First name
Talal
Last name
Halabi
Halabi, T. ., & Zulkernine, M. . (2023). The Ultimate Battle Against Zero-Day Exploits: Toward Fully Autonomous Cyber-Physical Defense. In (p. 256—261). http://doi.org/10.1109/SSE60056.2023.00041 (Original work published 2024)
Halabi, T. ., Abusitta, A. ., Carvalho, G. H., & Fung, B. C. M. (2022). Incentivized Security-Aware Computation Offloading for Large-Scale Internet of Things Applications. In (p. 1—6). http://doi.org/10.23919/SpliTech55088.2022.9854374 (Original work published 2024)
Phillips, D. ., Halabi, T. ., & Zulkernine, M. . (2023). Autonomous and Security-Aware Dynamic Vehicular Platoon Formation. In (pp. 770–781). Tokyo, Japan: IEEE. http://doi.org/10.1109/DSA59317.2023.00109 (Original work published 2024)
Halabi, T. ., & Zulkernine, M. . (2023). The Ultimate Battle Against Zero-Day Exploits: Toward Fully Autonomous Cyber-Physical Defense. In (pp. 256–261). Chicago, IL, USA: IEEE. http://doi.org/10.1109/SSE60056.2023.00041 (Original work published 2024)
Halabi, T. ., Chaudhry, A. ., Alqahtani, S. ., & Zulkernine, M. . (2022). A Scary Peek into The Future: Advanced Persistent Threats in Emerging Computing Environments. In (pp. 1–8). Edinburgh, United Kingdom: IEEE. http://doi.org/10.1109/DSC54232.2022.9888873 (Original work published 2024)
Halabi, T. ., Abusitta, A. ., Carvalho, G. H., & Fung, B. C. M. (2022). Incentivized Security-Aware Computation Offloading for Large-Scale Internet of Things Applications. In (pp. 1–6). http://doi.org/10.23919/SpliTech55088.2022.9854374 (Original work published 2024)
Halabi, T. ., Abusitta, A. ., Carvalho, G. H., & Fung, B. C. M. (2022). Incentivized Security-Aware Computation Offloading for Large-Scale Internet of Things Applications. In 2022 7th International Conference on Smart and Sustainable Technologies (SpliTech) (pp. 1–6).
Halabi, T. ., Haque, I. ., & Karimipour, H. . (2022). Adaptive Control for Security and Resilience of Networked Cyber-Physical Systems: Where Are We?. In 2022 IEEE 4th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA) (pp. 239–247).