Sami Zhioua
Sami Zhioua
Professor of Computer Science, HCT Dubai
Verified email at hct.ac.ae - Homepage
Title
Cited by
Cited by
Year
The middle east under malware attack dissecting cyber weapons
S Zhioua
2013 IEEE 33rd International Conference on Distributed Computing Systems …, 2013
362013
Security evaluation of J2ME CLDC embedded Java platform.
M Debbabi, M Saleh, C Talhi, S Zhioua
J. Object Technol. 5 (2), 125-154, 2006
362006
Method call acceleration in virtual machines
M Debbabi, N Tawbi, S Zhioua, M Erhioui, L Ketari, H Yahyaoui
US Patent App. 10/395,906, 2004
242004
A dynamic compiler for embedded java virtual machines
M Debbabi, A Gherbi, L Ketari, C Talhi, N Twabi, H Yahyaoui, S Zhioua
Trinity College Dublin, 2004
242004
A dynamic compiler for embedded java virtual machines
M Debbabi, A Gherbi, L Ketari, C Talhi, N Twabi, H Yahyaoui, S Zhioua
Trinity College Dublin, 2004
242004
Java for mobile devices: A security study
M Debbabi, M Saleh, C Talhi, S Zhioua
21st Annual Computer Security Applications Conference (ACSAC'05), 10 pp.-244, 2005
232005
On PLC network security
A Ghaleb, S Zhioua, A Almulhem
International Journal of Critical Infrastructure Protection 22, 62-69, 2018
192018
Security analysis of mobile Java
M Debbabi, M Saleh, C Talhi, S Zhioua
16th International Workshop on Database and Expert Systems Applications …, 2005
162005
PLC access control: a security analysis
H Wardak, S Zhioua, A Almulhem
2016 World Congress on Industrial Control Systems Security (WCICSS), 1-6, 2016
142016
Bootstrapping trust of Web services based on trust patterns and Hidden Markov Models
H Yahyaoui, S Zhioua
Knowledge and information systems 37 (2), 389-416, 2013
142013
SCADA-SST: a SCADA security testbed
A Ghaleb, S Zhioua, A Almulhem
2016 World Congress on Industrial Control Systems Security (WCICSS), 1-6, 2016
132016
Embedded Java security: security for mobile devices
M Debbabi, M Saleh, C Talhi, S Zhioua
Springer Science & Business Media, 2007
122007
Bootstrapping trust of web services through behavior observation
H Yahyaoui, S Zhioua
International conference on web engineering, 319-330, 2011
102011
Testing probabilistic equivalence through reinforcement learning
J Desharnais, F Laviolette, S Zhioua
International Conference on Foundations of Software Technology and …, 2006
92006
Security Analysis of Wireless Java.
M Debbabi, M Saleh, C Talhi, S Zhioua
PST, 2005
82005
Attacking tor through unpopular ports
MA Sulaiman, S Zhioua
2013 IEEE 33rd International Conference on Distributed Computing Systems …, 2013
72013
Stochastic systems divergence through reinforcement learning
S Zhioua
72008
Method call acceleration in embedded Java virtual machines
M Debbabi, M Erhioui, L Ketari, N Tawbi, H Yahyaoui, S Zhioua
International Conference on Computational Science, 750-759, 2003
72003
A synergy between efficient interpretation and fast selective dynamic compilation for the acceleration of embedded Java virtual machines
M Debbabi, A Gherbi, L Ketari, C Talhi, H Yahyaoui, S Zhioua
Trinity College Dublin, 2004
62004
Trace equivalence characterization through reinforcement learning
J Desharnais, F Laviolette, KPD Moturu, S Zhioua
Conference of the Canadian Society for Computational Studies of Intelligence …, 2006
52006
The system can't perform the operation now. Try again later.
Articles 1–20