Malicious sniffing systems detection platform Z Trabelsi, H Rahmani, K Kaouech, M Frikha 2004 International Symposium on Applications and the Internet. Proceedings …, 2004 | 74 | 2004 |
Recurring and novel class detection using class-based ensemble for evolving data stream T Al-Khateeb, MM Masud, KM Al-Naami, SE Seker, AM Mustafa, L Khan, ... IEEE Transactions on Knowledge and Data Engineering 28 (10), 2752-2764, 2015 | 51 | 2015 |
Real-time attention monitoring system for classroom: A deep learning approach for student’s behavior recognition Z Trabelsi, F Alnajjar, MMA Parambil, M Gochoo, L Ali Big Data and Cognitive Computing 7 (1), 48, 2023 | 50 | 2023 |
Implementation of a Covert Channel in the 802.11 Header L Frikha, Z Trabelsi, W El-Hajj 2008 International Wireless Communications and Mobile Computing Conference …, 2008 | 50 | 2008 |
On detecting port scanning using fuzzy based intrusion detection system W El-Hajj, F Aloul, Z Trabelsi, N Zaki 2008 International Wireless Communications and Mobile Computing Conference …, 2008 | 49 | 2008 |
NIS04-4: Man in the middle intrusion detection Z Trabelsi, K Shuaib IEEE Globecom 2006, 1-6, 2006 | 43 | 2006 |
A novel covert channel based on the IP header record route option Z Trabelsi, H El-Sayed, L Frikha, T Rabie International Journal of Advanced Media and Communication 1 (4), 328-350, 2007 | 41 | 2007 |
Multilevel early packet filtering technique based on traffic statistics and splay trees for firewall performance improvement Z Trabelsi, S Zeidan 2012 IEEE International Conference on Communications (ICC), 1074-1078, 2012 | 39 | 2012 |
Resiliency of smart power meters to common security attacks K Shuaib, Z Trabelsi, M Abed-Hafez, A Gaouda, M Alahmad Procedia Computer Science 52, 145-152, 2015 | 37 | 2015 |
Network attacks and defenses: A hands-on approach Z Trabelsi, K Hayawi, A Al Braiki, SS Mathew CRC Press, 2012 | 35 | 2012 |
Ethical hacking in information security curricula Z Trabelsi, M McCoey International Journal of Information and Communication Technology Education …, 2016 | 34 | 2016 |
Covert file transfer protocol based on the IP record route option Z Trabelsi, I Jawhar Journal of Information Assurance and Security 5 (1), 64-73, 2010 | 34 | 2010 |
Preventing ARP attacks using a fuzzy-based stateful ARP cache Z Trabelsi, W El-Hajj 2007 IEEE international conference on communications, 1355-1360, 2007 | 34 | 2007 |
Towards more sophisticated ARP Spoofing detection/prevention systems in LAN networks M Al-Hemairy, S Amin, Z Trabelsi 2009 International Conference on the Current Trends in Information …, 2009 | 33 | 2009 |
Using network packet generators and snort rules for teaching denial of service attacks Z Trabelsi, L Alketbi Proceedings of the 18th ACM conference on Innovation and technology in …, 2013 | 32 | 2013 |
Hands-on lab exercises implementation of DoS and MiM attacks using ARP cache poisoning Z Trabelsi Proceedings of the 2011 Information Security Curriculum Development …, 2011 | 32 | 2011 |
Multi-level resource sharing framework using collaborative fog environment for smart cities T Qayyum, Z Trabelsi, AW Malik, K Hayawi IEEE access 9, 21859-21869, 2021 | 29 | 2021 |
A voice and ink XML multimodal architecture for mobile e-commerce systems Z Trabelsi, SH Cha, D Desai, C Tappert Proceedings of the 2nd international workshop on Mobile commerce, 100-104, 2002 | 28 | 2002 |
A novel approach for terrorist sub-communities detection based on constrained evidential clustering F Saidi, Z Trabelsi, HB Ghazela 2018 12th international conference on research challenges in information …, 2018 | 26 | 2018 |
Approaches to analyze cyber terrorist communities: Survey and challenges F Saidi, Z Trabelsi, K Salah, HB Ghezala Computers & Security 66, 66-80, 2017 | 26 | 2017 |