default search action
Talal Halabi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c45]Mohammadreza Khorramfar, Yaser Al Mtawa, Adel Abusitta, Talal Halabi:
Credit-Based Client Selection for Resilient Model Aggregation in Federated Learning. ICC 2024: 3975-3981 - [c44]Adel Abusitta, Talal Halabi, Ahmed Saleh Bataineh, Mohammad Zulkernine:
Generative Adversarial Networks for Robust Anomaly Detection in Noisy IoT Environments. ICC 2024: 4644-4649 - [c43]Thierry M. Ndimis Ndimis Toko, Martine Bellaïche, Talal Halabi:
A Game-theoretic Approach for DDoS Attack Mitigation in IIoT Deterministic Networking. NOMS 2024: 1-5 - 2023
- [j10]Adel Abusitta, Glaucio H. S. Carvalho, Omar Abdel Wahab, Talal Halabi, Benjamin C. M. Fung, Saja Al-Mamoori:
Deep learning-enabled anomaly detection for IoT systems. Internet Things 21: 100656 (2023) - [j9]Ranwa Al Mallah, Talal Halabi, Bilal Farooq:
Resilience-by-design in Adaptive Multi-agent Traffic Control Systems. ACM Trans. Priv. Secur. 26(3): 40:1-40:27 (2023) - [c42]Talal Halabi, Mohammad Zulkernine:
The Ultimate Battle Against Zero-Day Exploits: Toward Fully Autonomous Cyber-Physical Defense. SSE 2023: 256-261 - [c41]Shokoufeh Seifi, Ronald Beaubrun, Martine Bellaïche, Talal Halabi:
A Study on the Efficiency of Intrusion Detection Systems in IoT Networks. CITS 2023: 1-8 - [c40]Dominic Phillips, Talal Halabi, Mohammad Zulkernine:
Autonomous and Security-Aware Dynamic Vehicular Platoon Formation. DSA 2023: 770-781 - [c39]Joe McCalmon, Tongtong Liu, Reid Goldsmith, Andrew Cyhaniuk, Talal Halabi, Sarra M. Alqahtani:
Safe Reinforcement Learning via Observation Shielding. HICSS 2023: 6603-6612 - [c38]Ranwa Al Mallah, David López, Talal Halabi:
Blockchain-enabled Efficient and Secure Federated Learning in IoT and Edge Computing Networks. ICNC 2023: 511-515 - [c37]Fatemeh Erfan, Martine Bellaïche, Talal Halabi:
Community Detection Algorithm for Mitigating Eclipse Attacks on Blockchain-enabled Metaverse. MetaCom 2023: 403-407 - [c36]Talal Halabi:
Stealthy Rootkits vs Low-Power IoT Devices: A Process-level Colonel Blotto Game. TrustCom 2023: 1914-1918 - 2022
- [j8]Yaser Al Mtawa, Anwar Haque, Talal Halabi:
A Review and Taxonomy on Fault Analysis in Transmission Power Systems. Comput. 10(9): 144 (2022) - [j7]Anika Anwar, Talal Halabi, Mohammad Zulkernine:
Scalable Collaborative Intrusion Detection in Autonomous Vehicular Networks: A hierarchical framework based on game theory. Internet Things 20: 100631 (2022) - [j6]Anika Anwar, Talal Halabi, Mohammad Zulkernine:
A coalitional security game against data integrity attacks in autonomous vehicle networks. Veh. Commun. 37: 100517 (2022) - [c35]Cameron Lischke, Tongtong Liu, Joe McCalmon, Md Asifur Rahman, Talal Halabi, Sarra M. Alqahtani:
LSTM-Based Anomalous Behavior Detection in Multi-Agent Reinforcement Learning. CSR 2022: 16-21 - [c34]Talal Halabi, Aawista Chaudhry, Sarra M. Alqahtani, Mohammad Zulkernine:
A Scary Peek into The Future: Advanced Persistent Threats in Emerging Computing Environments. DSC 2022: 1-8 - [c33]Aawista Chaudhry, Talal Halabi, Mohammad Zulkernine:
Stealthy Data Corruption Attack Against Road Traffic Congestion Avoidance Applications. DSN Workshops 2022: 1-7 - [c32]Arnold Brendan Osei, Swati Rudra Yeginati, Yaser Al Mtawa, Talal Halabi:
Optimized Moving Target Defense Against DDoS Attacks in IoT Networks: When to Adapt? GLOBECOM 2022: 2782-2787 - [c31]Talal Halabi, Martine Bellaïche, Benjamin C. M. Fung:
Towards Adaptive Cybersecurity for Green IoT. IoTaIS 2022: 64-69 - [c30]Joe Hrzich, Gunjan Basra, Talal Halabi:
Experimental Evaluation of Homomorphic Encryption in Cloud and Edge Machine Learning. KSE 2022: 1-6 - [c29]Tongtong Liu, Joe McCalmon, Md Asifur Rahman, Cameron Lischke, Talal Halabi, Sarra M. Alqahtani:
Weaponizing Actions in Multi-Agent Reinforcement Learning: Theoretical and Empirical Study on Security and Robustness. PRIMA 2022: 347-363 - [c28]Talal Halabi, Israat Haque, Hadis Karimipour:
Adaptive Control for Security and Resilience of Networked Cyber-Physical Systems: Where Are We? TPS-ISA 2022: 239-247 - [c27]Ranwa Al Mallah, Talal Halabi, Mohammad Al Ja'afreh, Ali Karime:
Artificial Intelligence f or Cybersecurity in IoT-enabled Avionics: Challenges and Solutions. WF-IoT 2022: 1-8 - 2021
- [j5]Talal Halabi, Omar Abdel Wahab, Ranwa Al Mallah, Mohammad Zulkernine:
Protecting the Internet of Vehicles Against Advanced Persistent Threats: A Bayesian Stackelberg Game. IEEE Trans. Reliab. 70(3): 970-985 (2021) - [c26]Keith Massey, Nadia Moazen, Talal Halabi:
Optimizing the Allocation of Secure Fog Resources based on QoS Requirements. CSCloud/EdgeCom 2021: 143-148 - [c25]Najmeh Seifollahpour Arabi, Talal Halabi, Mohammad Zulkernine:
Reinforcement Learning-driven Attack on Road Traffic Signal Controllers. CSR 2021: 218-225 - [c24]Habib Ben Abdallah, Afeez Adewale Sanni, Krunal Thummar, Talal Halabi:
Online Energy-efficient Resource Allocation in Cloud Computing Data Centers. ICIN 2021: 92-99 - [c23]Talal Halabi:
Adaptive Security Risk Mitigation in Edge Computing: Randomized Defense Meets Prospect Theory. SEC 2021: 432-437 - [c22]Danila Morozovskii, Krunal Thummar, Talal Halabi, Sheela Ramanna:
Toward Efficient and Robust Deep Learning-based Malware Detection in Fog Computing. ISNCC 2021: 1-6 - [c21]Imad Yassine, Talal Halabi, Martine Bellaïche:
Security Risk Assessment Methodologies in The Internet of Things: Survey and Taxonomy. QRS Companion 2021: 668-675 - [c20]Jatin Patel, Talal Halabi:
Optimizing the Performance of Web Applications in Mobile Cloud Computing. SmartCloud 2021: 33-37 - [c19]Nooshin Noshiri, Mohammadreza Khorramfar, Talal Halabi:
Machine Learning-as-a-Service Performance Evaluation on Multi-class Datasets. SmartIoT 2021: 332-336 - 2020
- [j4]Talal Halabi, Martine Bellaïche:
Towards Security-Based Formation of Cloud Federations: A Game Theoretical Approach. IEEE Trans. Cloud Comput. 8(3): 928-942 (2020) - [c18]Dharitri Tripathy, Rudrarajsinh Gohil, Talal Halabi:
Detecting SQL Injection Attacks in Cloud SaaS using Machine Learning. BigDataSecurity/HPSC/IDS 2020: 145-150 - [c17]Vrushang Patel, Seungho Choe, Talal Halabi:
Predicting Future Malware Attacks on Cloud Systems using Machine Learning. BigDataSecurity/HPSC/IDS 2020: 151-156 - [c16]A. B. M. Bodrul Alam, Talal Halabi, Anwar Haque, Mohammad Zulkernine:
Reliability-based Formation of Cloud Federations Using Game Theory. GLOBECOM 2020: 1-6 - [c15]Saud Al Harbi, Talal Halabi, Martine Bellaïche:
Fog Computing Security Assessment for Device Authentication in the Internet of Things. HPCC/DSS/SmartCity 2020: 1219-1224 - [c14]A. B. M. Bodrul Alam, Talal Halabi, Anwar Haque, Mohammad Zulkernine:
Multi-Objective Interdependent VM Placement Model based on Cloud Reliability Evaluation. ICC 2020: 1-7 - [c13]A. B. M. Bodrul Alam, Talal Halabi, Anwar Haque, Mohammad Zulkernine:
Optimizing Virtual Machine Migration in Multi-Clouds. ISNCC 2020: 1-7 - [c12]Talal Halabi, Omar Abdel Wahab, Mohammad Zulkernine:
A Game-Theoretic Approach for Distributed Attack Mitigation in Intelligent Transportation Systems. NOMS 2020: 1-6 - [i1]Ranwa Al Mallah, Talal Halabi, Bilal Farooq:
A Minimax Game for Resilient-by-design Adaptive Traffic Control Systems. CoRR abs/2012.02675 (2020)
2010 – 2019
- 2019
- [j3]Adel Abusitta, Martine Bellaïche, Michel R. Dagenais, Talal Halabi:
A deep learning approach for proactive multi-cloud cooperative intrusion detection system. Future Gener. Comput. Syst. 98: 308-318 (2019) - [c11]Talal Halabi, Martine Bellaïche:
Security Risk-Aware Resource Provisioning Scheme for Cloud Computing Infrastructures. CNS 2019: 1-9 - [c10]Anika Anwar, Talal Halabi, Mohammad Zulkernine:
Cloud-based Sybil Attack Detection Scheme for Connected Vehicles. CSNet 2019: 114-121 - [c9]Talal Halabi, Mohammad Zulkernine:
Reliability-Driven Task Assignment in Vehicular Crowdsourcing: A Matching Game. DSN Workshops 2019: 78-85 - [c8]Talal Halabi, Mohammad Zulkernine:
Trust-Based Cooperative Game Model for Secure Collaboration in the Internet of Vehicles. ICC 2019: 1-6 - [c7]Talal Halabi, Martine Bellaïche, Adel Abusitta:
Toward Secure Resource Allocation in Mobile Cloud Computing: A Matching Game. ICNC 2019: 370-374 - [c6]Richard Gilles Engoulou, Martine Bellaïche, Talal Halabi, Samuel Pierre:
A Decentralized Reputation Management System for Securing the Internet of Vehicles. ICNC 2019: 900-904 - 2018
- [j2]Talal Halabi, Martine Bellaïche:
A broker-based framework for standardization and management of Cloud Security-SLAs. Comput. Secur. 75: 59-71 (2018) - [c5]Talal Halabi, Martine Bellaïche, Adel Abusitta:
A Cooperative Game for Online Cloud Federation Formation Based on Security Risk Assessment. CSCloud/EdgeCom 2018: 83-88 - [c4]Talal Halabi, Martine Bellaïche, Adel Abusitta:
Cloud Security Up for Auction: a DSIC Online Mechanism for Secure IaaS Resource Allocation. CSNet 2018: 1-8 - [c3]Talal Halabi, Martine Bellaïche, Adel Abusitta:
Online Allocation of Cloud Resources Based on Security Satisfaction. TrustCom/BigDataSE 2018: 379-384 - 2017
- [j1]Talal Halabi, Martine Bellaïche:
Towards quantification and evaluation of security of Cloud Service Providers. J. Inf. Secur. Appl. 33: 55-65 (2017) - [c2]Talal Halabi, Martine Bellaïche:
Service Assignment in Federated Cloud Environments Based on Multi-objective Optimization of Security. FiCloud 2017: 39-46 - [c1]Talal Halabi, Martine Bellaïche:
Evaluation and selection of Cloud security services based on Multi-Criteria Analysis MCA. ICNC 2017: 706-710
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint