BibTeX records: Hussain M. J. Almohri

download as .bib file

@inproceedings{DBLP:conf/secdev/AlmohriW23,
  author       = {Hussain M. J. Almohri and
                  Layne T. Watson},
  title        = {Model-Agnostic Federated Learning for Privacy-Preserving Systems},
  booktitle    = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA,
                  October 18-20, 2023},
  pages        = {99--105},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SecDev56634.2023.00024},
  doi          = {10.1109/SECDEV56634.2023.00024},
  timestamp    = {Tue, 21 Nov 2023 22:37:15 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/AlmohriW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/taas/AlmohriWEB22,
  author       = {Hussain M. J. Almohri and
                  Layne T. Watson and
                  David Evans and
                  Stephen C. Billups},
  title        = {Dynamic System Diversification for Securing Cloud-based IoT Subnetworks},
  journal      = {{ACM} Trans. Auton. Adapt. Syst.},
  volume       = {17},
  pages        = {2:1--2:23},
  year         = {2022},
  url          = {https://doi.org/10.1145/3547350},
  doi          = {10.1145/3547350},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/taas/AlmohriWEB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/ElishEA22,
  author       = {Karim O. Elish and
                  Mahmoud O. Elish and
                  Hussain M. J. Almohri},
  title        = {Lightweight, Effective Detection and Characterization of Mobile Malware
                  Families},
  journal      = {{IEEE} Trans. Computers},
  volume       = {71},
  number       = {11},
  pages        = {2982--2995},
  year         = {2022},
  url          = {https://doi.org/10.1109/TC.2022.3143439},
  doi          = {10.1109/TC.2022.3143439},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/ElishEA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AlmohriWAA21,
  author       = {Hussain M. J. Almohri and
                  Layne T. Watson and
                  Homa Alemzadeh and
                  Mohammad Al{-}Mutawa},
  title        = {On Parallel Real-Time Security Improvement Using Mixed-Integer Programming},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {58824--58837},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3073089},
  doi          = {10.1109/ACCESS.2021.3073089},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/AlmohriWAA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/AlmohriAAE20,
  author       = {Hussain M. J. Almohri and
                  Mohammad Al{-}Mutawa and
                  Mahmoud Alawadh and
                  Karim O. Elish},
  title        = {A Client Bootstrapping Protocol for DoS Attack Mitigation on Entry
                  Point Services in the Cloud},
  journal      = {Secur. Commun. Networks},
  volume       = {2020},
  pages        = {8873258:1--8873258:12},
  year         = {2020},
  url          = {https://doi.org/10.1155/2020/8873258},
  doi          = {10.1155/2020/8873258},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/AlmohriAAE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AlmohriW020,
  author       = {Hussain M. J. Almohri and
                  Layne T. Watson and
                  David Evans},
  title        = {Predictability of {IP} Address Allocations for Cloud Computing Platforms},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {500--511},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2924555},
  doi          = {10.1109/TIFS.2019.2924555},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AlmohriW020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AlmohriWE20,
  author       = {Hussain M. J. Almohri and
                  Layne T. Watson and
                  David Evans},
  title        = {An Attack-Resilient Architecture for the Internet of Things},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3940--3954},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2994777},
  doi          = {10.1109/TIFS.2020.2994777},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AlmohriWE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2004-06933,
  author       = {Mohammad Qasem and
                  Hussain M. J. Almohri},
  title        = {An efficient deception architecture for cloud-based virtual networks},
  journal      = {CoRR},
  volume       = {abs/2004.06933},
  year         = {2020},
  url          = {https://arxiv.org/abs/2004.06933},
  eprinttype    = {arXiv},
  eprint       = {2004.06933},
  timestamp    = {Tue, 21 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2004-06933.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/BlancHEA19,
  author       = {William Blanc and
                  Lina G. Hashem and
                  Karim O. Elish and
                  Hussain M. J. Almohri},
  editor       = {Chaitanya K. Baru and
                  Jun Huan and
                  Latifur Khan and
                  Xiaohua Hu and
                  Ronay Ak and
                  Yuanyuan Tian and
                  Roger S. Barga and
                  Carlo Zaniolo and
                  Kisung Lee and
                  Yanfang (Fanny) Ye},
  title        = {Identifying Android Malware Families Using Android-Oriented Metrics},
  booktitle    = {2019 {IEEE} International Conference on Big Data {(IEEE} BigData),
                  Los Angeles, CA, USA, December 9-12, 2019},
  pages        = {4708--4713},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/BigData47090.2019.9005669},
  doi          = {10.1109/BIGDATA47090.2019.9005669},
  timestamp    = {Tue, 18 Oct 2022 14:44:48 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdataconf/BlancHEA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AlmohriWE18,
  author       = {Hussain M. J. Almohri and
                  Layne T. Watson and
                  David Evans},
  title        = {Misery Digraphs: Delaying Intrusion Attacks in Obscure Clouds},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {6},
  pages        = {1361--1375},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2779436},
  doi          = {10.1109/TIFS.2017.2779436},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AlmohriWE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/Almohri018,
  author       = {Hussain M. J. Almohri and
                  David Evans},
  editor       = {Ziming Zhao and
                  Gail{-}Joon Ahn and
                  Ram Krishnan and
                  Gabriel Ghinita},
  title        = {Fidelius Charm: Isolating Unsafe Rust Code},
  booktitle    = {Proceedings of the Eighth {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2018, Tempe, AZ, USA, March 19-21,
                  2018},
  pages        = {248--255},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3176258.3176330},
  doi          = {10.1145/3176258.3176330},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/Almohri018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chase/AlmohriCYA17,
  author       = {Hussain M. J. Almohri and
                  Long Cheng and
                  Danfeng Yao and
                  Homa Alemzadeh},
  editor       = {Paolo Bonato and
                  Honggang Wang},
  title        = {On Threat Modeling and Mitigation of Medical Cyber-Physical Systems},
  booktitle    = {Proceedings of the Second {IEEE/ACM} International Conference on Connected
                  Health: Applications, Systems and Engineering Technologies, {CHASE}
                  2017, Philadelphia, PA, USA, July 17-19, 2017},
  pages        = {114--119},
  publisher    = {{IEEE} Computer Society / {ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CHASE.2017.69},
  doi          = {10.1109/CHASE.2017.69},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/chase/AlmohriCYA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/AlmohriA17,
  author       = {Hussain M. J. Almohri and
                  Sayed A. Almohri},
  title        = {Security Evaluation by Arrogance: Saving Time and Money},
  booktitle    = {1st {IEEE/ACM} International Workshop on Software Engineeting for
                  Startups, SoftStart@ICSE 2017, Buenos Aires, Argentina, May 21, 2017},
  pages        = {12--16},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/SoftStart.2017.1},
  doi          = {10.1109/SOFTSTART.2017.1},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/AlmohriA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AlmohriWYO16,
  author       = {Hussain M. J. Almohri and
                  Layne T. Watson and
                  Danfeng Yao and
                  Xinming Ou},
  title        = {Security Optimization of Dynamic Networks with Probabilistic Graph
                  Modeling and Linear Programming},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {13},
  number       = {4},
  pages        = {474--487},
  year         = {2016},
  url          = {https://doi.org/10.1109/TDSC.2015.2411264},
  doi          = {10.1109/TDSC.2015.2411264},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/AlmohriWYO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AlmohriYK14,
  author       = {Hussain M. J. Almohri and
                  Danfeng Yao and
                  Dennis G. Kafura},
  title        = {Process Authentication for High System Assurance},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {2},
  pages        = {168--180},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2013.29},
  doi          = {10.1109/TDSC.2013.29},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/AlmohriYK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/AlmohriYK14,
  author       = {Hussain M. J. Almohri and
                  Danfeng (Daphne) Yao and
                  Dennis G. Kafura},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Jaehong Park},
  title        = {DroidBarrier: know what is executing on your android},
  booktitle    = {Fourth {ACM} Conference on Data and Application Security and Privacy,
                  CODASPY'14, San Antonio, TX, {USA} - March 03 - 05, 2014},
  pages        = {257--264},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2557547.2557571},
  doi          = {10.1145/2557547.2557571},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/AlmohriYK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/AlmohriYK12,
  author       = {Hussain M. J. Almohri and
                  Danfeng (Daphne) Yao and
                  Dennis G. Kafura},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu},
  title        = {Identifying native applications with high assurance},
  booktitle    = {Second {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  pages        = {275--282},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2133601.2133635},
  doi          = {10.1145/2133601.2133635},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/AlmohriYK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/oopsla/AlmohriB10,
  author       = {Hussain M. J. Almohri and
                  Osman Balci},
  editor       = {Eli Tilevich and
                  Patrick Eugster},
  title        = {A simulation-based software design framework for network-centric and
                  parallel systems},
  booktitle    = {{SPLASH} Workshop on Programming Support Innovations for Emerging
                  Distributed Applications {(PSI} EtA - {\(\Psi\)}{\textTheta} 2010),
                  October 17, 2010, Reno/Tahoe, Nevada, {USA}},
  pages        = {5},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1940747.1940752},
  doi          = {10.1145/1940747.1940752},
  timestamp    = {Mon, 12 Jul 2021 15:34:15 +0200},
  biburl       = {https://dblp.org/rec/conf/oopsla/AlmohriB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics