A look behind the curtain: traffic classification in an increasingly encrypted web I Akbari, MA Salahuddin, L Ven, N Limam, R Boutaba, B Mathieu, ... Proceedings of the ACM on Measurement and Analysis of Computing Systems 5 (1 …, 2021 | 81 | 2021 |
ATMoS: Autonomous threat mitigation in SDN using reinforcement learning I Akbari, E Tahoun, MA Salahuddin, N Limam, R Boutaba NOMS 2020-2020 IEEE/IFIP Network Operations and Management Symposium, 1-9, 2020 | 50 | 2020 |
Detecting location fraud in indoor mobile crowdsensing Q Xu, R Zheng, E Tahoun Proceedings of the First ACM Workshop on Mobile Crowdsensing Systems and …, 2017 | 7 | 2017 |
Atmos+: Generalizable threat mitigation in sdn using permutation equivariant and invariant deep reinforcement learning H Tsang, I Akbari, MA Salahuddin, N Limam, R Boutaba IEEE Communications Magazine 59 (12), 105-111, 2021 | 5 | 2021 |
MacACM: Encouraging competitive programming via mentorship and outreach A Majumdar, E Tahoun XRDS: Crossroads, The ACM Magazine for Students 24 (1), 14-15, 2017 | 3 | 2017 |
PrivPkt: Privacy Preserving Collaborative Encrypted Traffic Classification E Tahoun, I Akbari | 2* | 2019 |
THESIS: Harnessing the Power of Generative Models for Mobile Continuous and Implicit Authentication E Tahoun University of Waterloo Cheriton School of Computer Science (Cryptography …, 2021 | 1* | 2021 |
Leadership Lessons: Leading by influence, not authority (shortened) E Tahoun, J Boekhorst DOI: 10.13140/RG.2.2.33769.72801, 2020 | | 2020 |
Leadership Lessons: Leading by influence, not authority E Tahoun, J Boekhorst | | 2020 |
Beyond Explanations: Recourse via Actionable Counterfactuals E Tahoun, A Kassis | | 2020 |
Beyond Explanations: Recourse via Actionable Counterfactuals, Extended E Tahoun, A Kassis | | 2020 |
Beyond Explanations: Recourse via Actionable Interpretability E Tahoun, A Kassis | | 2019 |
Exploring Strategies for Digital Security E Tahoun, R Khedri | | 2017 |
Exploring Strategies for Digital Security Defence in Depth & Layered Security E Tahoun, R Khedri | | 2017 |
Exploring Strategies for Digital Security Layered Security & Layered Defence in Depth E Tahoun, R Khedri | | 2017 |
Exploring Strategies for Digital Security Defense in Depth vs Layered Security E Tahoun, R Khedri | | 2017 |
Data Acquisition Systems: A Closer Look E Tahoun, T Doyle | | 2016 |
Pacemaker Design (design considerations) E Tahoun, A Wassyng | | 2015 |
Cyber Crime in the Middle East: Analysis E Tahoun, S El-Kassas, K El-Ayat, J Maklad | | 2015 |