Zouheir Trabelsi

Orcid: 0000-0001-8686-8975

According to our database1, Zouheir Trabelsi authored at least 97 papers between 1993 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Real-Time Attention Monitoring System for Classroom: A Deep Learning Approach for Student's Behavior Recognition.
Big Data Cogn. Comput., March, 2023

Airborne Computing: A Toolkit for UAV-Assisted Federated Computing for Sustainable Smart Cities.
IEEE Internet Things J., 2023

Visualizing Student Attention in Smart Classrooms: A Preliminary Study.
Proceedings of the 15th International Conference on Innovations in Information Technology, 2023

Intrusion Detection Using Attention-Based CNN-LSTM Model.
Proceedings of the Artificial Intelligence Applications and Innovations, 2023

Diagnosis of Schizophrenia from EEG signals Using ML Algorithms.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2023

2022
A Novel Multifaceted Trust Management Framework for Vehicular Networks.
IEEE Trans. Intell. Transp. Syst., 2022

Trajectory Design for UAV-Based Data Collection Using Clustering Model in Smart Farming.
Sensors, 2022

Mobility-aware hierarchical fog computing framework for Industrial Internet of Things (IIoT).
J. Cloud Comput., 2022

A simplified real-time camera-based attention assessment system for classrooms: pilot study.
Educ. Inf. Technol., 2022

A novel framework for semantic classification of cyber terrorist communities on Twitter.
Eng. Appl. Artif. Intell., 2022

Integration of blockchain and collaborative intrusion detection for secure data transactions in industrial IoT: a survey.
Clust. Comput., 2022

Global Aggregation Node Selection Scheme in Federated Learning for Vehicular Ad Hoc Networks (VANETs).
Proceedings of the IEEE International Conference on Omni-layer Intelligent Systems, 2022

Investigating the Robustness of IoT Security Cameras against Cyber Attacks.
Proceedings of the 5th Conference on Cloud and Internet of Things, 2022

2021
Multi-Level Resource Sharing Framework Using Collaborative Fog Environment for Smart Cities.
IEEE Access, 2021

IoT based Smart Home Security Education using a Hands-on Approach.
Proceedings of the IEEE Global Engineering Education Conference, 2021

2020
Android-Based Mobile Apps for Hands-on Education.
Proceedings of the Encyclopedia of Education and Information Technologies, 2020

Fuzzy IDS as a service on the cloud for malicious TCP port scanning traffic detection.
Intell. Decis. Technol., 2020

Thwarting ICMP Low-Rate Attacks Against Firewalls While Minimizing Legitimate Traffic Loss.
IEEE Access, 2020

Robot Security Education: Hands-on Lab Activities Based Teaching Approach.
Proceedings of the Robotics in Education - Methodologies and Technologies, Proceedings of the 11th RiE 2020, Virtual Event / Bratislava, Slovak Republic, September 30, 2020

Teaching Network Covert Channels using a Hands-on Approach.
Proceedings of the 2020 IEEE Global Engineering Education Conference, 2020

2019
Denial of Firewalling Attacks (DoF): The Case Study of the Emerging BlackNurse Attack.
IEEE Access, 2019

Enhancing Firewall Filter Performance Using Neural Networks.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

A Dendritic Cell Algorithm Based Approach for Malicious TCP Port Scanning Detection.
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

Teaching Emerging DDoS Attacks on Firewalls: A Case Study of the BlackNurse Attack.
Proceedings of the IEEE Global Engineering Education Conference, 2019

Exploring the Opportunities of Cisco Packet Tracer For Hands-on Security Courses on Firewalls.
Proceedings of the IEEE Global Engineering Education Conference, 2019

A Basic Course Model on Information Security for High School IT Curriculum.
Proceedings of the IEEE Global Engineering Education Conference, 2019

An Approach for Thwarting Malicious Secret Channel: The Case of IP Record Route Option Header-Based Covert Channels.
Proceedings of the Risks and Security of Internet and Systems, 2019

Resilence of Network Stateful Firewalls against Emerging DoS Attacks: A Case Study of the BlackNurse Attack.
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019

Fuzzy Logic Based Intrusion Detection System as a Service for Malicious Port Scanning Traffic Detection.
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019

2018
Improved Session Table Architecture for Denial of Stateful Firewall Attacks.
IEEE Access, 2018

An Evidential Clustering Based Framework for Cyber Terrorist Cells Topology Identification.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A novel approach for terrorist sub-communities detection based on constrained evidential clustering.
Proceedings of the 12th International Conference on Research Challenges in Information Science, 2018

Cloud Automation to Run Large-Scale Quantum Chemical Simulations.
Proceedings of the 2018 International Conference on Innovations in Information Technology (IIT), 2018

Towards a Multidimensional Model for Terrorist Attacks Analysis and Mining.
Proceedings of the 28th International Conference on Computer Theory and Applications, 2018

Enhanced Session Table Architecture for Stateful Firewalls.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Teaching keylogging and network eavesdropping attacks: Student threat and school liability concerns.
Proceedings of the 2018 IEEE Global Engineering Education Conference, 2018

2017
Hybrid mechanism towards network packet early acceptance and rejection for unified threat management.
IET Inf. Secur., 2017

Android based mobile apps for information security hands-on education.
Educ. Inf. Technol., 2017

Approaches to analyze cyber terrorist communities: Survey and challenges.
Comput. Secur., 2017

2016
Architectures and Strategies for Efficient Communication in Wireless Sensor Networks Using Unmanned Aerial Vehicles.
Unmanned Syst., 2016

Recurring and Novel Class Detection Using Class-Based Ensemble for Evolving Data Stream.
IEEE Trans. Knowl. Data Eng., 2016

Microsoft Windows vs. Apple Mac OS X: Resilience against ARP cache poisoning attack in a local area network.
Inf. Secur. J. A Glob. Perspect., 2016

An extended identity-based cryptography protocol based on biometric.
Int. J. Inf. Priv. Secur. Integr., 2016

Ethical Hacking in Information Security Curricula.
Int. J. Inf. Commun. Technol. Educ., 2016

A Smartphone App for Enhancing Students' Hands-on Learning on Network and DoS Attacks Traffic Generation.
Proceedings of the 17th Annual Conference on Information Technology Education and the 5th Annual Conference on Research in Information Technology, 2016

Virtualization based ethical educational platform for hands-on lab activities on DoS attacks.
Proceedings of the 2016 IEEE Global Engineering Education Conference, 2016

Edu-firewall device: An advanced firewall hardware device for information security education.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

The robustness of Microsoft Windows and Apple Mac OS X against ARP cache poisoning based network attacks.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

Network Packet Filtering and Deep Packet Inspection Hybrid Mechanism for IDS Early Packet Matching.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

2015
On Investigating the Effectiveness of Biometric Readers in Thwarting Network Attacks: A Secure Architecture Design Proposal.
J. Intell. Syst., 2015

Statistical dynamic splay tree filters towards multilevel firewall packet filtering enhancement.
Comput. Secur., 2015

Resiliency of Smart Power Meters to Common Security Attacks.
Proceedings of the 6th International Conference on Ambient Systems, 2015

2014
Towards more reliable and secure source routing in mobile ad hoc and sensor networks.
Telecommun. Syst., 2014

Dynamic rule and rule-field optimisation for improving firewall performance and security.
IET Inf. Secur., 2014

Enhancing the comprehension of network sniffing attack in information security education using a hands-on lab approach.
Proceedings of the 15th Annual Conference on Information Technology Education, 2014

IDS performance enhancement technique based on dynamic traffic awareness histograms.
Proceedings of the IEEE International Conference on Communications, 2014

A data driven firewall for faster packet filtering.
Proceedings of the Fourth International Conference on Communications and Networking, 2014

A Web-based Firewall Simulator Tool for Information Security Education.
Proceedings of the Sixteenth Australasian Computing Education Conference, 2014

2013
A Hands-on Approach for Teaching Denial of Service Attacks: A Case Study.
J. Inf. Technol. Educ. Innov. Pract., 2013

Dynamic traffic awareness statistical model for firewall performance enhancement.
Comput. Secur., 2013

Firewall performance optimization using data mining techniques.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

Using network packet generators and snort rules for teaching denial of service attacks.
Proceedings of the Innovation and Technology in Computer Science Education conference 2013, 2013

Teaching ethical hacking in information security curriculum: A case study.
Proceedings of the IEEE Global Engineering Education Conference, 2013

2012
Firewall Packet Filtering Optimization Using Statistical Traffic Awareness Test.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Multilevel early packet filtering technique based on traffic statistics and splay trees for firewall performance improvement.
Proceedings of IEEE International Conference on Communications, 2012

Firewall packet matching optimization using network traffic behavior and packet matching statistics.
Proceedings of the Third International Conference on Communications and Networking, 2012

2011
Updating snort with a customized controller to thwart port scanning.
Secur. Commun. Networks, 2011

Splay trees based early packet rejection mechanism against DoS traffic targeting firewall default security rule.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011

Hands-on lab exercises implementation of DoS and MiM attacks using ARP cache poisoning.
Proceedings of the 2011 Information Security Curriculum Development Conference, 2011

Packet flow histograms to improve firewall efficiency.
Proceedings of the 8th International Conference on Information, 2011

2010
On investigating ARP spoofing security solutions.
Int. J. Internet Protoc. Technol., 2010

Towards More Secure Biometric Readers for Effective Digital Forensic Investigation.
Proceedings of the Digital Forensics and Cyber Crime, 2010

Implementation of a DNA-based anomaly identification system utilizing associative string processor (ASP).
Proceedings of the 8th ACS/IEEE International Conference on Computer Systems and Applications, 2010

2009
An enhanced secure ARP protocol and LAN switch for preveting ARP based attacks.
Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, 2009

On fault tolerant ad hoc network design.
Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, 2009

2008
Firewall filtering rules analysis for anomalies detection.
Int. J. Secur. Networks, 2008

Towards Optimized TCP/IP Covert Channels Detection, IDS and Firewall Integration.
Proceedings of the NTMS 2008, 2008

Towards More Reliable Source Routing in Wireless Networks.
Proceedings of The 2008 IEEE International Conference on Networking, 2008

RAS: A Reliable Routing Protocol for Wireless Ad Hoc and Sensor Networks★.
Proceedings of the Wireless Sensor and Actor Networks II, 2008

Implementation of an ICMP-based covert channel for file and message transfer.
Proceedings of the 15th IEEE International Conference on Electronics, Circuits and Systems, 2008

A new covert channel in WIFI networks.
Proceedings of the CRiSIS '08, 2008

2007
A novel covert channel based on the IP header record route option.
Int. J. Adv. Media Commun., 2007

Fast distributed dominating set based routing in large scale MANETs.
Comput. Commun., 2007

Using a Fuzzy Logic Controller to Thwart Data Link Layer Attacks in Ethernet Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Preventing ARP Attacks Using a Fuzzy-Based Stateful ARP Cache.
Proceedings of IEEE International Conference on Communications, 2007

2006
Spoofed ARP Packets Detection in Switched LAN Networks.
Proceedings of the SECRYPT 2006, 2006

Traceroute Based IP Channel for Sending Hidden Short Messages.
Proceedings of the Advances in Information and Computer Security, 2006

Man in the Middle Intrusion Detection.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2005
An Anti-Sniffer Based on ARP Cache Poisoning Attack.
Inf. Secur. J. A Glob. Perspect., 2005

Switched Network Sniffers Detection Technique Based on IP Packet Routing.
Inf. Secur. J. A Glob. Perspect., 2005

2004
A Generic Multimodal Architecture for Integrating Voice and Ink XML Formats.
Int. Arab J. Inf. Technol., 2004

Promiscuous Mode Detection Platform.
Proceedings of the Security In Information Systems, 2004

Malicious Sniffing Systems Detection Platform.
Proceedings of the 2004 Symposium on Applications and the Internet (SAINT 2004), 2004

Detection of Sniffers in an Ethernet Network.
Proceedings of the Information Security, 7th International Conference, 2004

2002
A voice and ink XML multimodal architecture for mobile e-commerce systems.
Proceedings of the 2nd International Workshop on Mobile Commerce, 2002

Multimodal Integration of Voice and Ink for Pervasive Computing.
Proceedings of the 4th International Symposium on Multimedia Software Engineering, 2002

1993
Heuristics for Generating Informative Responses to Failing User's Queries in Natural Language Database Interfaces.
Proceedings of the Human-Computer Interaction: Software and Hardware Interfaces, 1993


  Loading...