Zouheir Trabelsi

ORCID: 0000-0001-8686-8975
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Internet Traffic Analysis and Secure E-voting
  • Network Packet Processing and Optimization
  • Advanced Malware Detection Techniques
  • Information and Cyber Security
  • Anomaly Detection Techniques and Applications
  • Mobile Ad Hoc Networks
  • Terrorism, Counterterrorism, and Political Violence
  • Energy Efficient Wireless Sensor Networks
  • Vehicular Ad Hoc Networks (VANETs)
  • Speech and dialogue systems
  • Experimental Learning in Engineering
  • IoT and Edge/Fog Computing
  • IPv6, Mobility, Handover, Networks, Security
  • Digital and Cyber Forensics
  • Multi-Agent Systems and Negotiation
  • User Authentication and Security Systems
  • Security in Wireless Sensor Networks
  • Spam and Phishing Detection
  • Privacy-Preserving Technologies in Data
  • UAV Applications and Optimization
  • Biometric Identification and Security
  • Service-Oriented Architecture and Web Services
  • Opportunistic and Delay-Tolerant Networks
  • Robotics and Automated Systems

United Arab Emirates University
2016-2025

Abu Dhabi University
2022

Manouba University
2017

École Normale Supérieure - PSL
2008

Institut Supérieur des Études Technologiques en Communications de Tunis
2004

Pace University
2002-2003

Effective classroom instruction requires monitoring student participation and interaction during class, identifying cues to simulate their attention. The ability of teachers analyze evaluate students’ behavior is becoming a crucial criterion for quality teaching. Artificial intelligence (AI)-based recognition techniques can help attention engagement sessions. With rapid digitalization, the global education system adapting exploring emerging technological innovations, such as AI, Internet...

10.3390/bdcc7010048 article EN cc-by Big Data and Cognitive Computing 2023-03-09

Precision agriculture and smart farming have received significant attention due to the advancements made in remote sensing technology support agricultural efficiency. In large-scale agriculture, role of unmanned aerial vehicles (UAVs) has increased monitoring collecting farm data at regular intervals. However, an open environment, UAVs can be hacked malfunction report false data. Due limited battery life flight times requiring frequent recharging, a compromised UAV wastes precious energy...

10.3390/app13063857 article EN cc-by Applied Sciences 2023-03-17

Streaming data is one of the attention receiving sources for concept-evolution studies. When a new class occurs in stream it can be considered as concept and so concept-evolution. One attractive problem occurring studies recurring classes from our previous study. In streams, disappear reappear after while. Existing on classification techniques either misclassify or falsely identify novel classes. Because misclassification false classification, error rates increases those this paper we...

10.1109/tkde.2015.2507123 article EN IEEE Transactions on Knowledge and Data Engineering 2015-12-10

Fog computing has proved its importance over legacy cloud architectures for computation, storage, and communication where edge devices are used to facilitate the delay-sensitive applications. The inception of fog nodes brought intelligence close end-devices. Many frameworks have been proposed computation. In this paper, we a simulation framework that can use end handle peak computation load provide better Quality Services (QoS). regional deployed at network locations which as an intelligent...

10.1109/access.2021.3054420 article EN cc-by IEEE Access 2021-01-01

10.1016/j.engappai.2022.105271 article EN Engineering Applications of Artificial Intelligence 2022-08-19

Smart vehicles are equipped with onboard computing units designed to run in-vehicle applications. However, due limited power, the unable execute compute-intensive tasks and those that require near real-time processing. Therefore offloaded nearby fog/edge devices have more powerful processors. fog static, placed at fixed locations such as intersections, a communication range. Therefore, they can only facilitate in their immediate vicinity areas of city be covered provide services on demand....

10.1109/jiot.2023.3292308 article EN IEEE Internet of Things Journal 2023-07-04

This article presents a scientometric and literature analysis of current research on ChatGPT, conversational AI technology developed by OpenAI. Using various databases, 103 relevant articles were retrieved analyzed through scientometric, quantitative, application-based approaches. A Google trend comparison with other generative chatbot technologies also carried out. The study provides insights into the distribution ChatGPT publications across different countries regions, network co-occurring...

10.1109/access.2024.3356584 article EN cc-by-nc-nd IEEE Access 2024-01-01

Unmanned aerial vehicles (UAVs) play an important role in facilitating data collection remote areas due to their mobility. The collected require processing close the end-user support delay-sensitive applications. In this paper, we proposed a scheme and scheduling framework for smart farms. We categorized model into two phases: scheduling. phase, IoT sensors are deployed randomly form cluster based on RSSI. UAV calculates optimum trajectory order gather from all clusters. offloads nearest...

10.3390/s22010037 article EN cc-by Sensors 2021-12-22

Maintaining interconnectivity between dynamic vehicular nodes and ensuring trust in networking is still a challenging issue. It crucial for the environments to maintain stable further prevent from broadcasting fake messages simultaneously protect vehicles against tracking attacks. An efficient Trust Management System (TMS) proposed this paper that will ensure trustworthiness entities assure road safety reliable communication. The approach incorporates novel timestamp mechanism block chain...

10.1109/tits.2022.3187788 article EN IEEE Transactions on Intelligent Transportation Systems 2022-07-14

Abstract The Industrial Internet of Things (IIoTs) is an emerging area that forms the collaborative environment for devices to share resources. In IIoT, many sensors, actuators, and other are used improve industrial efficiency. As most mobile; therefore, impact mobility can be seen in terms low-device utilization. Thus, time, available resources underutilized. Therefore, inception fog computing model IIoT has reduced communication delay executing complex tasks. However, it not feasible cover...

10.1186/s13677-022-00345-y article EN cc-by Journal of Cloud Computing Advances Systems and Applications 2022-10-28

Covert channels are an immense cause of security concern because they can be used to pass malicious messages. The messages could in form computer virus, spy programs, terrorist messages, etc. Most available techniques proposed covert that use the upper layers OSI model. In this paper, we discuss a novel channel data link layer dedicated wireless local area networks. Depending on configuration network, uses either sequence control or initial vector fields, both them. We present also some...

10.1109/iwcmc.2008.103 article EN 2008-08-01

The development of Smart Grid power systems is gaining momentum in many countries leading to massive deployment smart meters realize the envisioned benefits. However, there are several concerns among consumer communities and service providers with respect information security when it comes meters. This paper attempts address main challenge related grid by examining resiliency threats attacks. Several common attacks being used study their impact on performance a controlled laboratory...

10.1016/j.procs.2015.05.049 article EN Procedia Computer Science 2015-01-01

Among various types of attacks on an Ethernet network, a "sniffing attack" is probably one the most difficult to handle. Sniffers are programs that allow host capture any packets in by putting host's network interface card (NIC) into promiscuous mode. When NIC normal mode, it captures only sent host. Since many basic services, such as FTP and SMTP, send passwords data clear text packets, can be used hackers confidential data. This paper presents design implementation two different techniques...

10.1109/saint.2004.1266117 article EN 2004-05-25

Intrusion detection is a mechanism used to detect various attacks on wired or wireless network. Port scanning one of the dangerous that intrusion tries detect. Snort, famous network system (NIDS), detects port attack by combining and analyzing traffic parameters. Because these parameters cannot be easily combined using mathematical formula, fuzzy logic can combine them; also reduce number false alarms. This paper presents novel approach, based logic, attacks. A controller designed integrated...

10.1109/iwcmc.2008.19 article EN 2008-08-01

This paper presents a mechanism to improve firewall packet filtering time through optimizing the order of security policy fields for early rejection. The proposed is based on optimization according traffic statistics. Furthermore, uses multilevel filtering, and in each level unwanted packets are rejected as possible. So, can be considered also device protection against denial service (DoS) attacks targeting default rule. In addition, acceptance done using splay tree data structure which...

10.1109/icc.2012.6364218 article EN 2012-06-01

Teaching ethical hacking techniques is fundamental to security education and allows students better understand the ways in which computer network systems fail. This paper discusses implementation of comprehensive offensive hands-on lab exercises about four common Denial Service (DoS) attacks. Moreover, a defense technique against DoS attacks using Snort tool, as an intrusion detection system. The impact offering on student performance terms achieving course outcomes also discussed. Although...

10.1145/2462476.2465580 article EN 2013-07-01

The emergence of web 2.0 virtual spaces, namely social networks and media, enables terrorist organizations to flourish advance their cyber malicious activities by posting criminal contents, exchanging information polarizing new members. Thus, there is an immense need for the development effective approaches understand structures, working strategies, operation tactics. A community a set subgroups, which share many properties but differ on others, such as degree activity roles. identification...

10.1109/rcis.2018.8406663 article EN 2018-05-01

In this paper we propose a novel covert channel for exchanging secret information, based on the IP header record route options. Instead of encrypting message or embedding it into multimedia object, as in traditional steganography, process entire and generate several packets with different types to carry information. Thereby foil an eavesdropper who is primarily applying statistical tests detect encrypted channels. We show that our approach provides more protection against steganalysis...

10.1504/ijamc.2007.014811 article EN International Journal of Advanced Media and Communication 2007-01-01

ARP cache poisoning is considered to be one of the easiest and dangerous attacks in local area networks. This paper proposes a solution problem by extending current protocol implementation. Instead traditional stateless cache, we use stateful order manage secure cache. We also novel Fuzzy Logic approach differentiate between normal malicious replies. The controller uses dynamically populated data base that adapts network changes. limits approaches are discussed analyzed.

10.1109/icc.2007.228 article EN IEEE International Conference on Communications 2007-06-01

The field of academic security education today is dominated by defensive techniques. However, recently, offensive techniques which were originally developed hackers, are gaining widespread approval. Many information educators believe that teaching methods yields better professionals than alone. In addition, every course in IT should be accompanied a basic discussion legal implications and ethics.

10.1145/2047456.2047468 article EN 2011-09-30

A novel approach is presented to improve firewall packet filtering through optimising the order of rules for early acceptance as well rule-fields rejection. The proposed based on calculation histograms matching and not rule-fields. These are able effectively monitor performance in real-time predict patterns terms order. Furthermore, becomes even more significant when heavily loaded with burst traffic. comparison other conventional approaches, including static rule dynamic presented....

10.1049/iet-ifs.2011.0146 article EN IET Information Security 2014-02-17

An international association advancing the multidisciplinary study of informing systems. Founded in 1998, Informing Science Institute (ISI) is a global community academics shaping future science.

10.28945/1920 article EN Journal of Information Technology Education Innovations in Practice 2013-01-01
Coming Soon ...