<  Retour au portail Polytechnique Montréal

Documents dont l'auteur est "Halabi, Talal"

Monter d'un niveau
Pour citer ou exporter [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Grouper par: Auteurs ou autrices | Date de publication | Sous-type de document | Aucun groupement
Nombre de documents: 22

Article de revue

Abusitta, A., de Carvalho, G. H. S., Abdul Wahab, O., Halabi, T., Fung, B. C. M., & Al Mamoori, S. (2023). Deep learning-enabled anomaly detection for IoT systems. Internet of Things, 21, 100656 (13 pages). Lien externe

Halabi, T., & Bellaïche, M. (2020). Towards security-based formation of cloud federations: A game theoretical approach. IEEE Transactions on Cloud Computing, 8(3), 928-942. Lien externe

Abusitta, A., Bellaïche, M., Dagenais, M., & Halabi, T. (2019). A deep learning approach for proactive multi-cloud cooperative intrusion detection system. Future Generation Computer Systems-the International Journal of Escience, 98, 308-318. Lien externe

Halabi, T., & Bellaïche, M. (2018). A broker-based framework for standardization and management of cloud security-SLAs. Computers & Security, 75, 59-71. Lien externe

Halabi, T., & Bellaïche, M. (2017). Towards quantification and evaluation of security of Cloud Service Providers. Journal of Information Security and Applications, 33, 55-65. Lien externe

Halabi, T., & Bellaïche, M. (2016). How to evaluate the defense against DoS and DDoS attacks in cloud computing: A survey and taxonomy. International Journal of Computer Science and Information Security, 14(12), 30111650 (10 pages). Non disponible

Communication écrite

Seifi, S., Beaubrun, R., Bellaïche, M., & Halabi, T. A Study on the Efficiency of Intrusion Detection Systems in IoT Networks [Communication écrite]. 2023 International Conference on Computer, Information and Telecommunication Systems (CITS 2023), Genoa, Italy (8 pages). Lien externe

Erfan, F., Bellaïche, M., & Halabi, T. (août 2022). Game-theoretic Designs for Blockchain-based IoT: Taxonomy and Research Directions [Communication écrite]. IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS 2022), Newark, CA, USA. Lien externe

Halabi, T., Abusitta, A., Carvalho, G. H. S., & Fung, B. C. M. (juillet 2022). Incentivized Security-Aware Computation Offloading for Large-Scale Internet of Things Applications [Communication écrite]. 7th International Conference on Smart and Sustainable Technologies (SpliTech 2022), Bol, Croatia (6 pages). Lien externe

Halabi, T., Bellaïche, M., & Fung, B. C. M. (novembre 2022). Towards Adaptive Cybersecurity for Green IoT [Communication écrite]. IEEE International Conference on Internet of Things and Intelligence Systems (IoTaIS 2022), Bali, Indonesia. Lien externe

Abusitta, A., Halabi, T., & Abdul Wahab, O. (août 2021). ROBUST: Deep learning for malware detection under changing environments [Communication écrite]. 1st Workshop on Adverse Impacts and Collateral Effects of Artificial Intelligence Technologies (AIofAI 2021), Montréal, Qc, Canada (13 pages). Lien externe

Yassine, I., Halabi, T., & Bellaïche, M. (décembre 2021). Security risk assessment methodologies in the Internet of Things: Survey and taxonomy [Communication écrite]. 21st IEEE International Conference on Software Quality, Reliability and Security (QRS-C 2021), Hainan, China. Lien externe

Al Harbi, S., Halabi, T., & Bellaïche, M. (décembre 2020). Fog Computing Security Assessment for Device Authentication in the Internet of Things [Communication écrite]. 22nd IEEE International Conference on High Performance Computing and Communications (HPCC 2020), 8th IEEE International Conference on Smart City (SmartCity 2020), and 6th IEEE International Conference on Data Science and Systems (DSSS 2020), Yanuca Island, Cuvu, Fiji. Lien externe

Halabi, T., Bellaïche, M., & Abusitta, A. (février 2019). Toward secure resource allocation in mobile cloud computing : a matching game [Communication écrite]. International Conference on Computing, Networking and Communications (ICNC 2019), Honolulu, HI, USA. Lien externe

Engoulou, R. G., Bellaïche, M., Halabi, T., & Pierre, S. (février 2019). A decentralized reputation management system for securing the internet of vehicles [Communication écrite]. International Conference on Computing, Networking and Communications (ICNC 2019), Honolulu, HI, USA. Lien externe

Halabi, T., & Bellaïche, M. (juin 2019). Security Risk-Aware Resource Provisioning Scheme for Cloud Computing Infrastructures [Communication écrite]. IEEE Conference on Communications and Network Security (CNS 2019), Washington, D.C., USA (9 pages). Lien externe

Halabi, T., Bellaïche, M., & Abusitta, A. (août 2018). Online allocation of cloud resources based on security satisfaction [Communication écrite]. 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering (Trustcom/BigDataSE 2018), New York, N.Y.. Lien externe

Halabi, T., Bellaïche, M., & Abusitta, A. (juin 2018). Cloud security up for auction : a DSIC online mechanism for secure IaaS resource allocation [Communication écrite]. Conference on Communications and Network Security (CSNET 2018), Paris, France (6 pages). Lien externe

Bellaïche, M., Abusitta, A., & Halabi, T. (juin 2018). A cooperative game for online cloud federation formation based on security risk assessment [Communication écrite]. 5th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud 2018) / 2018 4th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom 2018), Shanghai, China. Lien externe

Halabi, T., & Bellaïche, M. (janvier 2017). Evaluation and Selection of Cloud Security Services based on Multi-Criteria Analysis MCA [Communication écrite]. International Conference on Computing, Networking and Communications (ICNC 2017), Silicon Valley, CA, USA. Lien externe

Thèse de doctorat

Halabi, T. (2018). Security in Cloud Computing: Evaluation and Integration [Thèse de doctorat, École Polytechnique de Montréal]. Disponible

Autre

Abusitta, A., Abdul Wahab, O., & Halabi, T. (2020). Deep learning for proactive cooperative malware detection system. (Rapport n° G-2020-23 EIW12). Lien externe

Liste produite: Fri Apr 19 04:01:05 2024 EDT.