A deep learning approach for proactive multi-cloud cooperative intrusion detection system A Abusitta, M Bellaiche, M Dagenais, T Halabi Future Generation Computer Systems 98, 308-318, 2019 | 129 | 2019 |
Towards quantification and evaluation of security of Cloud Service Providers T Halabi, M Bellaiche Journal of Information Security and Applications 33, 55-65, 2017 | 90 | 2017 |
A broker-based framework for standardization and management of Cloud Security-SLAs T Halabi, M Bellaiche Computers & Security 75, 59-71, 2018 | 83 | 2018 |
Deep learning-enabled anomaly detection for IoT systems A Abusitta, GHS de Carvalho, OA Wahab, T Halabi, BCM Fung, ... Internet of Things 21, 100656, 2023 | 62 | 2023 |
Detecting SQL injection attacks in cloud SaaS using machine learning D Tripathy, R Gohil, T Halabi 2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity …, 2020 | 47 | 2020 |
Trust-based cooperative game model for secure collaboration in the internet of vehicles T Halabi, M Zulkernine ICC 2019-2019 IEEE International Conference on Communications (ICC), 1-6, 2019 | 45 | 2019 |
Towards security-based formation of cloud federations: A game theoretical approach T Halabi, M Bellaiche IEEE transactions on cloud computing 8 (3), 928-942, 2018 | 41 | 2018 |
Protecting the internet of vehicles against advanced persistent threats: A Bayesian Stackelberg game T Halabi, OA Wahab, R Al Mallah, M Zulkernine IEEE Transactions on Reliability 70 (3), 970-985, 2021 | 30 | 2021 |
A decentralized reputation management system for securing the internet of vehicles RG Engoulou, M Bellaiche, T Halabi, S Pierre 2019 International Conference on Computing, Networking and Communications …, 2019 | 17 | 2019 |
Predicting future malware attacks on cloud systems using machine learning V Patel, S Choe, T Halabi 2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity …, 2020 | 16 | 2020 |
A cooperative game for online cloud federation formation based on security risk assessment T Halabi, M Bellaiche, A Abusitta 2018 5th IEEE International Conference on Cyber Security and Cloud Computing …, 2018 | 16 | 2018 |
Online allocation of cloud resources based on security satisfaction T Halabi, M Bellaiche, A Abusitta 2018 17th IEEE international conference on trust, security and privacy in …, 2018 | 14 | 2018 |
Evaluation and selection of Cloud security services based on Multi-Criteria Analysis MCA T Halabi, M Bellaiche 2017 International conference on computing, networking and communications …, 2017 | 13 | 2017 |
A game-theoretic approach for distributed attack mitigation in intelligent transportation systems T Halabi, OA Wahab, M Zulkernine NOMS 2020-2020 IEEE/IFIP network operations and management symposium, 1-6, 2020 | 12 | 2020 |
Fog computing security assessment for device authentication in the internet of things S Al Harbi, T Halabi, M Bellaiche 2020 IEEE 22nd International Conference on High Performance Computing and …, 2020 | 11 | 2020 |
Toward secure resource allocation in mobile cloud computing: A matching game T Halabi, M Bellaiche, A Abusitta 2019 International Conference on Computing, Networking and Communications …, 2019 | 11 | 2019 |
Towards adaptive cybersecurity for green IoT T Halabi, M Bellaiche, BCM Fung 2022 IEEE International Conference on Internet of Things and Intelligence …, 2022 | 10 | 2022 |
Cloud-based Sybil attack detection scheme for connected vehicles A Anwar, T Halabi, M Zulkernine 2019 3rd Cyber Security in Networking Conference (CSNet), 114-121, 2019 | 10 | 2019 |
Reliability-driven task assignment in vehicular crowdsourcing: A matching game T Halabi, M Zulkernine 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems …, 2019 | 10 | 2019 |
How to evaluate the defense against dos and ddos attacks in cloud computing: a survey and taxonomy T Halabi, M Bellaiche International Journal of Computer Science and Information Security (IJCSIS …, 2016 | 10 | 2016 |