![]() | Up a level |
This graph maps the connections between all the collaborators of {}'s publications listed on this page.
Each link represents a collaboration on the same publication. The thickness of the link represents the number of collaborations.
Use the mouse wheel or scroll gestures to zoom into the graph.
You can click on the nodes and links to highlight them and move the nodes by dragging them.
Hold down the "Ctrl" key or the "⌘" key while clicking on the nodes to open the list of this person's publications.
A word cloud is a visual representation of the most frequently used words in a text or a set of texts. The words appear in different sizes, with the size of each word being proportional to its frequency of occurrence in the text. The more frequently a word is used, the larger it appears in the word cloud. This technique allows for a quick visualization of the most important themes and concepts in a text.
In the context of this page, the word cloud was generated from the publications of the author {}. The words in this cloud come from the titles, abstracts, and keywords of the author's articles and research papers. By analyzing this word cloud, you can get an overview of the most recurring and significant topics and research areas in the author's work.
The word cloud is a useful tool for identifying trends and main themes in a corpus of texts, thus facilitating the understanding and analysis of content in a visual and intuitive way.
Abusitta, A., Halabi, T., Bataineh, A. S., & Zulkernine, M. (2024, June). Generative Adversarial Networks for Robust Anomaly Detection in Noisy IoT Environments [Paper]. IEEE International Conference on Communications (ICC 2024), Denver, CO, USA. External link
Abusitta, A., de Carvalho, G. H. S., Abdul Wahab, O., Halabi, T., Fung, B. C. M., & Al Mamoori, S. (2023). Deep learning-enabled anomaly detection for IoT systems. Internet of Things, 21, 100656 (13 pages). External link
Abusitta, A., Halabi, T., & Abdul Wahab, O. (2021, August). ROBUST: Deep learning for malware detection under changing environments [Paper]. 1st Workshop on Adverse Impacts and Collateral Effects of Artificial Intelligence Technologies (AIofAI 2021), Montréal, Qc, Canada (13 pages). External link
Abusitta, A., Abdul Wahab, O., & Halabi, T. (2020). Deep learning for proactive cooperative malware detection system. (Report n° G-2020-23 EIW12). External link
Al Harbi, S., Halabi, T., & Bellaïche, M. (2020, December). Fog Computing Security Assessment for Device Authentication in the Internet of Things [Paper]. 22nd IEEE International Conference on High Performance Computing and Communications (HPCC 2020), 8th IEEE International Conference on Smart City (SmartCity 2020), and 6th IEEE International Conference on Data Science and Systems (DSSS 2020), Yanuca Island, Cuvu, Fiji. External link
Abusitta, A., Bellaïche, M., Dagenais, M., & Halabi, T. (2019). A deep learning approach for proactive multi-cloud cooperative intrusion detection system. Future Generation Computer Systems-the International Journal of Escience, 98, 308-318. External link
Bataineh, A. S., Zulkernine, M., Abusitta, A., & Halabi, T. (2024). Detecting Poisoning Attacks in Collaborative IDSs of Vehicular Networks Using XAI and Shapley Value. ACM Journal on Autonomous Transportation Systems, -. External link
Bellaïche, M., Abusitta, A., & Halabi, T. (2018, June). A cooperative game for online cloud federation formation based on security risk assessment [Paper]. 5th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud 2018) / 2018 4th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom 2018), Shanghai, China. External link
Erfan, F., Bellaïche, M., & Halabi, T. (2024, July). Efficient Detection of Selfish Mining Attacks on Large-Scale Blockchain Networks [Paper]. IEEE 24th International Conference on Software Quality, Reliability, and Security Companion (QRS-C), Cambridge, United Kingdom. External link
Erfan, F., Yahyatabar Arabi, M. E., Bellaïche, M., & Halabi, T. (2024, December). Advanced Smart Contract Vulnerability Detection Using Large Language Models [Paper]. 8th Cyber Security in Networking Conference (CSNet 2024), Paris, France. External link
Erfan, F., Bellaïche, M., & Halabi, T. (2022, August). Game-theoretic Designs for Blockchain-based IoT: Taxonomy and Research Directions [Paper]. IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS 2022), Newark, CA, USA. External link
Engoulou, R. G., Bellaïche, M., Halabi, T., & Pierre, S. (2019, February). A decentralized reputation management system for securing the internet of vehicles [Paper]. International Conference on Computing, Networking and Communications (ICNC 2019), Honolulu, HI, USA. External link
Halabi, T., Abusitta, A., Carvalho, G. H. S., & Fung, B. C. M. (2022, July). Incentivized Security-Aware Computation Offloading for Large-Scale Internet of Things Applications [Paper]. 7th International Conference on Smart and Sustainable Technologies (SpliTech 2022), Bol, Croatia (6 pages). External link
Halabi, T., Bellaïche, M., & Fung, B. C. M. (2022, November). Towards Adaptive Cybersecurity for Green IoT [Paper]. IEEE International Conference on Internet of Things and Intelligence Systems (IoTaIS 2022), Bali, Indonesia. External link
Halabi, T., Abdul Wahab, O., Al Mallah, R., & Zulkernine, M. (2021). Protecting the internet of vehicles against advanced persistent threats: A Bayesian Stackelberg game. IEEE Transactions on Reliability, 70(3), 970-985. External link
Halabi, T., Abdul Wahab, O., & Zulkernine, M. (2020, April). A game-theoretic approach for distributed attack mitigation in intelligent transportation systems [Paper]. IEEE/IFIP Network Operations and Management Symposium (NOMS 2020), Budapest, Hungary. External link
Halabi, T., & Bellaïche, M. (2020). Towards security-based formation of cloud federations: A game theoretical approach. IEEE Transactions on Cloud Computing, 8(3), 928-942. External link
Halabi, T., Bellaïche, M., & Abusitta, A. (2019, February). Toward secure resource allocation in mobile cloud computing : a matching game [Paper]. International Conference on Computing, Networking and Communications (ICNC 2019), Honolulu, HI, USA. External link
Halabi, T., & Bellaïche, M. (2019, June). Security Risk-Aware Resource Provisioning Scheme for Cloud Computing Infrastructures [Paper]. IEEE Conference on Communications and Network Security (CNS 2019), Washington, D.C., USA (9 pages). External link
Halabi, T., Bellaïche, M., & Abusitta, A. (2018, August). Online allocation of cloud resources based on security satisfaction [Paper]. 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering (Trustcom/BigDataSE 2018), New York, N.Y.. External link
Halabi, T. (2018). Security in Cloud Computing: Evaluation and Integration [Ph.D. thesis, École Polytechnique de Montréal]. Available
Halabi, T., Bellaïche, M., & Abusitta, A. (2018, June). Cloud security up for auction : a DSIC online mechanism for secure IaaS resource allocation [Paper]. Conference on Communications and Network Security (CSNET 2018), Paris, France (6 pages). External link
Halabi, T., & Bellaïche, M. (2018). A broker-based framework for standardization and management of cloud security-SLAs. Computers & Security, 75, 59-71. External link
Halabi, T., & Bellaïche, M. (2017, January). Evaluation and Selection of Cloud Security Services based on Multi-Criteria Analysis MCA [Paper]. International Conference on Computing, Networking and Communications (ICNC 2017), Silicon Valley, CA, USA. External link
Halabi, T., & Bellaïche, M. (2017, August). Service assignment in federated cloud environments based on multi-objective optimization of security [Paper]. 5th IEEE International Conference on Future Internet of Things and Cloud (FiCloud 2017), Prague, Czech Republic. External link
Halabi, T., & Bellaïche, M. (2017). Towards quantification and evaluation of security of Cloud Service Providers. Journal of Information Security and Applications, 33, 55-65. External link
Halabi, T., & Bellaïche, M. (2016). How to evaluate the defense against DoS and DDoS attacks in cloud computing: A survey and taxonomy. International Journal of Computer Science and Information Security, 14(12), 30111650 (10 pages). Unavailable
Khorramfar, M., Mtawa, Y. A., Abusitta, A., & Halabi, T. (2024, June). Credit-Based Client Selection for Resilient Model Aggregation in Federated Learning [Paper]. 59th Annual IEEE International Conference on Communications (ICC 2024), Denver, CO, USA. External link
Seifi, S., Beaubrun, R., Bellaïche, M., & Halabi, T. A Study on the Efficiency of Intrusion Detection Systems in IoT Networks [Paper]. 2023 International Conference on Computer, Information and Telecommunication Systems (CITS 2023), Genoa, Italy (8 pages). External link
Yassine, I., Halabi, T., & Bellaïche, M. (2021, December). Security risk assessment methodologies in the Internet of Things: Survey and taxonomy [Paper]. 21st IEEE International Conference on Software Quality, Reliability and Security (QRS-C 2021), Hainan, China. External link