Zouheir Trabelsi

According to our database1, Zouheir Trabelsi authored at least 70 papers between 1993 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 



On csauthors.net:


Denial of Firewalling Attacks (DoF): The Case Study of the Emerging BlackNurse Attack.
IEEE Access, 2019

Teaching Emerging DDoS Attacks on Firewalls: A Case Study of the BlackNurse Attack.
Proceedings of the IEEE Global Engineering Education Conference, 2019

Exploring the Opportunities of Cisco Packet Tracer For Hands-on Security Courses on Firewalls.
Proceedings of the IEEE Global Engineering Education Conference, 2019

A Basic Course Model on Information Security for High School IT Curriculum.
Proceedings of the IEEE Global Engineering Education Conference, 2019

Improved Session Table Architecture for Denial of Stateful Firewall Attacks.
IEEE Access, 2018

An Evidential Clustering Based Framework for Cyber Terrorist Cells Topology Identification.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A novel approach for terrorist sub-communities detection based on constrained evidential clustering.
Proceedings of the 12th International Conference on Research Challenges in Information Science, 2018

Cloud Automation to Run Large-Scale Quantum Chemical Simulations.
Proceedings of the 2018 International Conference on Innovations in Information Technology (IIT), 2018

Enhanced Session Table Architecture for Stateful Firewalls.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Teaching keylogging and network eavesdropping attacks: Student threat and school liability concerns.
Proceedings of the 2018 IEEE Global Engineering Education Conference, 2018

Hybrid mechanism towards network packet early acceptance and rejection for unified threat management.
IET Information Security, 2017

Android based mobile apps for information security hands-on education.
EAIT, 2017

Approaches to analyze cyber terrorist communities: Survey and challenges.
Computers & Security, 2017

Recurring and Novel Class Detection Using Class-Based Ensemble for Evolving Data Stream.
IEEE Trans. Knowl. Data Eng., 2016

Microsoft Windows vs. Apple Mac OS X: Resilience against ARP cache poisoning attack in a local area network.
Information Security Journal: A Global Perspective, 2016

An extended identity-based cryptography protocol based on biometric.
IJIPSI, 2016

Ethical Hacking in Information Security Curricula.
IJICTE, 2016

A Smartphone App for Enhancing Students' Hands-on Learning on Network and DoS Attacks Traffic Generation.
Proceedings of the 17th Annual Conference on Information Technology Education and the 5th Annual Conference on Research in Information Technology, 2016

Virtualization based ethical educational platform for hands-on lab activities on DoS attacks.
Proceedings of the 2016 IEEE Global Engineering Education Conference, 2016

Edu-firewall device: An advanced firewall hardware device for information security education.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

The robustness of Microsoft Windows and Apple Mac OS X against ARP cache poisoning based network attacks.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

Network Packet Filtering and Deep Packet Inspection Hybrid Mechanism for IDS Early Packet Matching.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

On Investigating the Effectiveness of Biometric Readers in Thwarting Network Attacks: A Secure Architecture Design Proposal.
J. Intelligent Systems, 2015

Statistical dynamic splay tree filters towards multilevel firewall packet filtering enhancement.
Computers & Security, 2015

Resiliency of Smart Power Meters to Common Security Attacks.
Proceedings of the 6th International Conference on Ambient Systems, 2015

Towards more reliable and secure source routing in mobile ad hoc and sensor networks.
Telecommunication Systems, 2014

Dynamic rule and rule-field optimisation for improving firewall performance and security.
IET Information Security, 2014

Enhancing the comprehension of network sniffing attack in information security education using a hands-on lab approach.
Proceedings of the 15th Annual Conference on Information Technology Education, 2014

IDS performance enhancement technique based on dynamic traffic awareness histograms.
Proceedings of the IEEE International Conference on Communications, 2014

A data driven firewall for faster packet filtering.
Proceedings of the Fourth International Conference on Communications and Networking, 2014

A Web-based Firewall Simulator Tool for Information Security Education.
Proceedings of the Sixteenth Australasian Computing Education Conference, 2014

Dynamic traffic awareness statistical model for firewall performance enhancement.
Computers & Security, 2013

Firewall performance optimization using data mining techniques.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

Using network packet generators and snort rules for teaching denial of service attacks.
Proceedings of the Innovation and Technology in Computer Science Education conference 2013, 2013

Teaching ethical hacking in information security curriculum: A case study.
Proceedings of the IEEE Global Engineering Education Conference, 2013

Firewall Packet Filtering Optimization Using Statistical Traffic Awareness Test.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Multilevel early packet filtering technique based on traffic statistics and splay trees for firewall performance improvement.
Proceedings of IEEE International Conference on Communications, 2012

Firewall packet matching optimization using network traffic behavior and packet matching statistics.
Proceedings of the Third International Conference on Communications and Networking, 2012

Updating snort with a customized controller to thwart port scanning.
Security and Communication Networks, 2011

Splay trees based early packet rejection mechanism against DoS traffic targeting firewall default security rule.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011

Hands-on lab exercises implementation of DoS and MiM attacks using ARP cache poisoning.
Proceedings of the 2011 Information Security Curriculum Development Conference, 2011

Packet flow histograms to improve firewall efficiency.
Proceedings of the 8th International Conference on Information, 2011

On investigating ARP spoofing security solutions.
IJIPT, 2010

Towards More Secure Biometric Readers for Effective Digital Forensic Investigation.
Proceedings of the Digital Forensics and Cyber Crime, 2010

Implementation of a DNA-based anomaly identification system utilizing associative string processor (ASP).
Proceedings of the 8th ACS/IEEE International Conference on Computer Systems and Applications, 2010

An enhanced secure ARP protocol and LAN switch for preveting ARP based attacks.
Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, 2009

On fault tolerant ad hoc network design.
Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, 2009

Firewall filtering rules analysis for anomalies detection.
IJSN, 2008

Towards Optimized TCP/IP Covert Channels Detection, IDS and Firewall Integration.
Proceedings of the NTMS 2008, 2008

Towards More Reliable Source Routing in Wireless Networks.
Proceedings of The 2008 IEEE International Conference on Networking, 2008

RAS: A Reliable Routing Protocol for Wireless Ad Hoc and Sensor Networks★.
Proceedings of the Wireless Sensor and Actor Networks II, 2008

Implementation of an ICMP-based covert channel for file and message transfer.
Proceedings of the 15th IEEE International Conference on Electronics, Circuits and Systems, 2008

A new covert channel in WIFI networks.
Proceedings of the CRiSIS '08, 2008

A novel covert channel based on the IP header record route option.
IJAMC, 2007

Fast distributed dominating set based routing in large scale MANETs.
Computer Communications, 2007

Using a Fuzzy Logic Controller to Thwart Data Link Layer Attacks in Ethernet Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Preventing ARP Attacks Using a Fuzzy-Based Stateful ARP Cache.
Proceedings of IEEE International Conference on Communications, 2007

Spoofed ARP Packets Detection in Switched LAN Networks.
Proceedings of the SECRYPT 2006, 2006

Traceroute Based IP Channel for Sending Hidden Short Messages.
Proceedings of the Advances in Information and Computer Security, 2006

Spoofed ARP Packets Detection in Switched LAN Networks.
Proceedings of the E-Business and Telecommunication Networks, 2006

Man in the Middle Intrusion Detection.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

An Anti-Sniffer Based on ARP Cache Poisoning Attack.
Information Systems Security, 2005

Switched Network Sniffers Detection Technique Based on IP Packet Routing.
Information Systems Security, 2005

A Generic Multimodal Architecture for Integrating Voice and Ink XML Formats.
Int. Arab J. Inf. Technol., 2004

Promiscuous Mode Detection Platform.
Proceedings of the Security In Information Systems, 2004

Malicious Sniffing Systems Detection Platform.
Proceedings of the 2004 Symposium on Applications and the Internet (SAINT 2004), 2004

Detection of Sniffers in an Ethernet Network.
Proceedings of the Information Security, 7th International Conference, 2004

A voice and ink XML multimodal architecture for mobile e-commerce systems.
Proceedings of the 2nd International Workshop on Mobile Commerce, 2002

Multimodal Integration of Voice and Ink for Pervasive Computing.
Proceedings of the 4th International Symposium on Multimedia Software Engineering, 2002

Heuristics for Generating Informative Responses to Failing User's Queries in Natural Language Database Interfaces.
Proceedings of the Human-Computer Interaction: Software and Hardware Interfaces, 1993