Follow
Ezz Tahoun
Ezz Tahoun
Cofounder @ Cypienta.com
Verified email at uwaterloo.ca - Homepage
Title
Cited by
Cited by
Year
A look behind the curtain: traffic classification in an increasingly encrypted web
I Akbari, MA Salahuddin, L Ven, N Limam, R Boutaba, B Mathieu, ...
Proceedings of the ACM on Measurement and Analysis of Computing Systems 5 (1 …, 2021
812021
ATMoS: Autonomous threat mitigation in SDN using reinforcement learning
I Akbari, E Tahoun, MA Salahuddin, N Limam, R Boutaba
NOMS 2020-2020 IEEE/IFIP Network Operations and Management Symposium, 1-9, 2020
502020
Detecting location fraud in indoor mobile crowdsensing
Q Xu, R Zheng, E Tahoun
Proceedings of the First ACM Workshop on Mobile Crowdsensing Systems and …, 2017
72017
Atmos+: Generalizable threat mitigation in sdn using permutation equivariant and invariant deep reinforcement learning
H Tsang, I Akbari, MA Salahuddin, N Limam, R Boutaba
IEEE Communications Magazine 59 (12), 105-111, 2021
52021
MacACM: Encouraging competitive programming via mentorship and outreach
A Majumdar, E Tahoun
XRDS: Crossroads, The ACM Magazine for Students 24 (1), 14-15, 2017
32017
PrivPkt: Privacy Preserving Collaborative Encrypted Traffic Classification
E Tahoun, I Akbari
2*2019
THESIS: Harnessing the Power of Generative Models for Mobile Continuous and Implicit Authentication
E Tahoun
University of Waterloo Cheriton School of Computer Science (Cryptography …, 2021
1*2021
Leadership Lessons: Leading by influence, not authority (shortened)
E Tahoun, J Boekhorst
DOI: 10.13140/RG.2.2.33769.72801, 2020
2020
Leadership Lessons: Leading by influence, not authority
E Tahoun, J Boekhorst
2020
Beyond Explanations: Recourse via Actionable Counterfactuals
E Tahoun, A Kassis
2020
Beyond Explanations: Recourse via Actionable Counterfactuals, Extended
E Tahoun, A Kassis
2020
Beyond Explanations: Recourse via Actionable Interpretability
E Tahoun, A Kassis
2019
Exploring Strategies for Digital Security
E Tahoun, R Khedri
2017
Exploring Strategies for Digital Security Defence in Depth & Layered Security
E Tahoun, R Khedri
2017
Exploring Strategies for Digital Security Layered Security & Layered Defence in Depth
E Tahoun, R Khedri
2017
Exploring Strategies for Digital Security Defense in Depth vs Layered Security
E Tahoun, R Khedri
2017
Data Acquisition Systems: A Closer Look
E Tahoun, T Doyle
2016
Pacemaker Design (design considerations)
E Tahoun, A Wassyng
2015
Cyber Crime in the Middle East: Analysis
E Tahoun, S El-Kassas, K El-Ayat, J Maklad
2015
The system can't perform the operation now. Try again later.
Articles 1–19