BibTeX records: Hussain M. J. Almohri

download as .bib file

@article{DBLP:journals/tifs/AlmohriW020,
  author    = {Hussain M. J. Almohri and
               Layne T. Watson and
               David Evans},
  title     = {Predictability of {IP} Address Allocations for Cloud Computing Platforms},
  journal   = {{IEEE} Trans. Information Forensics and Security},
  volume    = {15},
  pages     = {500--511},
  year      = {2020},
  url       = {https://doi.org/10.1109/TIFS.2019.2924555},
  doi       = {10.1109/TIFS.2019.2924555},
  timestamp = {Thu, 07 Nov 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/AlmohriW020.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2004-06933,
  author    = {Mohammad Qasem and
               Hussain M. J. Almohri},
  title     = {An efficient deception architecture for cloud-based virtual networks},
  journal   = {CoRR},
  volume    = {abs/2004.06933},
  year      = {2020},
  url       = {https://arxiv.org/abs/2004.06933},
  archivePrefix = {arXiv},
  eprint    = {2004.06933},
  timestamp = {Tue, 21 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/corr/abs-2004-06933.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/BlancHEA19,
  author    = {William Blanc and
               Lina G. Hashem and
               Karim O. Elish and
               Hussain M. J. Almohri},
  title     = {Identifying Android Malware Families Using Android-Oriented Metrics},
  booktitle = {2019 {IEEE} International Conference on Big Data (Big Data), Los Angeles,
               CA, USA, December 9-12, 2019},
  pages     = {4708--4713},
  publisher = {{IEEE}},
  year      = {2019},
  url       = {https://doi.org/10.1109/BigData47090.2019.9005669},
  doi       = {10.1109/BigData47090.2019.9005669},
  timestamp = {Fri, 06 Mar 2020 10:39:27 +0100},
  biburl    = {https://dblp.org/rec/conf/bigdataconf/BlancHEA19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AlmohriWE18,
  author    = {Hussain M. J. Almohri and
               Layne T. Watson and
               David Evans},
  title     = {Misery Digraphs: Delaying Intrusion Attacks in Obscure Clouds},
  journal   = {{IEEE} Trans. Information Forensics and Security},
  volume    = {13},
  number    = {6},
  pages     = {1361--1375},
  year      = {2018},
  url       = {https://doi.org/10.1109/TIFS.2017.2779436},
  doi       = {10.1109/TIFS.2017.2779436},
  timestamp = {Tue, 13 Mar 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tifs/AlmohriWE18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/Almohri018,
  author    = {Hussain M. J. Almohri and
               David Evans},
  editor    = {Ziming Zhao and
               Gail{-}Joon Ahn and
               Ram Krishnan and
               Gabriel Ghinita},
  title     = {Fidelius Charm: Isolating Unsafe Rust Code},
  booktitle = {Proceedings of the Eighth {ACM} Conference on Data and Application
               Security and Privacy, {CODASPY} 2018, Tempe, AZ, USA, March 19-21,
               2018},
  pages     = {248--255},
  publisher = {{ACM}},
  year      = {2018},
  url       = {https://doi.org/10.1145/3176258.3176330},
  doi       = {10.1145/3176258.3176330},
  timestamp = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/codaspy/Almohri018.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chase/AlmohriCYA17,
  author    = {Hussain M. J. Almohri and
               Long Cheng and
               Danfeng Yao and
               Homa Alemzadeh},
  editor    = {Paolo Bonato and
               Honggang Wang},
  title     = {On Threat Modeling and Mitigation of Medical Cyber-Physical Systems},
  booktitle = {Proceedings of the Second {IEEE/ACM} International Conference on Connected
               Health: Applications, Systems and Engineering Technologies, {CHASE}
               2017, Philadelphia, PA, USA, July 17-19, 2017},
  pages     = {114--119},
  publisher = {{IEEE} Computer Society / {ACM}},
  year      = {2017},
  url       = {https://doi.org/10.1109/CHASE.2017.69},
  doi       = {10.1109/CHASE.2017.69},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/conf/chase/AlmohriCYA17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/AlmohriA17,
  author    = {Hussain M. J. Almohri and
               Sayed A. Almohri},
  title     = {Security Evaluation by Arrogance: Saving Time and Money},
  booktitle = {1st {IEEE/ACM} International Workshop on Software Engineeting for
               Startups, SoftStart@ICSE 2017, Buenos Aires, Argentina, May 21, 2017},
  pages     = {12--16},
  publisher = {{IEEE}},
  year      = {2017},
  url       = {https://doi.org/10.1109/SoftStart.2017.1},
  doi       = {10.1109/SoftStart.2017.1},
  timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl    = {https://dblp.org/rec/conf/icse/AlmohriA17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AlmohriWYO16,
  author    = {Hussain M. J. Almohri and
               Layne T. Watson and
               Danfeng Yao and
               Xinming Ou},
  title     = {Security Optimization of Dynamic Networks with Probabilistic Graph
               Modeling and Linear Programming},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {13},
  number    = {4},
  pages     = {474--487},
  year      = {2016},
  url       = {https://doi.org/10.1109/TDSC.2015.2411264},
  doi       = {10.1109/TDSC.2015.2411264},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/AlmohriWYO16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AlmohriYK14,
  author    = {Hussain M. J. Almohri and
               Danfeng Yao and
               Dennis G. Kafura},
  title     = {Process Authentication for High System Assurance},
  journal   = {{IEEE} Trans. Dependable Secur. Comput.},
  volume    = {11},
  number    = {2},
  pages     = {168--180},
  year      = {2014},
  url       = {https://doi.org/10.1109/TDSC.2013.29},
  doi       = {10.1109/TDSC.2013.29},
  timestamp = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/tdsc/AlmohriYK14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/AlmohriYK14,
  author    = {Hussain M. J. Almohri and
               Danfeng (Daphne) Yao and
               Dennis G. Kafura},
  editor    = {Elisa Bertino and
               Ravi S. Sandhu and
               Jaehong Park},
  title     = {DroidBarrier: know what is executing on your android},
  booktitle = {Fourth {ACM} Conference on Data and Application Security and Privacy,
               CODASPY'14, San Antonio, TX, {USA} - March 03 - 05, 2014},
  pages     = {257--264},
  publisher = {{ACM}},
  year      = {2014},
  url       = {https://doi.org/10.1145/2557547.2557571},
  doi       = {10.1145/2557547.2557571},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/codaspy/AlmohriYK14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/AlmohriYK12,
  author    = {Hussain M. J. Almohri and
               Danfeng (Daphne) Yao and
               Dennis G. Kafura},
  editor    = {Elisa Bertino and
               Ravi S. Sandhu},
  title     = {Identifying native applications with high assurance},
  booktitle = {Second {ACM} Conference on Data and Application Security and Privacy,
               {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  pages     = {275--282},
  publisher = {{ACM}},
  year      = {2012},
  url       = {https://doi.org/10.1145/2133601.2133635},
  doi       = {10.1145/2133601.2133635},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/codaspy/AlmohriYK12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/oopsla/AlmohriB10,
  author    = {Hussain M. J. Almohri and
               Osman Balci},
  editor    = {Eli Tilevich and
               Patrick Eugster},
  title     = {A simulation-based software design framework for network-centric and
               parallel systems},
  booktitle = {{SPLASH} Workshop on Programming Support Innovations for Emerging
               Distributed Applications {(PSI} EtA - {\(\Psi\)}{\textTheta} 2010),
               October 17, 2010, Reno/Tahoe, Nevada, {USA}},
  pages     = {5},
  publisher = {{ACM}},
  year      = {2010},
  url       = {https://doi.org/10.1145/1940747.1940752},
  doi       = {10.1145/1940747.1940752},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/oopsla/AlmohriB10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics