The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Chamseddine Talhi: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, Sami Zhioua
    Java for Mobile Devices: A Security Study. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:235-244 [Conf]
  2. Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, Sami Zhioua
    Security Analysis of Mobile Java. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2005, pp:231-235 [Conf]
  3. Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, Sami Zhioua
    Security Analysis of Wireless Java. [Citation Graph (0, 0)][DBLP]
    PST, 2005, pp:- [Conf]
  4. Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, Sami Zhioua
    Security Evaluation of J2ME CLDC Embedded Java Platform. [Citation Graph (0, 0)][DBLP]
    Journal of Object Technology, 2006, v:5, n:2, pp:125-154 [Journal]
  5. Mourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Hamdi Yahyaoui, Sami Zhioua, Nadia Tawbi
    E-Bunny: A Dynamic Compiler for Embedded Java Virtual Machines. [Citation Graph (0, 0)][DBLP]
    Journal of Object Technology, 2005, v:4, n:1, pp:83-108 [Journal]
  6. Mourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Hamdi Yahyaoui, Sami Zhioua
    a synergy between efficient interpretation and fast selective dynamic compilation for the acceleration of embedded Java virtual machines. [Citation Graph (0, 0)][DBLP]
    PPPJ, 2004, pp:107-113 [Conf]
  7. Mourad Debbabi, Abdelouahed Gherbi, Lamia Ketari, Chamseddine Talhi, Nadia Tawbi, Hamdi Yahyaoui, Sami Zhioua
    A dynamic compiler for embedded Java virtual machines. [Citation Graph (0, 0)][DBLP]
    PPPJ, 2004, pp:100-106 [Conf]

  8. Execution monitoring enforcement for limited-memory systems. [Citation Graph (, )][DBLP]


  9. Aspect-Oriented Modeling for Representing and Integrating Security Concerns in UML. [Citation Graph (, )][DBLP]


  10. Common Criteria Approach to J2ME CLDC Security Requirements. [Citation Graph (, )][DBLP]


  11. An Aspect-Oriented Approach for Software Security Hardening: from Design to Implementation. [Citation Graph (, )][DBLP]


  12. Formal Verification and Validation of UML 2.0 Sequence Diagrams using Source and Destination of Messages. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002