Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Hussain M. J. Almohri
@inproceedings{DBLP:conf/secdev/AlmohriW23, author = {Hussain M. J. Almohri and Layne T. Watson}, title = {Model-Agnostic Federated Learning for Privacy-Preserving Systems}, booktitle = {{IEEE} Secure Development Conference, SecDev 2023, Atlanta, GA, USA, October 18-20, 2023}, pages = {99--105}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SecDev56634.2023.00024}, doi = {10.1109/SECDEV56634.2023.00024}, timestamp = {Tue, 21 Nov 2023 22:37:15 +0100}, biburl = {https://dblp.org/rec/conf/secdev/AlmohriW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/taas/AlmohriWEB22, author = {Hussain M. J. Almohri and Layne T. Watson and David Evans and Stephen C. Billups}, title = {Dynamic System Diversification for Securing Cloud-based IoT Subnetworks}, journal = {{ACM} Trans. Auton. Adapt. Syst.}, volume = {17}, pages = {2:1--2:23}, year = {2022}, url = {https://doi.org/10.1145/3547350}, doi = {10.1145/3547350}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/taas/AlmohriWEB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/ElishEA22, author = {Karim O. Elish and Mahmoud O. Elish and Hussain M. J. Almohri}, title = {Lightweight, Effective Detection and Characterization of Mobile Malware Families}, journal = {{IEEE} Trans. Computers}, volume = {71}, number = {11}, pages = {2982--2995}, year = {2022}, url = {https://doi.org/10.1109/TC.2022.3143439}, doi = {10.1109/TC.2022.3143439}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tc/ElishEA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AlmohriWAA21, author = {Hussain M. J. Almohri and Layne T. Watson and Homa Alemzadeh and Mohammad Al{-}Mutawa}, title = {On Parallel Real-Time Security Improvement Using Mixed-Integer Programming}, journal = {{IEEE} Access}, volume = {9}, pages = {58824--58837}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3073089}, doi = {10.1109/ACCESS.2021.3073089}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/AlmohriWAA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/AlmohriAAE20, author = {Hussain M. J. Almohri and Mohammad Al{-}Mutawa and Mahmoud Alawadh and Karim O. Elish}, title = {A Client Bootstrapping Protocol for DoS Attack Mitigation on Entry Point Services in the Cloud}, journal = {Secur. Commun. Networks}, volume = {2020}, pages = {8873258:1--8873258:12}, year = {2020}, url = {https://doi.org/10.1155/2020/8873258}, doi = {10.1155/2020/8873258}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/AlmohriAAE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AlmohriW020, author = {Hussain M. J. Almohri and Layne T. Watson and David Evans}, title = {Predictability of {IP} Address Allocations for Cloud Computing Platforms}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {500--511}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2924555}, doi = {10.1109/TIFS.2019.2924555}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AlmohriW020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AlmohriWE20, author = {Hussain M. J. Almohri and Layne T. Watson and David Evans}, title = {An Attack-Resilient Architecture for the Internet of Things}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3940--3954}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2994777}, doi = {10.1109/TIFS.2020.2994777}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AlmohriWE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2004-06933, author = {Mohammad Qasem and Hussain M. J. Almohri}, title = {An efficient deception architecture for cloud-based virtual networks}, journal = {CoRR}, volume = {abs/2004.06933}, year = {2020}, url = {https://arxiv.org/abs/2004.06933}, eprinttype = {arXiv}, eprint = {2004.06933}, timestamp = {Tue, 21 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2004-06933.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/BlancHEA19, author = {William Blanc and Lina G. Hashem and Karim O. Elish and Hussain M. J. Almohri}, editor = {Chaitanya K. Baru and Jun Huan and Latifur Khan and Xiaohua Hu and Ronay Ak and Yuanyuan Tian and Roger S. Barga and Carlo Zaniolo and Kisung Lee and Yanfang (Fanny) Ye}, title = {Identifying Android Malware Families Using Android-Oriented Metrics}, booktitle = {2019 {IEEE} International Conference on Big Data {(IEEE} BigData), Los Angeles, CA, USA, December 9-12, 2019}, pages = {4708--4713}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/BigData47090.2019.9005669}, doi = {10.1109/BIGDATA47090.2019.9005669}, timestamp = {Tue, 18 Oct 2022 14:44:48 +0200}, biburl = {https://dblp.org/rec/conf/bigdataconf/BlancHEA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AlmohriWE18, author = {Hussain M. J. Almohri and Layne T. Watson and David Evans}, title = {Misery Digraphs: Delaying Intrusion Attacks in Obscure Clouds}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {6}, pages = {1361--1375}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2779436}, doi = {10.1109/TIFS.2017.2779436}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AlmohriWE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/Almohri018, author = {Hussain M. J. Almohri and David Evans}, editor = {Ziming Zhao and Gail{-}Joon Ahn and Ram Krishnan and Gabriel Ghinita}, title = {Fidelius Charm: Isolating Unsafe Rust Code}, booktitle = {Proceedings of the Eighth {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2018, Tempe, AZ, USA, March 19-21, 2018}, pages = {248--255}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3176258.3176330}, doi = {10.1145/3176258.3176330}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/Almohri018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chase/AlmohriCYA17, author = {Hussain M. J. Almohri and Long Cheng and Danfeng Yao and Homa Alemzadeh}, editor = {Paolo Bonato and Honggang Wang}, title = {On Threat Modeling and Mitigation of Medical Cyber-Physical Systems}, booktitle = {Proceedings of the Second {IEEE/ACM} International Conference on Connected Health: Applications, Systems and Engineering Technologies, {CHASE} 2017, Philadelphia, PA, USA, July 17-19, 2017}, pages = {114--119}, publisher = {{IEEE} Computer Society / {ACM}}, year = {2017}, url = {https://doi.org/10.1109/CHASE.2017.69}, doi = {10.1109/CHASE.2017.69}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/chase/AlmohriCYA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/AlmohriA17, author = {Hussain M. J. Almohri and Sayed A. Almohri}, title = {Security Evaluation by Arrogance: Saving Time and Money}, booktitle = {1st {IEEE/ACM} International Workshop on Software Engineeting for Startups, SoftStart@ICSE 2017, Buenos Aires, Argentina, May 21, 2017}, pages = {12--16}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/SoftStart.2017.1}, doi = {10.1109/SOFTSTART.2017.1}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/AlmohriA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AlmohriWYO16, author = {Hussain M. J. Almohri and Layne T. Watson and Danfeng Yao and Xinming Ou}, title = {Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {4}, pages = {474--487}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2411264}, doi = {10.1109/TDSC.2015.2411264}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/AlmohriWYO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AlmohriYK14, author = {Hussain M. J. Almohri and Danfeng Yao and Dennis G. Kafura}, title = {Process Authentication for High System Assurance}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {2}, pages = {168--180}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.29}, doi = {10.1109/TDSC.2013.29}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/AlmohriYK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/AlmohriYK14, author = {Hussain M. J. Almohri and Danfeng (Daphne) Yao and Dennis G. Kafura}, editor = {Elisa Bertino and Ravi S. Sandhu and Jaehong Park}, title = {DroidBarrier: know what is executing on your android}, booktitle = {Fourth {ACM} Conference on Data and Application Security and Privacy, CODASPY'14, San Antonio, TX, {USA} - March 03 - 05, 2014}, pages = {257--264}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2557547.2557571}, doi = {10.1145/2557547.2557571}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/AlmohriYK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/AlmohriYK12, author = {Hussain M. J. Almohri and Danfeng (Daphne) Yao and Dennis G. Kafura}, editor = {Elisa Bertino and Ravi S. Sandhu}, title = {Identifying native applications with high assurance}, booktitle = {Second {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012}, pages = {275--282}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2133601.2133635}, doi = {10.1145/2133601.2133635}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/AlmohriYK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/oopsla/AlmohriB10, author = {Hussain M. J. Almohri and Osman Balci}, editor = {Eli Tilevich and Patrick Eugster}, title = {A simulation-based software design framework for network-centric and parallel systems}, booktitle = {{SPLASH} Workshop on Programming Support Innovations for Emerging Distributed Applications {(PSI} EtA - {\(\Psi\)}{\textTheta} 2010), October 17, 2010, Reno/Tahoe, Nevada, {USA}}, pages = {5}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1940747.1940752}, doi = {10.1145/1940747.1940752}, timestamp = {Mon, 12 Jul 2021 15:34:15 +0200}, biburl = {https://dblp.org/rec/conf/oopsla/AlmohriB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.