Chamseddine Talhi

Chamseddine Talhi
Professeur
Degrees Dipl. d’ingénieur (Annaba, Algérie), M.Sc. (Constantine, Algérie), Ph.D. (Université Laval)
Office A-4497
Presentation

Département de génie logiciel et des TI

Research interests:

  • Information and Communications Technologies

Research areas:

  • Enbedded Systems Virtualization and Security
  • Intrusion Detection for Smartphones
  • Android Security
  • Cloud Security
  • Security Policies and Security Mechanisms
  • Digital Investigation
  • Model Driven Software Engineering
Publications: conference_item
2015 IEEE 34th Symposium on Reliable Distributed Systems Workshop (SRDSW)
Publications: conference_item
2015 IFIP/IEEE International Symposium on Integrated Network Management (IM)
Publications: article

Publications: article

Publications: conference_item
Trust Management VII : 7th IFIP WG 11.11 International Conference, IFIPTM 2013, Malaga, Spain, June 3-7, 2013. Proceedings
Publications: conference_item
2012 Seventh International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)
Publications: conference_item
2012 7th International Conference on Malicious and Unwanted Software (MALWARE)
Publications: conference_item
Computer Applications for Software Engineering, Disaster Recovery, and Business Continuity : International Conferences, ASEA and DRBC 2012, Held in Conjunction with GST 2012, Jeju Island, Korea, November 28-December 2, 2012. Proceedings
Publications: conference_item
IEEE International Conference on Blockchain and Cryptocurrency (ICBC)
Publications: article

Publications: conference_item
Proceedings of the 30th Annual ACM Symposium on Applied Computing
Publications: conference_item
Enhanced Quality of Life and Smart Living : 15th International Conference, ICOST 2017, Paris, France, August 29-31, 2017, Proceedings
Publications: conference_item
International Symposium on Networks, Computers and Communications (ISNCC)
Publications: conference_item
12th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
Publications: article

Publications: article

Publications: article

Publications: conference_item
Proceedings of the 3rd International Symposium on Principles and Practice of Programming in Java
Publications: conference_item
Proceedings of the 3rd International Symposium on Principles and Practice of Programming in Java
Publications: article

Publications: article

Publications: conference_item
2015 IEEE Trustcom/BigDataSE/ISPA
Publications: conference_item
Mobile Web Information Systems : 11th International Conference, MobiWIS 2014, Barcelona, Spain, August 27-29, 2014. Proceedings
Publications: conference_item
2014 IEEE International Conference on Cloud Engineering (IC2E)
Publications: conference_item
ICSENT 2013: The 2nd International Conference on Software Engineering and New Technologies
Publications: conference_item
9th International Conference on Ambient Systems, Networks and Technologies (ANT 2018) / The 8th International Conference on Sustainable Energy Information Technology (SEIT-2018)
Publications: article

Publications: article

Publications: article

Publications: conference_item
International Symposium on Networks, Computers and Communications (ISNCC)
Publications: conference_item
International Symposium on Networks, Computers and Communications (ISNCC)
Publications: article

Publications: article

Publications: conference_item
4th International Conference on Software-Defined Systems (SDS)
Publications: article

Publications: book_section
Software Engineering Research, Management and Applications
Publications: book

Publications: article

Publications: conference_item
CASCON '19: Proceedings of the 29th Annual International Conference on Computer Science and Software Engineering
Publications: patent

Publications: article

Publications: article

Publications: conference_item
2019 IEEE International Conference on Blockchain (Blockchain)
Publications: article_nrp

Publications: article_nrp

Publications: conference_item
IEEE 1st International Conference on Decentralized Applications and Infrastructures (DAPPCON)
Publications: conference_item
2015 IFIP/IEEE International Symposium on Integrated Network Management (IM)
Publications: conference_item
The 14th International Conference on Future Networks and Communications (FNC)
Publications: conference_item
The 14th International Conference on Future Networks and Communications (FNC)
Publications: conference_item
International Conference on Software Engineering and Information Management (ICSIM) and its Workshop International Conference on Big Data and Smart Computing (ICBDSC)
Publications: article

Publications: article

Publications: article

Publications: conference_item
Proceedings of 2nd ICNGCCT 2015
Publications: article

Publications: conference_item
2012 10th Annual International Conference on Privacy, Security and Trust (PST 2012)
Publications: article

Publications: article

Publications: conference_item
2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC)
Publications: conference_item
IEEE 4th International Conference on Cyber-Security and Cloud Computing (CSCloud)
Publications: article

Courses and support services

Courses

LOG460 Sécurité des logiciels (Winter 2021)
MGR850 Sécurité de l'Internet (Winter 2021)
LOG460 Sécurité des logiciels (Fall 2020)

Assistance to students

Projet d'intervention en entreprise à 15 crédits

    Co-directed by: Sellam, Yoann
    Sélection d’un cadre de référence de Cybersécurité, évaluation de la posture et élaboration d’une feuille de route, by Bélanger,Guillaume.
    Summer 2020

    Co-directed by: Sao, Nicolas
    Solution de sécurisation de secret dans un cloud hybride, by Malenfer-Henard,Vincent.
    Fall 2020

    Co-directed by: Proulx, Sylvain
    Étude et intégration d’outils de détection de vulnérabilités dans un pipeline DevOps, by Klopfenstein,Luc.
    Summer 2019

    Co-directed by: Haoues, Mohamed
    Utiliser DLP pour contrer la fuite de données dans un contexte d'entreprise, by Diamedo,Liam.
    Summer 2019

    Co-directed by: Sefsaf, Faouzi
    Mise en place d'un système de management de la sécurité de l'information (SMSI), by Crouzet,Maxime.
    Winter 2014

    Co-directed by: Beaumier, François
    Solution d'auto-scaling pour une plate-forme d'exécution basée sur Mesos et Marathon, by Marcoux,Jean-François.
    Summer 2016

    Co-directed by: Caya, François
    Conformance Testing for Precision Time Protocol Transparent Clock (PTP-TC) in ACCEDIAN VCX product, by El Brak,Said.
    Summer 2019

    Co-directed by: Kipepo Kimbo, Yannick
    Déploiement du réseau et configuration des équipements Juniper par automatisation, by Bensitel,Marouane.
    Fall 2018

Projet d'application à 15 crédits

    Audit de sécurité des systèmes d’informations Cas des réseaux définis par logiciel SDN, by Chahed,Rida.
    Summer 2020

    Sécurité et dépoiement de réseaux virtuels VNE, by Zerouki,Ahmed.
    Summer 2021

    Two Factor Authentication, by Kerdali,Tahar.
    Fall 2019

    Détection automatique des vulnérabilités d'une application Web en mode Devops, by Mejdi,Redouane.
    Winter 2020

    Environnement d'enseignement de la cyber sécurité et Pentest, by Ramoo,Prahveer Kumar.
    Summer 2020

    Vers un mécanisme de détection d'intrusion pour les téléphones intelligents, by Nicot,Sébastien.
    Winter 2011

    Lutte efficace contre le spam, by Kouadio,Konan Pacome.
    Winter 2015

    Surveillance d'applications malveillantes sur les téléphones intelligents, by Yepndjouo,Alain Aime.
    Winter 2012

    Détection d'attaques distribuées de déni de service dans le réseaux 3G et 4G, by Techini,Ahmed.
    Winter 2012

    Système d'analyse du comportement des réseaux basé sur un système détection d'intrusion, by Almanza Latorre,Jorge.
    Fall 2011

    Monitorage du réseau pour la détection de SPAMS, by Kouakou,Clement.
    Summer 2012

    Gouvernance des réseaux pour le renforcement de la sécurité, by Gaye,Séybani.
    Winter 2012

    Sécurisation d'un réseau virtuel utilisant un système de détection d'intrusion (snort) et politiques de sécurité, by Cols Mejia,Jose German.
    Winter 2013

    Étude des attaques DOS dans les réseaux WLAN: vulnérabilités, risques et contre-mesures, by Tao,Kadjogbola.
    Winter 2013

    Vulnérabilités et attaques dans IMs, by El Abass,Mohamed El Bechir.
    Winter 2013

    Mise en place d'un programme de sensibilisation des employés aux défis de la cybersécurité : Cas de l'entreprise Cooper Inc., by Donkou Tchapgang,Bayard Ferry.
    Fall 2019

    Réplication de données pour la reprise d'activités après sinistre, by Ayoub,Brahim.
    Summer 2014

    Profilage des ressources des smartphones pour une adaptation en temps-réel des mécanismes de détection d'anomalies, by De Talhouët,Alexis.
    Fall 2014

    Clustering de systèmes embarqués ARM en se basant sur les conteneurs Linux, by Gueye,Mouhamad Fadel.
    Fall 2016

    Évaluation des performances des conteneurs Linux sur des systèmes à ressources limitées, by Kandja,Eric Mutakana.
    Fall 2017

    Framework de test d'intrusion comme service TAAS dans un environnement info nuage, by Gueye,Khadim.
    Fall 2016

    Framwork pour le développement des applications SAAS Multitenants, by Hassairi,Mohamed.
    Winter 2016

    Solutions multilocataires SDN-Openflow en utilisant le contrôleur POX, by Messemen,Walid.
    Winter 2016

    Infrastructure fondée sur l'émulation permettant l'évaluation de la performance des réseaux SDN-Openflow, by Torrealba Macho,Enrique.
    Fall 2016

    Service de fonctions réseau virtualisées (VNF) dans un environnement multilocataire, by Sampin,Emmanuel.
    Fall 2016

    Gestion des Switch virtuels pour le partage d'infrastructures réseau, by Bahjaoui,Yassine.
    Winter 2017

    Pentesting dans un environnement simulé et contre-mesure de sécurité, by Ngueyon Kemayou,Christelle.
    Winter 2019

    Implémentation et évaluation des IDS basés conteneurs sur les plateformes IoT, by Bouklioua,Abderrahmane.
    Summer 2018

    Étude et rétro-ingénierie d'exploits root kernel Android, by Porcher,Hugo.
    Winter 2018

    Automatisation intelligente pour la mise en échelle des PODS dans une plateforme kubernetes, by Zouaoui,Ala.
    Summer 2019

    Analyse de données pour la détection de Malwares, by Faivre,Hugo.
    Summer 2019

    Étude des systèmes de détection d'intrusion et des pentesting, by Jirari,Zakaria.
    Winter 2019

    P-Code Based Classification to Detect Malicious VBA Macro, by Huneault-LeBlanc,Simon.
    Winter 2019

    La sécurité des réseaux définis par logiciel, by Hakkani,Mohamed Fayçal.
    Summer 2020

    Détection des vulnérabilités des contrôleurs SDN, by Hadj Moussa,Khaled.
    Fall 2020

    Collecte efficace de données pour une authentification continue des utilisateurs, by Farhat,Oussama.
    Fall 2020

    Développement d’un module d’extension DevSecOps sur Jenkins, by Djabri,Chiheb.
    Winter 2021

Mémoire à 30 crédits

    Cycle de vie de systèmes de détection d'anomalies, by Ayed,Mohamed Ali.
    Winter 2021

    Méthodes heuristiques pour une gestion optimisée des infrastructures virtualisées, by Fedaouche,Amal.
    Winter 2021

    Analyse des requêtes http pour la détection d'intrusion web, by Lagrini,Othmane.
    Winter 2021

    Co-directed by: Talhi, Chamseddine
    Détection des rootkits niveau noyau basée sur LTTNG, by Slaimia,Tarek.
    Summer 2015

    Co-directed by: Cheriet, Mohamed
    Towards Flexible, Scalable and Autonomic Virtual Tenant Slices, by Fekih Ahmed,Mohamed.
    Winter 2015

    Securing Enterprise Systems Data on Smart Devices, by Elserngawy,Mohamed.
    Winter 2015

    Co-directed by: Hamou-Lhadj, Abdelwahab
    Détection d'anomalies basée sur l'hôte, pour les systèmes à ressources limitées, by Ben Attia,Maroua.
    Summer 2015

    Co-directed by: Hamou-Lhadj, Abdelwahab
    Accélération des traitements de la sécurité mobile avec le calcul parallèle, by Abdellatif,Manel.
    Winter 2016

    Co-directed by: El boussaidi, Ghizlane
    Solution centralisée de contrôle d'accès basée sur la réécriture d'applications pour la plateforme Android, by Boudar,Oussama.
    Winter 2016

    Mise en place d'un cluster de systèmes ARM pour des solutions de sécurité, by Zagdene,Ghassen.
    Winter 2016

    Coretic : Nouvelle écriture des règles pour améliorer l'isolation et la composition en SDN, by Kaba,Moussa.
    Winter 2018

    APSL : Langage de spécification des politiques de sécurité basées sur le contexte pour le contrôle des applications Android, by Elarbi,Mahdi.
    Winter 2018

    Privacy-Preserving Framework for Smart Home using Attribute Based Encryption, by Chowdhury,Rasel.
    Summer 2018

    Un apprentissage fédéré avec une sélection de clients pour la détection d’intrusions réseau, by Bououdina,Selma.
    Fall 2019

    Un système de collecte télémétrique pour NFV sur une plateforme Kubernetes au niveau d’un mini-centre de données, by Turki,Assia.
    Summer 2021

    Framework de gestion des chaînes de services déployées sur une passerelle IoT, by Abdi,Ramy.
    Summer 2019

    Co-directed by: Zhang, Kaiwen
    Monétisation à l'aide des chaînes de blocs pour les marchés de données de l'Internet des Objets, by Badreddine,Wiem.
    Summer 2020

    Co-directed by: Talhi, Chamseddine
    Un modèle de tokenisation basé sur la chaîne de blocs pour la traçabilité et la conformité de la collecte de données, by Chouchane,Alaeddine.
    Summer 2020

Thèse de doctorat (recherche appliquée)

    Co-directed by: Mourad, Azzam
    Monitoring and Orchestration of Cloud Native IP Multimedia Subsystem (IMS) Virtual Network Functions (VNFs), by Chowdhury,Rasel.
    Summer 2021

    Co-directed by: Talhi, Chamseddine
    Anomaly Detection System Using System Calls for Android Smartphone System, by Amamra,Abdelfattah.
    Winter 2015

    Co-directed by: Talhi, Chamseddine
    Context and Resource Aware Cloud-Based Solution for Efficent and Scalable Multi-Persona Mobile Computing, by Tout,Hanine.
    Winter 2018

    Co-directed by: Boucheneb, Hanifa
    Event-Driven Multi-Tenant Intrusion Detection System, by Hawedi,Mohamed Omran Ali.
    Fall 2019

    Co-directed by: Mourad, Azzam
    Rewriting Android Applications to Enforce Security Policies, by Inshi,Saad.
    Summer 2021

    Co-directed by: Cheriet, Mohamed
    Language-Based Security for Cloud Computing, by Ledjiar,Abderrahmane.
    Winter 2021

    Confidentiality and Privacy on Constrained Devices: Optimization Using Heuristic and Machine Learning Algorithms, by Bany Taha,Mohammad Mustafa Mousa.
    Winter 2020

    Co-directed by: Talhi, Chamseddine
    Detection of Malicious Mobile Apps Using Diagram Comparison and Machine Learning, by Namrud,Zakeya.
    Winter 2021

    Co-directed by: Mourad, Azzam
    Efficient Security Mechanisms for the Internet of Things, by Alkhalidy,Muhsen.
    Summer 2021

    Co-directed by: Mourad, Azzam
    Federated Learning for Managing loT Security Services, by Abdul Rahman,Sawsan.
    Summer 2021

    Co-directed by: Talhi, Chamseddine
    Performance modeling, analysis and tuning of blockchain networks, by Shahsavari,Yahya.
    Summer 2021

Rapport technique à 6 crédits

    Analyse de risques de la plateforme Android, by Men,Molin.
    Fall 2011

    Configuration d'un coupe feu pour la protection d'un réseau virtuel, by Dahmani,Jamal.
    Fall 2012

    Élaboration et évaluation d'un laboratoire de test d'intrusion, by Zerhouani,Abdelali.
    Winter 2019

    Révolution et évolution du contrôleur SDN (Opendaylight), by Laribi,Souad.
    Winter 2016

    Co-directed by: Aimeur, Esma
    Gestionnaire de la vie privée dans le contexte de Feedback, by Hadjeres,Djamel.
    Summer 2015

    Implantation d'un système de gestion des accès ; Access Control Server, by Dzefack,Mathurin.
    Winter 2015

    Architecture de données pour "maison intelligente", by Belarbi,Aghilas.
    Fall 2016

Stage industriel et rapport technique, 3 cr.

    Stagiaire/Assurance qualité logiciel, by Torrealba Macho,Enrique.
    Fall 2016

    Analyse de logiciels malveillants, by Porcher,Hugo.
    Winter 2018

    Assurance qualité logicielle - EMS, by Zouaoui,Ala.
    Summer 2019

    Assurance qualité logicielle (SQA) : développement des tests automatisés, by El Brak,Said.
    Summer 2019

    Analyste en sécurité des TI, by Diamedo,Liam.
    Summer 2019

Publications
Conference proceeding (32)

Wiem Badreddine, Zhang Kaiwen, Chamseddine Talhi. 2020. « Monetization using blockchains for IoT data marketplace ». IEEE International Conference on Blockchain and Cryptocurrency (ICBC) (Toronto, ON, Canada, May 02-06, 2020) Piscataway, NJ, USA : IEEE.

Rasel Chowdhury, Chamseddine Talhi, Hakima Ould-Slimane, Azzam Mourad. 2020. « A framework for automated monitoring and orchestration of cloud-native applications ». International Symposium on Networks, Computers and Communications (ISNCC) (Montréal, QC, Canada, Oct. 20-22, 2020) IEEE.

Simon Huneault-Leblanc, Chamseddine Talhi. 2020. « P-Code based classification to detect malicious VBA macro ». International Symposium on Networks, Computers and Communications (ISNCC) (Montreal, QC, Canada, Oct. 20-22, 2020) IEEE.

Saad Inshi, Rasel Chowdhury, Mahdi Elarbi, Hakima Ould-Slimane, Chamseddine Talhi. 2020. « LCA-ABE: Lightweight context-aware encryption for android applications ». International Symposium on Networks, Computers and Communications (ISNCC) (Montreal, QC, Canada, Oct. 20-22, 2020) IEEE.

Zakeya Namrud, Sègla Kpodjedo, Chamseddine Talhi. 2020. « AndroVul: A repository for android security vulnerabilities ». CASCON '19: Proceedings of the 29th Annual International Conference on Computer Science and Software Engineering (Toronto, ON, Canada, Nov. 04-06, 2019) p. 64-71. Center for Advanced Studies on Collaborative Research.

Yahya Shahsavari, Kaiwen Zhang, Chamseddine Talhi. 2019. « A theoretical model for fork analysis in the bitcoin network ». 2019 IEEE International Conference on Blockchain (Blockchain) (Atlanta, GA, USA, July 14-17, 2019) p. 237-244. IEEE.

Yahya Shahsavari, Kaiwen Zhang, Chamseddine Talhi. 2019. « Performance modeling and analysis of the bitcoin inventory protocol ». IEEE 1st International Conference on Decentralized Applications and Infrastructures (DAPPCON) (Newark, CA, USA, Apr. 5-9, 2019) p. 79-88. IEEE.

Mohammad Bany Taha, Chamseddine Talhi, Hakima Ould-Slimane. 2019. « Performance evaluation of CP-ABE schemes under constrained devices ». The 14th International Conference on Future Networks and Communications (FNC) (Halifax, NS, Canada, Aug. 19-21, 2019) p. 425-432. Elsevier B.V..

Mohammad Bany Taha, Chamseddine Talhi, Hakima Ould-Slimanec. 2019. « A cluster of CP-ABE microservices for VANET ». The 14th International Conference on Future Networks and Communications (FNC) (Halifax, NS, Canada, Aug. 19-21, 2019) p. 441-448. Elsevier B.V..

Mohamed Hawedi, Chamseddine Talhi, Hafina Boucheneb. 2018. « Security as a service for public cloud tenants (SaaS) ». 9th International Conference on Ambient Systems, Networks and Technologies (ANT 2018) / The 8th International Conference on Sustainable Energy Information Technology (SEIT-2018) (Porto, Portugal, May 08-11, 2018) p. 1025-1030.

Ashraf Tahat, Ruba Aburub, Aseel Al-Zyoude, Chamseddine Talhi. 2018. « A smart city environmental monitoring network and analysis relying on big data techniques ». International Conference on Software Engineering and Information Management (ICSIM) and its Workshop International Conference on Big Data and Smart Computing (ICBDSC) (Casablanca, Morocco, Jan. 04-06, 2018) p. 82-86. Association for Computing Machinery.

Rasel Chowdhury, Hakima Ould-Slimane, Chamseddine Talhi, Mohamed Cheriet. 2017. « Attribute-based encryption for preserving smart home data privacy ». Enhanced Quality of Life and Smart Living : 15th International Conference, ICOST 2017, Paris, France, August 29-31, 2017, Proceedings (Paris, France, Aug. 29-31, 2017) p. 185-197. Springer Verlag.

Abderrahmane Ledjiar, Emmanuel Sampin, Chamseddine Talhi, Mohamed Cheriet. 2017. « Network function virtualization as a service for multi-tenant software defined networks ». 4th International Conference on Software-Defined Systems (SDS) (Valencia, Spain, May, 08-11 2017) p. 168-173. Piscataway, NJ, USA : IEEE.

Mohamed Yassin, Hakima Ould-Slimane, Chamseddine Talhi, Hanifa Boucheneb. 2017. « SQLIIDaaS: A SQL injection intrusion detection framework as a service for SaaS providers ». IEEE 4th International Conference on Cyber-Security and Cloud Computing (CSCloud) (New York, NY, USA, June 26-28, 2017) p. 163-170. IEEE Computer Society.

Toufic Dbouk, Azzam Mourad, Hadi Otrok, Chamseddine Talhi. 2016. « Towards ad-hoc cloud based approach for mobile intrusion detection ». 12th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) (New York, NY, USA, Oct. 17-19, 2016) Piscataway, NJ, USA : IEEE.

Manel Abdellatif, Chamseddine Talhi, Abdelwahab Hamou-Lhadj, Michel Dagenais. 2015. « On the use of mobile GPU for accelerating malware detection using trace analysis ». 2015 IEEE 34th Symposium on Reliable Distributed Systems Workshop (SRDSW) (Montreal, QC, Canada, Sept. 28-Oct. 1, 2015) p. 42-46. Los Alamitos, CA, USA : IEEE Computer Society.

Mohamed Fekih Ahmed, Chamseddine Talhi, Mohamed Cheriet. 2015. « Towards flexible, scalable and autonomic virtual tenant slices ». 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM) (Ottawa, ON, Canada, May 11-15, 2015) p. 720-726. Piscataway, NJ, USA : IEEE.

Maroua Ben Attia, Chamseddine Talhi, Abdelwahab Hamou-Lhadj, Babak Khosravifar, Vincent Turpaud, Mario Couture. 2015. « On-device anomaly detection for resource-limited systems ». Proceedings of the 30th Annual ACM Symposium on Applied Computing (Salamanca, Spain, April 13-17, 2015) p. 548-554. ACM.

Mohamed Ali El-Serngawy, Chamseddine Talhi. 2015. « CaptureMe: attacking the user credential in mobile banking applications ». 2015 IEEE Trustcom/BigDataSE/ISPA (Helsinki, Finland, Aug. 20-22, 2015) p. 924-933. Los Alamitos, CA, USA : IEEE Computer Society.

Alireza Shameli-Sendi, Yosr Jarraya, Mohamed Fekih-Ahmed, Makan Pourzandi, Chamseddine Talhi, Mohamed Cheriet. 2015. « Optimal placement of sequentially ordered virtual security appliances in the cloud ». 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM) (Ottawa, ON, Canada, May 11-15, 2015) p. 818-821. Piscataway, NJ, USA : IEEE.

Hanine Tout, Azzam Mourad, Chamseddine Talhi. 2015. « Model-driven specification and design-level analysis of XACML policies ». Proceedings of 2nd ICNGCCT 2015 (Dubai, United Arab Emirates, Apr. 22-23, 2015) Zeus International FZE.

Hanine Tout, Chamseddine Talhi, Nadjia Kara, Azzam Mourad. 2015. « Towards an offloading approach that augments multi-persona performance and viability ». 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC) (Las Vegas, NV, USA, Jan. 9-12, 2015) p. 455-460. Piscataway, NJ, USA : IEEE.

Mohamed Ali El-Serngawy, Chamseddine Talhi. 2014. « Securing business data on android smartphones ». Mobile Web Information Systems : 11th International Conference, MobiWIS 2014, Barcelona, Spain, August 27-29, 2014. Proceedings (Barcelona, Spain, Aug. 27-29, 2014) p. 218-232. Cham, Switzerland : Springer International Publishing.

Mohamed Fekih Ahmed, Chamseddine Talhi, Makan Pourzandi, Mohamed Cheriet. 2014. « A software-defined scalable and autonomous architecture for multi-tenancy ». 2014 IEEE International Conference on Cloud Engineering (IC2E) (Boston, MA, USA, Mar. 11-14, 2014) p. 568-573. Los Alamitos, CA, USA : IEEE Computer Society.

Abdelfattah Amamra, Chamseddine Talhi, Jean-Marc Robert. 2013. « Impact of Dataset Representation on Smartphone Malware Detection Performance ». Trust Management VII : 7th IFIP WG 11.11 International Conference, IFIPTM 2013, Malaga, Spain, June 3-7, 2013. Proceedings (Malaga, Spain, June 3-5, 2013) p. 166-176. Springer Berlin Heidelberg.

M. A. Fekih, C. Talhi, M. Pourzandi, M. Cheriet. 2013. « Virtual data center scalability using open flow controller ». ICSENT 2013: The 2nd International Conference on Software Engineering and New Technologies (Hammamet, Tunisia, Dec. 21-23, 2013)

Abdelfattah Amamra, Chamseddine Talhi, Jean-Marc Robert. 2012. « Performance evaluation of multi-pattern matching algorithms on smartphone ». 2012 Seventh International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA) (Victoria, BC, Canada, Nov. 12-14, 2012) p. 329-334. Washington, DC : IEEE Computer Society.

Abdelfattah Amamra, Chamseddine Talhi, Jean-Marc Robert. 2012. « Smartphone malware detection: From a survey towards taxonomy ». 2012 7th International Conference on Malicious and Unwanted Software (MALWARE) (Fajardo, PR, USA, Oct. 16-18, 2012) p. 79-86. Piscataway, NJ : IEEE Computer Society.

Abdelfattah Amamra, Chamseddine Talhi, Jean-Marc Robert, Martin Hamiche. 2012. « Enhancing smartphone malware detection performance by applying machine learning hybrid classifiers ». Computer Applications for Software Engineering, Disaster Recovery, and Business Continuity : International Conferences, ASEA and DRBC 2012, Held in Conjunction with GST 2012, Jeju Island, Korea, November 28-December 2, 2012. Proceedings (Republic of Jeju Island, Korea, Nov. 28-Dec. 2, 2012) p. 131-137. Berlin Heidelberg : Springer Verlag.

Hanine Tout, Azzam Mourad, Hamdi Yahyaoui, Chamseddine Talhi, Hadi Otrok. 2012. « Towards a BPEL model-driven approach for web services security ». 2012 10th Annual International Conference on Privacy, Security and Trust (PST 2012) (Paris, France, July 16-18, 2012) p. 120-127. IEEE Computer Society.

Mourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Nadia Twabi, Hamdi Yahyaoui, Sami Zhioua. 2004. « A dynamic compiler for embedded Java virtual machines ». Proceedings of the 3rd International Symposium on Principles and Practice of Programming in Java (Las Vegas, NV, USA, June 16-18, 2004) p. 100-106. Trinity College Dublin.

Mourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Hamdi Yahyaoui, Sami Zhioua. 2004. « A synergy between efficient interpretation and fast selective dynamic compilation for the acceleration of embedded Java virtual machines ». Proceedings of the 3rd International Symposium on Principles and Practice of Programming in Java (Las Vegas , NV, USA, June 16-18, 2004) p. 107-113. Trinity College Dublin.

Peer-reviewed article published in a refereed journal (24)

Mohammad Bany Taha, Chamseddine Talhi, Hakima Ould-Slimane, Saed Alrabaee. 2020. « TD-PSO: Task distribution approach based on particle swarm optimization for vehicular ad hoc network ». Transactions on Emerging Telecommunications Technologies. 24 p. (In press)

Sawsan Abdul Rahman, Hanine Tout, Chamseddine Talhi, Azzam Mourad. 2020. « Internet of things intrusion detection: Centralized, on-device, or federated learning? ». IEEE Network. vol. 34 , nº 6. p. 310-317.

Yahya Shahsavari, Kaiwen Zhang, Chamseddine Talhi. 2020. « A theoretical model for block propagation analysis in bitcoin network ». IEEE Transactions on Engineering Management. 18 p. (In press)

Toufic Dbouk, Azzam Mourad, Hadi Otrok, Hanine Tout, Chamseddine Talhi. 2019. « A novel ad-hoc mobile edge cloud offering security services through intelligent resource-aware offloading ». IEEE Transactions on Network and Service Management. vol. 16 , nº 4. p. 1665-1680.

Hanine Tout, Nadja Kara, Chamseddine Talhi, Azzam Mourad. 2019. « Proactive machine learning-based solution for advanced manageability of multi-persona mobile computing ». Computers and Electrical Engineering. vol. 80 18 p.

Hanine Tout, Chamseddine Talhi, Nadja Kara, Azzam Mourad. 2019. « Selective mobile cloud offloading to augment multi-persona performance and viability ». IEEE Transactions on Cloud Computing. vol. 7 , nº 2. p. 314-328.

Mohamed Yassin, Chamseddine Talhi, Hanifa Boucheneb. 2019. « ITADP: an inter-tenant attack detection and prevention framework for multi-tenant SaaS ». Journal of Information Security and Applications. vol. 49 p. 94-108.

Mohamed Hawedi, Chamseddine Talhi, Hanifa Boucheneb. 2018. « Multi-tenant intrusion detection system for public cloud (MTIDS) ». Journal of Supercomputing. vol. 74 , nº 10. p. 5199-5230.

Wael Khreich, Syed Shariyar Murtaza, Abdelwahab Hamou-Lhadj, Chamseddine Talhi. 2018. « Combining heterogeneous anomaly detectors for improved software security ». Journal of Systems and Software. vol. 137 p. 415-429.

Wael Khreich, Babak Khosravifar, Abdelwahab Hamou-Lhadj, Chamseddine Talhi. 2017. « An anomaly detection system based on variable N-gram features and one-class SVM ». Information and Software Technology. vol. 91 p. 186-197.

Hanine Tout, Chamseddine Talhi, Nadjia Kara, Azzam Mourad. 2017. « Smart mobile computation offloading: Centralized selective and multi-objective approach ». Expert Systems with Applications. vol. 80 p. 1-13.

Abdelfattah Amamra, Jean-Marc Robert, Andrien Abraham, Chamseddine Talhi. 2016. « Generative versus discriminative classifiers for android anomaly-based detection system using system calls filtering and abstraction process ». Security and Communication Networks. vol. 9 , nº 16. p. 3483-3495.

Azzam Mourad, Hanine Tout, Chamseddine Talhi, Hadi Otrok, Hamdi Yahyaoui. 2016. « From model-driven specification to design-level set-based analysis of XACML policies ». Computers & Electrical Engineering. vol. 52 p. 65-79.

Abdelfattah Amamra, Jean-Marc Robert, Chamseddine Talhi. 2015. « Enhancing malware detection for Android systems using a system call filtering and abstraction process ». Security and Communication Networks. vol. 8 , nº 7. p. 1179-1192.

Hanine Tout, Azzam Mourad, Chamseddine Talhi, Hadi Otrok. 2015. « AOMD approach for context-adaptable and conflict-free Web services composition ». Computers and Electrical Engineering. vol. 44 p. 200-217.

S. M. Hejazi, C. Talhi, M. Debbabi. 2009. « Extraction of forensically sensitive information from windows physical memory ». Digital Investigation. vol. 6 , nº suppl.. p. S121-S131.

V. Lima, C. Talhi, D. Mouheb, M. Debbabi, L. Wang, Makan Pourzandi. 2009. « Formal verification and validation of UML 2.0 sequence diagrams using source and destination of messages ». Electronic Notes in Theoretical Computer Science. vol. 254 p. 143-160.

Chamseddine Talhi, D. Mouheb, V. Lima, Mourad Debbabi, L. Wang, M. Pourzandi. 2009. « Usability of security specification approaches for UML design: A survey ». The Journal of Object Technology. vol. 8 , nº 6. p. 103-122.

Seyed Mahmood Hejazi, Mourad Debbabi, Chamseddine Talhi. 2008. « Automated windows memory file extraction for cyber forensics investigation ». Journal of Digital Forensic Practice. vol. 2 , nº 3. p. 117-131.

Chamseddine Talhi, Nadia Tawbi, Mourad Debbabi. 2008. « Execution monitoring enforcement under memory-limitation constraints ». Information and Computation. vol. 206 , nº 2-4. p. 158-184.

M. Debbabi, M. Saleh, C. Talhi, S. Zhioua. 2006. « Vulnerability analysis of J2ME CLDC security ». The US DoD information assurance newsletter. vol. 9 , nº 2. p. 18-24.

Mourad Debbabi, Mohamend Saleh, Chamseddine Talhi, Sami Zhioua. 2006. « Security evaluation of J2ME CLDC embedded java platform ». The Journal of Object Technology. vol. 5 , nº 2. p. 125-154.

M. Debbabi, A. Mourad, C. Talhi, H. Yahyaoui. 2005. « Accelerating embedded Java for mobile devices ». IEEE Communications Magazine. vol. 43 , nº 9. p. 80-85.

Mourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Hamdi Yahyaoui, Sami Zhioua, Nadia Tawbi. 2005. « E-Bunny: A Dynamic Compiler for Embedded Java Virtual Machines ». The Journal of Object Technology. vol. 4 , nº 1. p. 83-106.

Non-peer-reviewed article published in a journal or magazine (2)

Yahya Shahsavari, Kaiwen Zhang, Chamseddine Talhi. 2019-04-09. « Modeling Bitcoin Network Performance ». Substance ÉTS. vol.

Yahya Shahsavari, Kaiwen Zhang, Chamseddine Talhi. 2019-04-09. « Modélisation des performances du réseau Bitcoin ». Substance ÉTS. vol.

Patent (1)

Makan Pourzandi, Mohamed Fekih Ahmed, Mohamed Cheriet, Chamseddine Talhi. 2018-03-06. « Multi-tenant isolation in a cloud environment using software defined networking ».

Book (1)

Djedjiga Mouheb, Mourad Debbabi, Makan Pourzandi, Lingyu Wang, Mariam Nouh, Raha Ziarati, Dima Alhadidi, Chamseddine Talhi, Vitor Lima. 2015. « Aspect-Oriented Security Hardening of UML Design Models ». Springer International Publishing. 237 p.

Chapter of book (1)

D. Mouheb, Chamseddine Talhi, M. Nouh, V. Lima, M. Debbabi, Li-Ping Wang, M. Pourzandi. 2010. « Aspect-oriented modeling for representing and integrating security concerns in UML ». In Software Engineering Research, Management and Applications Coll. «Studies in Computational Intelligence», . p. 197-213. Springer Berlin / Heidelberg.

Awards and honors