BibTeX records: Hussain M. J. Almohri

download as .bib file

@article{DBLP:journals/tifs/AlmohriWE18,
  author    = {Hussain M. J. Almohri and
               Layne T. Watson and
               David Evans},
  title     = {Misery Digraphs: Delaying Intrusion Attacks in Obscure Clouds},
  journal   = {{IEEE} Trans. Information Forensics and Security},
  volume    = {13},
  number    = {6},
  pages     = {1361--1375},
  year      = {2018},
  url       = {https://doi.org/10.1109/TIFS.2017.2779436},
  doi       = {10.1109/TIFS.2017.2779436},
  timestamp = {Tue, 13 Mar 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tifs/AlmohriWE18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/Almohri018,
  author    = {Hussain M. J. Almohri and
               David Evans},
  title     = {Fidelius Charm: Isolating Unsafe Rust Code},
  booktitle = {Proceedings of the Eighth {ACM} Conference on Data and Application
               Security and Privacy, {CODASPY} 2018, Tempe, AZ, USA, March 19-21,
               2018},
  pages     = {248--255},
  year      = {2018},
  crossref  = {DBLP:conf/codaspy/2018},
  url       = {https://doi.org/10.1145/3176258.3176330},
  doi       = {10.1145/3176258.3176330},
  timestamp = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/codaspy/Almohri018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chase/AlmohriCYA17,
  author    = {Hussain M. J. Almohri and
               Long Cheng and
               Danfeng Yao and
               Homa Alemzadeh},
  title     = {On Threat Modeling and Mitigation of Medical Cyber-Physical Systems},
  booktitle = {Proceedings of the Second {IEEE/ACM} International Conference on Connected
               Health: Applications, Systems and Engineering Technologies, {CHASE}
               2017, Philadelphia, PA, USA, July 17-19, 2017},
  pages     = {114--119},
  year      = {2017},
  crossref  = {DBLP:conf/chase/2017},
  url       = {https://doi.org/10.1109/CHASE.2017.69},
  doi       = {10.1109/CHASE.2017.69},
  timestamp = {Mon, 23 Apr 2018 11:22:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/chase/AlmohriCYA17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/AlmohriA17,
  author    = {Hussain M. J. Almohri and
               Sayed A. Almohri},
  title     = {Security Evaluation by Arrogance: Saving Time and Money},
  booktitle = {1st {IEEE/ACM} International Workshop on Software Engineeting for
               Startups, SoftStart@ICSE 2017, Buenos Aires, Argentina, May 21, 2017},
  pages     = {12--16},
  year      = {2017},
  crossref  = {DBLP:conf/icse/2017softstart},
  url       = {https://doi.org/10.1109/SoftStart.2017.1},
  doi       = {10.1109/SoftStart.2017.1},
  timestamp = {Wed, 06 Sep 2017 13:05:02 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icse/AlmohriA17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AlmohriWYO16,
  author    = {Hussain M. J. Almohri and
               Layne T. Watson and
               Danfeng Yao and
               Xinming Ou},
  title     = {Security Optimization of Dynamic Networks with Probabilistic Graph
               Modeling and Linear Programming},
  journal   = {{IEEE} Trans. Dependable Sec. Comput.},
  volume    = {13},
  number    = {4},
  pages     = {474--487},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2015.2411264},
  doi       = {10.1109/TDSC.2015.2411264},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tdsc/AlmohriWYO16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AlmohriYK14,
  author    = {Hussain M. J. Almohri and
               Danfeng Yao and
               Dennis G. Kafura},
  title     = {Process Authentication for High System Assurance},
  journal   = {{IEEE} Trans. Dependable Sec. Comput.},
  volume    = {11},
  number    = {2},
  pages     = {168--180},
  year      = {2014},
  url       = {https://doi.org/10.1109/TDSC.2013.29},
  doi       = {10.1109/TDSC.2013.29},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tdsc/AlmohriYK14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/AlmohriYK14,
  author    = {Hussain M. J. Almohri and
               Danfeng (Daphne) Yao and
               Dennis G. Kafura},
  title     = {DroidBarrier: know what is executing on your android},
  booktitle = {Fourth {ACM} Conference on Data and Application Security and Privacy,
               CODASPY'14, San Antonio, TX, {USA} - March 03 - 05, 2014},
  pages     = {257--264},
  year      = {2014},
  crossref  = {DBLP:conf/codaspy/2014},
  url       = {https://doi.org/10.1145/2557547.2557571},
  doi       = {10.1145/2557547.2557571},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/codaspy/AlmohriYK14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/AlmohriYK12,
  author    = {Hussain M. J. Almohri and
               Danfeng (Daphne) Yao and
               Dennis G. Kafura},
  title     = {Identifying native applications with high assurance},
  booktitle = {Second {ACM} Conference on Data and Application Security and Privacy,
               {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  pages     = {275--282},
  year      = {2012},
  crossref  = {DBLP:conf/codaspy/2012},
  url       = {https://doi.org/10.1145/2133601.2133635},
  doi       = {10.1145/2133601.2133635},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/codaspy/AlmohriYK12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/oopsla/AlmohriB10,
  author    = {Hussain M. J. Almohri and
               Osman Balci},
  title     = {A simulation-based software design framework for network-centric and
               parallel systems},
  booktitle = {{SPLASH} Workshop on Programming Support Innovations for Emerging
               Distributed Applications {(PSI} EtA - {\(\Psi\)}{\textTheta} 2010),
               October 17, 2010, Reno/Tahoe, Nevada, {USA}},
  pages     = {5},
  year      = {2010},
  crossref  = {DBLP:conf/oopsla/2010psieta},
  url       = {https://doi.org/10.1145/1940747.1940752},
  doi       = {10.1145/1940747.1940752},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/oopsla/AlmohriB10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2018,
  editor    = {Ziming Zhao and
               Gail{-}Joon Ahn and
               Ram Krishnan and
               Gabriel Ghinita},
  title     = {Proceedings of the Eighth {ACM} Conference on Data and Application
               Security and Privacy, {CODASPY} 2018, Tempe, AZ, USA, March 19-21,
               2018},
  publisher = {{ACM}},
  year      = {2018},
  url       = {http://dl.acm.org/citation.cfm?id=3176258},
  timestamp = {Wed, 08 Aug 2018 06:19:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/codaspy/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/chase/2017,
  editor    = {Paolo Bonato and
               Honggang Wang},
  title     = {Proceedings of the Second {IEEE/ACM} International Conference on Connected
               Health: Applications, Systems and Engineering Technologies, {CHASE}
               2017, Philadelphia, PA, USA, July 17-19, 2017},
  publisher = {{IEEE} Computer Society / {ACM}},
  year      = {2017},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8010607},
  isbn      = {978-1-5090-4722-2},
  timestamp = {Mon, 23 Apr 2018 11:22:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/chase/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icse/2017softstart,
  title     = {1st {IEEE/ACM} International Workshop on Software Engineeting for
               Startups, SoftStart@ICSE 2017, Buenos Aires, Argentina, May 21, 2017},
  publisher = {{IEEE}},
  year      = {2017},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7963948},
  isbn      = {978-1-5386-2801-0},
  timestamp = {Wed, 06 Sep 2017 13:05:02 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icse/2017softstart},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2014,
  editor    = {Elisa Bertino and
               Ravi S. Sandhu and
               Jaehong Park},
  title     = {Fourth {ACM} Conference on Data and Application Security and Privacy,
               CODASPY'14, San Antonio, TX, {USA} - March 03 - 05, 2014},
  publisher = {{ACM}},
  year      = {2014},
  url       = {http://dl.acm.org/citation.cfm?id=2557547},
  isbn      = {978-1-4503-2278-2},
  timestamp = {Fri, 14 Mar 2014 10:51:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/codaspy/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2012,
  editor    = {Elisa Bertino and
               Ravi S. Sandhu},
  title     = {Second {ACM} Conference on Data and Application Security and Privacy,
               {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  publisher = {{ACM}},
  year      = {2012},
  url       = {http://dl.acm.org/citation.cfm?id=2133601},
  isbn      = {978-1-4503-1091-8},
  timestamp = {Tue, 20 Mar 2012 08:30:26 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/codaspy/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/oopsla/2010psieta,
  editor    = {Eli Tilevich and
               Patrick Eugster},
  title     = {{SPLASH} Workshop on Programming Support Innovations for Emerging
               Distributed Applications {(PSI} EtA - {\(\Psi\)}{\textTheta} 2010),
               October 17, 2010, Reno/Tahoe, Nevada, {USA}},
  publisher = {{ACM}},
  year      = {2010},
  isbn      = {978-1-4503-0544-0},
  timestamp = {Tue, 06 Dec 2011 21:08:52 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/oopsla/2010psieta},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier