Up a level |
Abusitta, A., de Carvalho, G. H. S., Abdul Wahab, O., Halabi, T., Fung, B. C. M., & Al Mamoori, S. (2023). Deep learning-enabled anomaly detection for IoT systems. Internet of Things, 21, 100656 (13 pages). External link
Halabi, T., & Bellaïche, M. (2020). Towards security-based formation of cloud federations: A game theoretical approach. IEEE Transactions on Cloud Computing, 8(3), 928-942. External link
Abusitta, A., Bellaïche, M., Dagenais, M., & Halabi, T. (2019). A deep learning approach for proactive multi-cloud cooperative intrusion detection system. Future Generation Computer Systems-the International Journal of Escience, 98, 308-318. External link
Halabi, T., & Bellaïche, M. (2018). A broker-based framework for standardization and management of cloud security-SLAs. Computers & Security, 75, 59-71. External link
Halabi, T., & Bellaïche, M. (2017). Towards quantification and evaluation of security of Cloud Service Providers. Journal of Information Security and Applications, 33, 55-65. External link
Halabi, T., & Bellaïche, M. (2016). How to evaluate the defense against DoS and DDoS attacks in cloud computing: A survey and taxonomy. International Journal of Computer Science and Information Security, 14(12), 30111650 (10 pages). Unavailable
Seifi, S., Beaubrun, R., Bellaïche, M., & Halabi, T. A Study on the Efficiency of Intrusion Detection Systems in IoT Networks [Paper]. 2023 International Conference on Computer, Information and Telecommunication Systems (CITS 2023), Genoa, Italy (8 pages). External link
Erfan, F., Bellaïche, M., & Halabi, T. (2022, August). Game-theoretic Designs for Blockchain-based IoT: Taxonomy and Research Directions [Paper]. IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS 2022), Newark, CA, USA. External link
Halabi, T., Abusitta, A., Carvalho, G. H. S., & Fung, B. C. M. (2022, July). Incentivized Security-Aware Computation Offloading for Large-Scale Internet of Things Applications [Paper]. 7th International Conference on Smart and Sustainable Technologies (SpliTech 2022), Bol, Croatia (6 pages). External link
Halabi, T., Bellaïche, M., & Fung, B. C. M. (2022, November). Towards Adaptive Cybersecurity for Green IoT [Paper]. IEEE International Conference on Internet of Things and Intelligence Systems (IoTaIS 2022), Bali, Indonesia. External link
Abusitta, A., Halabi, T., & Abdul Wahab, O. (2021, August). ROBUST: Deep learning for malware detection under changing environments [Paper]. 1st Workshop on Adverse Impacts and Collateral Effects of Artificial Intelligence Technologies (AIofAI 2021), Montréal, Qc, Canada (13 pages). External link
Yassine, I., Halabi, T., & Bellaïche, M. (2021, December). Security risk assessment methodologies in the Internet of Things: Survey and taxonomy [Paper]. 21st IEEE International Conference on Software Quality, Reliability and Security (QRS-C 2021), Hainan, China. External link
Al Harbi, S., Halabi, T., & Bellaïche, M. (2020, December). Fog Computing Security Assessment for Device Authentication in the Internet of Things [Paper]. 22nd IEEE International Conference on High Performance Computing and Communications (HPCC 2020), 8th IEEE International Conference on Smart City (SmartCity 2020), and 6th IEEE International Conference on Data Science and Systems (DSSS 2020), Yanuca Island, Cuvu, Fiji. External link
Halabi, T., Bellaïche, M., & Abusitta, A. (2019, February). Toward secure resource allocation in mobile cloud computing : a matching game [Paper]. International Conference on Computing, Networking and Communications (ICNC 2019), Honolulu, HI, USA. External link
Engoulou, R. G., Bellaïche, M., Halabi, T., & Pierre, S. (2019, February). A decentralized reputation management system for securing the internet of vehicles [Paper]. International Conference on Computing, Networking and Communications (ICNC 2019), Honolulu, HI, USA. External link
Halabi, T., & Bellaïche, M. (2019, June). Security Risk-Aware Resource Provisioning Scheme for Cloud Computing Infrastructures [Paper]. IEEE Conference on Communications and Network Security (CNS 2019), Washington, D.C., USA (9 pages). External link
Halabi, T., Bellaïche, M., & Abusitta, A. (2018, August). Online allocation of cloud resources based on security satisfaction [Paper]. 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering (Trustcom/BigDataSE 2018), New York, N.Y.. External link
Halabi, T., Bellaïche, M., & Abusitta, A. (2018, June). Cloud security up for auction : a DSIC online mechanism for secure IaaS resource allocation [Paper]. Conference on Communications and Network Security (CSNET 2018), Paris, France (6 pages). External link
Bellaïche, M., Abusitta, A., & Halabi, T. (2018, June). A cooperative game for online cloud federation formation based on security risk assessment [Paper]. 5th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud 2018) / 2018 4th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom 2018), Shanghai, China. External link
Halabi, T., & Bellaïche, M. (2017, January). Evaluation and Selection of Cloud Security Services based on Multi-Criteria Analysis MCA [Paper]. International Conference on Computing, Networking and Communications (ICNC 2017), Silicon Valley, CA, USA. External link
Halabi, T. (2018). Security in Cloud Computing: Evaluation and Integration [Ph.D. thesis, École Polytechnique de Montréal]. Available
Abusitta, A., Abdul Wahab, O., & Halabi, T. (2020). Deep learning for proactive cooperative malware detection system. (Report n° G-2020-23 EIW12). External link