Chamseddine Talhi

Chamseddine Talhi
Professeur
Degrees Dipl. d’ingénieur (Annaba, Algérie), M.Sc. (Constantine, Algérie), Ph.D. (Université Laval)
Office A-4497
Presentation

Département de génie logiciel et des TI

Research interests:

  • Information and Communications Technologies

Research areas:

  • Enbedded Systems Virtualization and Security
  • Intrusion Detection for Smartphones
  • Android Security
  • Cloud Security
  • Security Policies and Security Mechanisms
  • Digital Investigation
  • Model Driven Software Engineering
Publications: article

Publications: patent

Publications: article

Publications: article

Publications: conference_item
2019 IEEE International Conference on Blockchain (Blockchain)
Publications: article_nrp

Publications: article_nrp

Publications: conference_item
IEEE 1st International Conference on Decentralized Applications and Infrastructures (DAPPCON)
Publications: conference_item
2015 IFIP/IEEE International Symposium on Integrated Network Management (IM)
Publications: conference_item
The 14th International Conference on Future Networks and Communications (FNC)
Publications: conference_item
2015 IEEE 34th Symposium on Reliable Distributed Systems Workshop (SRDSW)
Publications: article

Publications: article

Publications: conference_item
2015 IFIP/IEEE International Symposium on Integrated Network Management (IM)
Publications: article

Publications: article

Publications: conference_item
The 14th International Conference on Future Networks and Communications (FNC)
Publications: conference_item
International Conference on Software Engineering and Information Management (ICSIM) and its Workshop International Conference on Big Data and Smart Computing (ICBDSC)
Publications: article

Publications: conference_item
Trust Management VII : 7th IFIP WG 11.11 International Conference, IFIPTM 2013, Malaga, Spain, June 3-7, 2013. Proceedings
Publications: article

Publications: article

Publications: article

Publications: conference_item
2012 Seventh International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)
Publications: conference_item
2012 7th International Conference on Malicious and Unwanted Software (MALWARE)
Publications: conference_item
Computer Applications for Software Engineering, Disaster Recovery, and Business Continuity : International Conferences, ASEA and DRBC 2012, Held in Conjunction with GST 2012, Jeju Island, Korea, November 28-December 2, 2012. Proceedings
Publications: conference_item
International Symposium on Networks, Computers and Communications (ISNCC)
Publications: article

Publications: conference_item
Proceedings of 2nd ICNGCCT 2015
Publications: article

Publications: conference_item
IEEE International Conference on Blockchain and Cryptocurrency (ICBC)
Publications: article

Publications: article

Publications: conference_item
2012 10th Annual International Conference on Privacy, Security and Trust (PST 2012)
Publications: article

Publications: conference_item
Proceedings of the 30th Annual ACM Symposium on Applied Computing
Publications: conference_item
Enhanced Quality of Life and Smart Living : 15th International Conference, ICOST 2017, Paris, France, August 29-31, 2017, Proceedings
Publications: article

Publications: conference_item
2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC)
Publications: article

Publications: conference_item
IEEE 4th International Conference on Cyber-Security and Cloud Computing (CSCloud)
Publications: article

Publications: conference_item
International Symposium on Networks, Computers and Communications (ISNCC)
Publications: conference_item
12th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
Publications: article

Publications: article

Publications: article

Publications: conference_item
Proceedings of the 3rd International Symposium on Principles and Practice of Programming in Java
Publications: conference_item
Proceedings of the 3rd International Symposium on Principles and Practice of Programming in Java
Publications: article

Publications: article

Publications: conference_item
2015 IEEE Trustcom/BigDataSE/ISPA
Publications: conference_item
Mobile Web Information Systems : 11th International Conference, MobiWIS 2014, Barcelona, Spain, August 27-29, 2014. Proceedings
Publications: conference_item
2014 IEEE International Conference on Cloud Engineering (IC2E)
Publications: conference_item
ICSENT 2013: The 2nd International Conference on Software Engineering and New Technologies
Publications: conference_item
9th International Conference on Ambient Systems, Networks and Technologies (ANT 2018) / The 8th International Conference on Sustainable Energy Information Technology (SEIT-2018)
Publications: article

Publications: article

Publications: article

Publications: conference_item
International Symposium on Networks, Computers and Communications (ISNCC)
Publications: conference_item
International Symposium on Networks, Computers and Communications (ISNCC)
Publications: article

Publications: article

Publications: conference_item
4th International Conference on Software-Defined Systems (SDS)
Publications: article

Publications: book_section
Software Engineering Research, Management and Applications
Publications: book

Publications: article

Publications: article

Publications: article

Publications: conference_item
CASCON '19: Proceedings of the 29th Annual International Conference on Computer Science and Software Engineering
Courses and support services

Courses

MGR850 Sécurité de l'Internet (Summer 2022)
LOG460 Sécurité des logiciels (Winter 2022)
LOG460 Sécurité des logiciels (Fall 2021)

Assistance to students

Projet d'intervention en entreprise à 15 crédits

    Co-directed by: Sellam, Yoann
    Sélection d’un cadre de référence de Cybersécurité, évaluation de la posture et élaboration d’une feuille de route, by Bélanger,Guillaume.
    Summer 2020

    Co-directed by: Sao, Nicolas
    Solution de sécurisation de secret dans un cloud hybride, by Malenfer-Henard,Vincent.
    Fall 2020

    Co-directed by: Proulx, Sylvain
    Étude et intégration d’outils de détection de vulnérabilités dans un pipeline DevOps, by Klopfenstein,Luc.
    Summer 2019

    Co-directed by: Haoues, Mohamed
    Utiliser DLP pour contrer la fuite de données dans un contexte d'entreprise, by Diamedo,Liam.
    Summer 2019

    Co-directed by: Sefsaf, Faouzi
    Mise en place d'un système de management de la sécurité de l'information (SMSI), by Crouzet,Maxime.
    Winter 2014

    Co-directed by: Beaumier, François
    Solution d'auto-scaling pour une plate-forme d'exécution basée sur Mesos et Marathon, by Marcoux,Jean-François.
    Summer 2016

    Co-directed by: Lavoie, Jean-François
    Déploiement, ingénierie détaillé d'infrastructure et de réseau filaire, by Imadali,Safia.
    Fall 2022

    Co-directed by: Piasco, Cédric
    La gestion conjointe de la disponibilité et de la sécurité des applications d'entreprise, by Mahamedi,Abdelhamid.
    Summer 2022

    Co-directed by: Caya, François
    Conformance Testing for Precision Time Protocol Transparent Clock (PTP-TC) in ACCEDIAN VCX product, by El Brak,Said.
    Summer 2019

    Co-directed by: Kipepo Kimbo, Yannick
    Déploiement du réseau et configuration des équipements Juniper par automatisation, by Bensitel,Marouane.
    Fall 2018

Projet d'application à 15 crédits

    Audit de sécurité des systèmes d’informations Cas des réseaux définis par logiciel SDN, by Chahed,Rida.
    Summer 2020

    Sécurité et dépoiement de réseaux virtuels VNE, by Zerouki,Ahmed.
    Fall 2022

    Two Factor Authentication, by Kerdali,Tahar.
    Fall 2019

    Détection automatique des vulnérabilités d'une application Web en mode Devops, by Mejdi,Redouane.
    Winter 2020

    Environnement d'enseignement de la cyber sécurité et Pentest, by Ramoo,Prahveer Kumar.
    Summer 2020

    Vers un mécanisme de détection d'intrusion pour les téléphones intelligents, by Nicot,Sébastien.
    Winter 2011

    Lutte efficace contre le spam, by Kouadio,Konan Pacome.
    Winter 2015

    Surveillance d'applications malveillantes sur les téléphones intelligents, by Yepndjouo,Alain Aime.
    Winter 2012

    Détection d'attaques distribuées de déni de service dans le réseaux 3G et 4G, by Techini,Ahmed.
    Winter 2012

    Système d'analyse du comportement des réseaux basé sur un système détection d'intrusion, by Almanza Latorre,Jorge.
    Fall 2011

    Monitorage du réseau pour la détection de SPAMS, by Kouakou,Clement.
    Summer 2012

    Gouvernance des réseaux pour le renforcement de la sécurité, by Gaye,Séybani.
    Winter 2012

    Sécurisation d'un réseau virtuel utilisant un système de détection d'intrusion (snort) et politiques de sécurité, by Cols Mejia,Jose German.
    Winter 2013

    Étude des attaques DOS dans les réseaux WLAN: vulnérabilités, risques et contre-mesures, by Tao,Kadjogbola.
    Winter 2013

    Vulnérabilités et attaques dans IMs, by El Abass,Mohamed El Bechir.
    Winter 2013

    Mise en place d'un programme de sensibilisation des employés aux défis de la cybersécurité : Cas de l'entreprise Cooper Inc., by Donkou Tchapgang,Bayard Ferry.
    Fall 2019

    Réplication de données pour la reprise d'activités après sinistre, by Ayoub,Brahim.
    Summer 2014

    Profilage des ressources des smartphones pour une adaptation en temps-réel des mécanismes de détection d'anomalies, by De Talhouët,Alexis.
    Fall 2014

    Clustering de systèmes embarqués ARM en se basant sur les conteneurs Linux, by Gueye,Mouhamad Fadel.
    Fall 2016

    Évaluation des performances des conteneurs Linux sur des systèmes à ressources limitées, by Kandja,Eric Mutakana.
    Fall 2017

    Framework de test d'intrusion comme service TAAS dans un environnement info nuage, by Gueye,Khadim.
    Fall 2016

    Framwork pour le développement des applications SAAS Multitenants, by Hassairi,Mohamed.
    Winter 2016

    Solutions multilocataires SDN-Openflow en utilisant le contrôleur POX, by Messemen,Walid.
    Winter 2016

    Infrastructure fondée sur l'émulation permettant l'évaluation de la performance des réseaux SDN-Openflow, by Torrealba Macho,Enrique.
    Fall 2016

    Service de fonctions réseau virtualisées (VNF) dans un environnement multilocataire, by Sampin,Emmanuel.
    Fall 2016

    Gestion des Switch virtuels pour le partage d'infrastructures réseau, by Bahjaoui,Yassine.
    Winter 2017

    Pentesting dans un environnement simulé et contre-mesure de sécurité, by Ngueyon Kemayou,Christelle.
    Winter 2019

    Intégration optimale de réseaux virtuels sous contraintes de sécurité, by Aissani,Amar.
    Summer 2022

    La sécurité dans les Software Defined Network (SDN) et les réseaux 5G basés sur SDN, by Chapelet,Alexis.
    Summer 2021

    Implémentation et évaluation des IDS basés conteneurs sur les plateformes IoT, by Bouklioua,Abderrahmane.
    Summer 2018

    Étude et rétro-ingénierie d'exploits root kernel Android, by Porcher,Hugo.
    Winter 2018

    Automatisation intelligente pour la mise en échelle des PODS dans une plateforme kubernetes, by Zouaoui,Ala.
    Summer 2019

    Analyse de données pour la détection de Malwares, by Faivre,Hugo.
    Summer 2019

    Étude des systèmes de détection d'intrusion et des pentesting, by Jirari,Zakaria.
    Winter 2019

    P-Code Based Classification to Detect Malicious VBA Macro, by Huneault-LeBlanc,Simon.
    Winter 2019

    La sécurité des réseaux définis par logiciel, by Hakkani,Mohamed Fayçal.
    Summer 2020

    Détection des vulnérabilités des contrôleurs SDN, by Hadj Moussa,Khaled.
    Fall 2020

    Collecte efficace de données pour une authentification continue des utilisateurs, by Farhat,Oussama.
    Fall 2020

    Développement d’un module d’extension DevSecOps sur Jenkins, by Djabri,Chiheb.
    Fall 2022

Mémoire à 30 crédits

    Apprentissage fédéré pour la détection des intrusions, by Ayed,Mohamed Ali.
    Winter 2022

    Intégration optimale de réseau virtuel dans les environnements multi-domaines sous contraintes de sécurité, by Fedaouche,Amal.
    Fall 2021

    Co-directed by: Talhi, Chamseddine
    Détection des rootkits niveau noyau basée sur LTTNG, by Slaimia,Tarek.
    Summer 2015

    Co-directed by: Cheriet, Mohamed
    Towards Flexible, Scalable and Autonomic Virtual Tenant Slices, by Fekih Ahmed,Mohamed.
    Winter 2015

    Securing Enterprise Systems Data on Smart Devices, by Elserngawy,Mohamed.
    Winter 2015

    Co-directed by: Hamou-Lhadj, Abdelwahab
    Détection d'anomalies basée sur l'hôte, pour les systèmes à ressources limitées, by Ben Attia,Maroua.
    Summer 2015

    Co-directed by: Hamou-Lhadj, Abdelwahab
    Accélération des traitements de la sécurité mobile avec le calcul parallèle, by Abdellatif,Manel.
    Winter 2016

    Co-directed by: El boussaidi, Ghizlane
    Solution centralisée de contrôle d'accès basée sur la réécriture d'applications pour la plateforme Android, by Boudar,Oussama.
    Winter 2016

    Mise en place d'un cluster de systèmes ARM pour des solutions de sécurité, by Zagdene,Ghassen.
    Winter 2016

    Un système de collecte télémétrique pour NFV sur une plateforme Kubernetes au niveau d’un mini-centre de données, by Turki,Assia.
    Summer 2021

    Coretic : Nouvelle écriture des règles pour améliorer l'isolation et la composition en SDN, by Kaba,Moussa.
    Winter 2018

    APSL : Langage de spécification des politiques de sécurité basées sur le contexte pour le contrôle des applications Android, by Elarbi,Mahdi.
    Winter 2018

    Privacy-Preserving Framework for Smart Home using Attribute Based Encryption, by Chowdhury,Rasel.
    Summer 2018

    Un apprentissage fédéré avec une sélection de clients pour la détection d’intrusions réseau, by Bououdina,Selma.
    Fall 2019

    Apprentissage automatique optimisé pour des systèmes de détection d'intrusion efficaces, by Besner,Marc-André.
    Summer 2022

    Analyse des requêtes http pour la détection d'intrusion web, by Lagrini,Othmane.
    Fall 2021

    Framework de gestion des chaînes de services déployées sur une passerelle IoT, by Abdi,Ramy.
    Summer 2019

    Co-directed by: Zhang, Kaiwen
    Monétisation à l'aide des chaînes de blocs pour les marchés de données de l'Internet des Objets, by Badreddine,Wiem.
    Summer 2020

    Co-directed by: Talhi, Chamseddine
    Un modèle de tokenisation basé sur la chaîne de blocs pour la traçabilité et la conformité de la collecte de données, by Chouchane,Alaeddine.
    Summer 2020

    Co-directed by: Ouni, Ali
    Ingénierie qualité logicielle et sécurité pour Dockers : Un cadre pour les métriques de qualité et de sécurité logicielles dans environnement docker, by Alezy,Francener.
    Summer 2022

Thèse de doctorat (recherche appliquée)

    Co-directed by: Mourad, Azzam
    Monitoring and Orchestration of Cloud Native IP Multimedia Subsystem (IMS) Virtual Network Functions (VNFs), by Chowdhury,Rasel.
    Fall 2022

    Co-directed by: Talhi, Chamseddine
    Anomaly Detection System Using System Calls for Android Smartphone System, by Amamra,Abdelfattah.
    Winter 2015

    Co-directed by: Talhi, Chamseddine
    Context and Resource Aware Cloud-Based Solution for Efficent and Scalable Multi-Persona Mobile Computing, by Tout,Hanine.
    Winter 2018

    Co-directed by: Boucheneb, Hanifa
    Event-Driven Multi-Tenant Intrusion Detection System, by Hawedi,Mohamed Omran Ali.
    Fall 2019

    Co-directed by: Mourad, Azzam
    Rewriting Android Applications to Enforce Security Policies, by Inshi,Saad.
    Fall 2022

    Confidentiality and Privacy on Constrained Devices: Optimization Using Heuristic and Machine Learning Algorithms, by Bany Taha,Mohammad Mustafa Mousa.
    Winter 2020

    Co-directed by: Talhi, Chamseddine
    Dataset Generation and Machine Learning Approaches for Android Malware Detection, by Namrud,Zakeya.
    Winter 2022

    Co-directed by: Mourad, Azzam
    Efficient Security Mechanisms for the Internet of Things, by Alkhalidy,Muhsen.
    Fall 2022

    Co-directed by: Mourad, Azzam
    Adaptive Client Selection and Upgrade of Resources for Robust Federated Learning, by Abdul Rahman,Sawsan.
    Summer 2022

    Co-directed by: Mourad, Azzam
    Multimodal Behavioral Continuous Authentication Based on Activity Recognition, by Wazzeh,Mohamad.
    Fall 2022

    Co-directed by: Mourad, Azzam
    Federated Learning Model Based Contribution Calculation Optimization, by Dabberni,Mohamad Arfah.
    Fall 2022

    Co-directed by: Talhi, Chamseddine
    Performance modeling, analysis and tuning of blockchain networks, by Shahsavari,Yahya.
    Summer 2022

    Co-directed by: Talhi, Chamseddine
    Differential Privacy for Federated Learning in the Context of Wireless Ad-hoc Networks, by Meftah,Aida.
    Fall 2022

Rapport technique à 6 crédits

    Analyse de risques de la plateforme Android, by Men,Molin.
    Fall 2011

    Configuration d'un coupe feu pour la protection d'un réseau virtuel, by Dahmani,Jamal.
    Fall 2012

    Élaboration et évaluation d'un laboratoire de test d'intrusion, by Zerhouani,Abdelali.
    Winter 2019

    Révolution et évolution du contrôleur SDN (Opendaylight), by Laribi,Souad.
    Winter 2016

    Co-directed by: Aimeur, Esma
    Gestionnaire de la vie privée dans le contexte de Feedback, by Hadjeres,Djamel.
    Summer 2015

    Implantation d'un système de gestion des accès ; Access Control Server, by Dzefack,Mathurin.
    Winter 2015

    Architecture de données pour "maison intelligente", by Belarbi,Aghilas.
    Fall 2016

Stage industriel et rapport technique, 3 cr.

    Stagiaire/Assurance qualité logiciel, by Torrealba Macho,Enrique.
    Fall 2016

    Analyse de logiciels malveillants, by Porcher,Hugo.
    Winter 2018

    Assurance qualité logicielle - EMS, by Zouaoui,Ala.
    Summer 2019

    Assurance qualité logicielle (SQA) : développement des tests automatisés, by El Brak,Said.
    Summer 2019

    Analyste en sécurité des TI, by Diamedo,Liam.
    Summer 2019

Publications
Peer-reviewed article published in a refereed journal (33)

Yahya Shahsavari, Kaiwen Zhang, Chamseddine Talhi. 2022. « A theoretical model for block propagation analysis in bitcoin network ». IEEE Transactions on Engineering Management. vol. 69 , nº 4. p. 1459-1476.

A. A. Al-daraiseh, R. Chowdhury, H. Ould-Slimane, C. Talhi, M. B. Taha. 2022. « Lightweight scheme for smart home environments using offloading technique ». International Journal of Communication Networks and Information Security. vol. 14 , nº 1. p. 11-18.

Mohammad Bany Taha, Chamseddine Talhi, Hakima Ould-Slimane, Saed Alrabaee. 2022. « TD-PSO: Task distribution approach based on particle swarm optimization for vehicular ad hoc network ». Transactions on Emerging Telecommunications Technologies. vol. 33 , nº 3. 24 p.

Zakeya Namrud, Sègla Kpodjedo, Ahmed Bali, Chamseddine Talhi. 2022. « Deep-layer clustering to identify permission usage patterns of Android app categories ». IEEE Access. vol. 10 p. 24240-24254.

Zakeya Namrud, Sègla Kpodjedo, Chamseddine Talhi, Ahmed Bali, Alvine Boaye Belle. 2021. « Deep learning based android anomaly detection using a combination of vulnerabilities dataset ». Applied Sciences. vol. 11 , nº 16. 18 p.

Sawsan AbdulRahman, Hanine Tout, Azzam Mourad, Chamseddine Talhi. 2021. « FedMCCS: multicriteria client selection model for optimal IoT federated learning ». IEEE Internet of Things Journal. vol. 8 , nº 6. p. 4723-4735.

Sawsan Abdulrahman, Hanine Tout, Hakima Ould-Slimane, Azzam Mourad, Chamseddine Talhi, Mohsen Guizani. 2021. « A survey on federated learning: The journey from centralized to distributed on-site learning and beyond ». IEEE Internet of Things Journal. vol. 8 , nº 7. p. 5476-5497.

Hanine Tout, Azzam Mourad, Nadjia Kara, Chamseddine Talhi. 2021. « Multi-persona mobility: Joint cost-effective and resource-aware mobile-edge computation offloading ». IEEE/ACM Transactions on Networking. vol. 29 , nº 3. p. 1408-1421.

Mohamed Yassin, Hakima Ould-slimane, Chamseddine Talhi, Hanifa Boucheneb. 2021. « Multi-tenant intrusion detection framework as a service for SaaS ». IEEE Transactions on Services Computing. 14 p. (In press)

Namrud Zakeya, Kpodjedo Ségla, Talhi Chamseddine, Boaye Belle Alvine. 2021. « Probing AndroVul dataset for studies on Android malware classification ». Journal of King Saud University - Computer and Information Sciences. (In press)

Sawsan Abdul Rahman, Hanine Tout, Chamseddine Talhi, Azzam Mourad. 2020. « Internet of things intrusion detection: Centralized, on-device, or federated learning? ». IEEE Network. vol. 34 , nº 6. p. 310-317.

Mohammad Bany Taha, Hakima Ould-Slimane, Chamseddine Talhi. 2020. « Smart offloading technique for CP-ABE encryption schemes in constrained devices ». SN Applied Sciences. vol. 2 , nº 2.

Hanine Tout, Nadja Kara, Chamseddine Talhi, Azzam Mourad. 2019. « Proactive machine learning-based solution for advanced manageability of multi-persona mobile computing ». Computers and Electrical Engineering. vol. 80 18 p.

Hanine Tout, Chamseddine Talhi, Nadja Kara, Azzam Mourad. 2019. « Selective mobile cloud offloading to augment multi-persona performance and viability ». IEEE Transactions on Cloud Computing. vol. 7 , nº 2. p. 314-328.

Mohamed Yassin, Chamseddine Talhi, Hanifa Boucheneb. 2019. « ITADP: an inter-tenant attack detection and prevention framework for multi-tenant SaaS ». Journal of Information Security and Applications. vol. 49 p. 94-108.

Toufic Dbouk, Azzam Mourad, Hadi Otrok, Hanine Tout, Chamseddine Talhi. 2019. « A novel ad-hoc mobile edge cloud offering security services through intelligent resource-aware offloading ». IEEE Transactions on Network and Service Management. vol. 16 , nº 4. p. 1665-1680.

Mohamed Hawedi, Chamseddine Talhi, Hanifa Boucheneb. 2018. « Multi-tenant intrusion detection system for public cloud (MTIDS) ». Journal of Supercomputing. vol. 74 , nº 10. p. 5199-5230.

Wael Khreich, Syed Shariyar Murtaza, Abdelwahab Hamou-Lhadj, Chamseddine Talhi. 2018. « Combining heterogeneous anomaly detectors for improved software security ». Journal of Systems and Software. vol. 137 p. 415-429.

Hanine Tout, Chamseddine Talhi, Nadjia Kara, Azzam Mourad. 2017. « Smart mobile computation offloading: Centralized selective and multi-objective approach ». Expert Systems with Applications. vol. 80 p. 1-13.

Wael Khreich, Babak Khosravifar, Abdelwahab Hamou-Lhadj, Chamseddine Talhi. 2017. « An anomaly detection system based on variable N-gram features and one-class SVM ». Information and Software Technology. vol. 91 p. 186-197.

Abdelfattah Amamra, Jean-Marc Robert, Andrien Abraham, Chamseddine Talhi. 2016. « Generative versus discriminative classifiers for android anomaly-based detection system using system calls filtering and abstraction process ». Security and Communication Networks. vol. 9 , nº 16. p. 3483-3495.

Azzam Mourad, Hanine Tout, Chamseddine Talhi, Hadi Otrok, Hamdi Yahyaoui. 2016. « From model-driven specification to design-level set-based analysis of XACML policies ». Computers & Electrical Engineering. vol. 52 p. 65-79.

Abdelfattah Amamra, Jean-Marc Robert, Chamseddine Talhi. 2015. « Enhancing malware detection for Android systems using a system call filtering and abstraction process ». Security and Communication Networks. vol. 8 , nº 7. p. 1179-1192.

Hanine Tout, Azzam Mourad, Chamseddine Talhi, Hadi Otrok. 2015. « AOMD approach for context-adaptable and conflict-free Web services composition ». Computers and Electrical Engineering. vol. 44 p. 200-217.

Chamseddine Talhi, D. Mouheb, V. Lima, Mourad Debbabi, L. Wang, M. Pourzandi. 2009. « Usability of security specification approaches for UML design: A survey ». The Journal of Object Technology. vol. 8 , nº 6. p. 103-122.

S. M. Hejazi, C. Talhi, M. Debbabi. 2009. « Extraction of forensically sensitive information from windows physical memory ». Digital Investigation. vol. 6 , nº suppl.. p. S121-S131.

V. Lima, C. Talhi, D. Mouheb, M. Debbabi, L. Wang, Makan Pourzandi. 2009. « Formal verification and validation of UML 2.0 sequence diagrams using source and destination of messages ». Electronic Notes in Theoretical Computer Science. vol. 254 p. 143-160.

Chamseddine Talhi, Nadia Tawbi, Mourad Debbabi. 2008. « Execution monitoring enforcement under memory-limitation constraints ». Information and Computation. vol. 206 , nº 2-4. p. 158-184.

Seyed Mahmood Hejazi, Mourad Debbabi, Chamseddine Talhi. 2008. « Automated windows memory file extraction for cyber forensics investigation ». Journal of Digital Forensic Practice. vol. 2 , nº 3. p. 117-131.

M. Debbabi, M. Saleh, C. Talhi, S. Zhioua. 2006. « Vulnerability analysis of J2ME CLDC security ». The US DoD information assurance newsletter. vol. 9 , nº 2. p. 18-24.

Mourad Debbabi, Mohamend Saleh, Chamseddine Talhi, Sami Zhioua. 2006. « Security evaluation of J2ME CLDC embedded java platform ». The Journal of Object Technology. vol. 5 , nº 2. p. 125-154.

M. Debbabi, A. Mourad, C. Talhi, H. Yahyaoui. 2005. « Accelerating embedded Java for mobile devices ». IEEE Communications Magazine. vol. 43 , nº 9. p. 80-85.

Mourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Hamdi Yahyaoui, Sami Zhioua, Nadia Tawbi. 2005. « E-Bunny: A Dynamic Compiler for Embedded Java Virtual Machines ». The Journal of Object Technology. vol. 4 , nº 1. p. 83-106.

Conference proceeding (33)

Mohamed Ali Ayed, Chamseddine Talhi. 2021. « Federated learning for anomaly-based intrusion detection ». International Symposium on Networks, Computers and Communications (ISNCC) (Dubai, UAE, Oct. 31-Nov. 02, 2021) Institute of Electrical and Electronics Engineers Inc..

Wiem Badreddine, Zhang Kaiwen, Chamseddine Talhi. 2020. « Monetization using blockchains for IoT data marketplace ». IEEE International Conference on Blockchain and Cryptocurrency (ICBC) (Toronto, ON, Canada, May 02-06, 2020) Piscataway, NJ, USA : IEEE.

Rasel Chowdhury, Chamseddine Talhi, Hakima Ould-Slimane, Azzam Mourad. 2020. « A framework for automated monitoring and orchestration of cloud-native applications ». International Symposium on Networks, Computers and Communications (ISNCC) (Montréal, QC, Canada, Oct. 20-22, 2020) IEEE.

Simon Huneault-Leblanc, Chamseddine Talhi. 2020. « P-Code based classification to detect malicious VBA macro ». International Symposium on Networks, Computers and Communications (ISNCC) (Montreal, QC, Canada, Oct. 20-22, 2020) IEEE.

Saad Inshi, Rasel Chowdhury, Mahdi Elarbi, Hakima Ould-Slimane, Chamseddine Talhi. 2020. « LCA-ABE: Lightweight context-aware encryption for android applications ». International Symposium on Networks, Computers and Communications (ISNCC) (Montreal, QC, Canada, Oct. 20-22, 2020) IEEE.

Zakeya Namrud, Sègla Kpodjedo, Chamseddine Talhi. 2020. « AndroVul: A repository for android security vulnerabilities ». CASCON '19: Proceedings of the 29th Annual International Conference on Computer Science and Software Engineering (Toronto, ON, Canada, Nov. 04-06, 2019) p. 64-71. Center for Advanced Studies on Collaborative Research.

Yahya Shahsavari, Kaiwen Zhang, Chamseddine Talhi. 2019. « A theoretical model for fork analysis in the bitcoin network ». 2019 IEEE International Conference on Blockchain (Blockchain) (Atlanta, GA, USA, July 14-17, 2019) p. 237-244. IEEE.

Yahya Shahsavari, Kaiwen Zhang, Chamseddine Talhi. 2019. « Performance modeling and analysis of the bitcoin inventory protocol ». IEEE 1st International Conference on Decentralized Applications and Infrastructures (DAPPCON) (Newark, CA, USA, Apr. 5-9, 2019) p. 79-88. IEEE.

Mohammad Bany Taha, Chamseddine Talhi, Hakima Ould-Slimane. 2019. « Performance evaluation of CP-ABE schemes under constrained devices ». The 14th International Conference on Future Networks and Communications (FNC) (Halifax, NS, Canada, Aug. 19-21, 2019) p. 425-432. Elsevier B.V..

Mohammad Bany Taha, Chamseddine Talhi, Hakima Ould-Slimanec. 2019. « A cluster of CP-ABE microservices for VANET ». The 14th International Conference on Future Networks and Communications (FNC) (Halifax, NS, Canada, Aug. 19-21, 2019) p. 441-448. Elsevier B.V..

Ashraf Tahat, Ruba Aburub, Aseel Al-Zyoude, Chamseddine Talhi. 2018. « A smart city environmental monitoring network and analysis relying on big data techniques ». International Conference on Software Engineering and Information Management (ICSIM) and its Workshop International Conference on Big Data and Smart Computing (ICBDSC) (Casablanca, Morocco, Jan. 04-06, 2018) p. 82-86. Association for Computing Machinery.

Mohamed Hawedi, Chamseddine Talhi, Hafina Boucheneb. 2018. « Security as a service for public cloud tenants (SaaS) ». 9th International Conference on Ambient Systems, Networks and Technologies (ANT 2018) / The 8th International Conference on Sustainable Energy Information Technology (SEIT-2018) (Porto, Portugal, May 08-11, 2018) p. 1025-1030.

Rasel Chowdhury, Hakima Ould-Slimane, Chamseddine Talhi, Mohamed Cheriet. 2017. « Attribute-based encryption for preserving smart home data privacy ». Enhanced Quality of Life and Smart Living : 15th International Conference, ICOST 2017, Paris, France, August 29-31, 2017, Proceedings (Paris, France, Aug. 29-31, 2017) p. 185-197. Springer Verlag.

Mohamed Yassin, Hakima Ould-Slimane, Chamseddine Talhi, Hanifa Boucheneb. 2017. « SQLIIDaaS: A SQL injection intrusion detection framework as a service for SaaS providers ». IEEE 4th International Conference on Cyber-Security and Cloud Computing (CSCloud) (New York, NY, USA, June 26-28, 2017) p. 163-170. IEEE Computer Society.

Abderrahmane Ledjiar, Emmanuel Sampin, Chamseddine Talhi, Mohamed Cheriet. 2017. « Network function virtualization as a service for multi-tenant software defined networks ». 4th International Conference on Software-Defined Systems (SDS) (Valencia, Spain, May, 08-11 2017) p. 168-173. Piscataway, NJ, USA : IEEE.

Toufic Dbouk, Azzam Mourad, Hadi Otrok, Chamseddine Talhi. 2016. « Towards ad-hoc cloud based approach for mobile intrusion detection ». 12th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) (New York, NY, USA, Oct. 17-19, 2016) Piscataway, NJ, USA : IEEE.

Alireza Shameli-Sendi, Yosr Jarraya, Mohamed Fekih-Ahmed, Makan Pourzandi, Chamseddine Talhi, Mohamed Cheriet. 2015. « Optimal placement of sequentially ordered virtual security appliances in the cloud ». 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM) (Ottawa, ON, Canada, May 11-15, 2015) p. 818-821. Piscataway, NJ, USA : IEEE.

Manel Abdellatif, Chamseddine Talhi, Abdelwahab Hamou-Lhadj, Michel Dagenais. 2015. « On the use of mobile GPU for accelerating malware detection using trace analysis ». 2015 IEEE 34th Symposium on Reliable Distributed Systems Workshop (SRDSW) (Montreal, QC, Canada, Sept. 28-Oct. 1, 2015) p. 42-46. Los Alamitos, CA, USA : IEEE Computer Society.

Mohamed Fekih Ahmed, Chamseddine Talhi, Mohamed Cheriet. 2015. « Towards flexible, scalable and autonomic virtual tenant slices ». 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM) (Ottawa, ON, Canada, May 11-15, 2015) p. 720-726. Piscataway, NJ, USA : IEEE.

Hanine Tout, Azzam Mourad, Chamseddine Talhi. 2015. « Model-driven specification and design-level analysis of XACML policies ». Proceedings of 2nd ICNGCCT 2015 (Dubai, United Arab Emirates, Apr. 22-23, 2015) Zeus International FZE.

Maroua Ben Attia, Chamseddine Talhi, Abdelwahab Hamou-Lhadj, Babak Khosravifar, Vincent Turpaud, Mario Couture. 2015. « On-device anomaly detection for resource-limited systems ». Proceedings of the 30th Annual ACM Symposium on Applied Computing (Salamanca, Spain, April 13-17, 2015) p. 548-554. ACM.

Hanine Tout, Chamseddine Talhi, Nadjia Kara, Azzam Mourad. 2015. « Towards an offloading approach that augments multi-persona performance and viability ». 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC) (Las Vegas, NV, USA, Jan. 9-12, 2015) p. 455-460. Piscataway, NJ, USA : IEEE.

Mohamed Ali El-Serngawy, Chamseddine Talhi. 2015. « CaptureMe: attacking the user credential in mobile banking applications ». 2015 IEEE Trustcom/BigDataSE/ISPA (Helsinki, Finland, Aug. 20-22, 2015) p. 924-933. Los Alamitos, CA, USA : IEEE Computer Society.

Mohamed Ali El-Serngawy, Chamseddine Talhi. 2014. « Securing business data on android smartphones ». Mobile Web Information Systems : 11th International Conference, MobiWIS 2014, Barcelona, Spain, August 27-29, 2014. Proceedings (Barcelona, Spain, Aug. 27-29, 2014) p. 218-232. Cham, Switzerland : Springer International Publishing.

Mohamed Fekih Ahmed, Chamseddine Talhi, Makan Pourzandi, Mohamed Cheriet. 2014. « A software-defined scalable and autonomous architecture for multi-tenancy ». 2014 IEEE International Conference on Cloud Engineering (IC2E) (Boston, MA, USA, Mar. 11-14, 2014) p. 568-573. Los Alamitos, CA, USA : IEEE Computer Society.

Abdelfattah Amamra, Chamseddine Talhi, Jean-Marc Robert. 2013. « Impact of Dataset Representation on Smartphone Malware Detection Performance ». Trust Management VII : 7th IFIP WG 11.11 International Conference, IFIPTM 2013, Malaga, Spain, June 3-7, 2013. Proceedings (Malaga, Spain, June 3-5, 2013) p. 166-176. Springer Berlin Heidelberg.

M. A. Fekih, C. Talhi, M. Pourzandi, M. Cheriet. 2013. « Virtual data center scalability using open flow controller ». ICSENT 2013: The 2nd International Conference on Software Engineering and New Technologies (Hammamet, Tunisia, Dec. 21-23, 2013)

Abdelfattah Amamra, Chamseddine Talhi, Jean-Marc Robert. 2012. « Performance evaluation of multi-pattern matching algorithms on smartphone ». 2012 Seventh International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA) (Victoria, BC, Canada, Nov. 12-14, 2012) p. 329-334. Washington, DC : IEEE Computer Society.

Abdelfattah Amamra, Chamseddine Talhi, Jean-Marc Robert. 2012. « Smartphone malware detection: From a survey towards taxonomy ». 2012 7th International Conference on Malicious and Unwanted Software (MALWARE) (Fajardo, PR, USA, Oct. 16-18, 2012) p. 79-86. Piscataway, NJ : IEEE Computer Society.

Abdelfattah Amamra, Chamseddine Talhi, Jean-Marc Robert, Martin Hamiche. 2012. « Enhancing smartphone malware detection performance by applying machine learning hybrid classifiers ». Computer Applications for Software Engineering, Disaster Recovery, and Business Continuity : International Conferences, ASEA and DRBC 2012, Held in Conjunction with GST 2012, Jeju Island, Korea, November 28-December 2, 2012. Proceedings (Republic of Jeju Island, Korea, Nov. 28-Dec. 2, 2012) p. 131-137. Berlin Heidelberg : Springer Verlag.

Hanine Tout, Azzam Mourad, Hamdi Yahyaoui, Chamseddine Talhi, Hadi Otrok. 2012. « Towards a BPEL model-driven approach for web services security ». 2012 10th Annual International Conference on Privacy, Security and Trust (PST 2012) (Paris, France, July 16-18, 2012) p. 120-127. IEEE Computer Society.

Mourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Nadia Twabi, Hamdi Yahyaoui, Sami Zhioua. 2004. « A dynamic compiler for embedded Java virtual machines ». Proceedings of the 3rd International Symposium on Principles and Practice of Programming in Java (Las Vegas, NV, USA, June 16-18, 2004) p. 100-106. Trinity College Dublin.

Mourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Hamdi Yahyaoui, Sami Zhioua. 2004. « A synergy between efficient interpretation and fast selective dynamic compilation for the acceleration of embedded Java virtual machines ». Proceedings of the 3rd International Symposium on Principles and Practice of Programming in Java (Las Vegas , NV, USA, June 16-18, 2004) p. 107-113. Trinity College Dublin.

Non-peer-reviewed article published in a journal or magazine (2)

Yahya Shahsavari, Kaiwen Zhang, Chamseddine Talhi. 2019-04-09. « Modeling Bitcoin Network Performance ». Substance ÉTS. vol.

Yahya Shahsavari, Kaiwen Zhang, Chamseddine Talhi. 2019-04-09. « Modélisation des performances du réseau Bitcoin ». Substance ÉTS. vol.

Patent (1)

Makan Pourzandi, Mohamed Fekih Ahmed, Mohamed Cheriet, Chamseddine Talhi. 2018-03-06. « Multi-tenant isolation in a cloud environment using software defined networking ».

Book (1)

Djedjiga Mouheb, Mourad Debbabi, Makan Pourzandi, Lingyu Wang, Mariam Nouh, Raha Ziarati, Dima Alhadidi, Chamseddine Talhi, Vitor Lima. 2015. « Aspect-Oriented Security Hardening of UML Design Models ». Springer International Publishing. 237 p.

Chapter of book (1)

D. Mouheb, Chamseddine Talhi, M. Nouh, V. Lima, M. Debbabi, Li-Ping Wang, M. Pourzandi. 2010. « Aspect-oriented modeling for representing and integrating security concerns in UML ». In Software Engineering Research, Management and Applications Coll. «Studies in Computational Intelligence», . p. 197-213. Springer Berlin / Heidelberg.

Awards and honors