Smart mobile computation offloading: Centralized selective and multi-objective approach.10.342017
Attribute-Based Encryption for Preserving Smart Home Data Privacy.00.342017
SQLIIDaaS: A SQL Injection Intrusion Detection Framework as a Service for SaaS Providers00.342017
An anomaly detection system based on variable N-gram features and one-class SVM.110.572017
Network Function Virtualization as a Service for multi-tenant software defined networks00.342017
Generative versus discriminative classifiers for android anomaly-based detection system using system calls filtering and abstraction process.20.362016
Towards ad-hoc cloud based approach for mobile intrusion detection00.342016
From model-driven specification to design-level set-based analysis of XACML policies.20.422016
On the Use of Mobile GPU for Accelerating Malware Detection Using Trace Analysis00.342015
Towards flexible, scalable and autonomic virtual tenant slices10.352015
AOMD approach for context-adaptable and conflict-free Web services composition.60.432015
Enhancing malware detection for Android systems using a system call filtering and abstraction process.20.642015
Towards an offloading approach that augments multi-persona performance and viability10.352015
CaptureMe: Attacking the User Credential in Mobile Banking Applications00.342015
Optimal Placement Of Sequentially Ordered Virtual Security Appliances In The Cloud30.392015
On-device anomaly detection for resource-limited systems20.402015
Securing Business Data on Android Smartphones.10.372014
Impact of Dataset Representation on Smartphone Malware Detection Performance.10.352013
Towards a BPEL model-driven approach for Web services security60.432012
Performance Evaluation of Multi-pattern Matching Algorithms on Smartphone20.422012
Smartphone malware detection: From a survey towards taxonomy120.552012
Aspect-Oriented Modeling for Representing and Integrating Security Concerns in UML120.562010
Weaving security aspects into UML 2.0 design models80.752009
An Aspect-Oriented Approach for Software Security Hardening: from Design to Implementation20.362009
Usability of Security Specification Approaches for UML Design: A Survey00.342009
Automated Windows Memory File Extraction for Cyber Forensics Investigation10.422008
Execution monitoring enforcement under memory-limitation constraints261.082008
Common Criteria Approach to J2ME CLDC Security Requirements00.342006
Security Evaluation Of J2me Cldc Embedded Java Platform112.262006
Execution monitoring enforcement for limited-memory systems50.422006
E-Bunny: A Dynamic Compiler For Embedded Java Virtual Machines50.702005
Java for Mobile Devices: A Security Study70.782005
Security Analysis of Wireless Java10.512005
Security Analysis of Mobile Java60.792005
A dynamic compiler for embedded Java virtual machines70.622004
a synergy between efficient interpretation and fast selective dynamic compilation for the acceleration of embedded Java virtual machines40.442004