Issa Khalil
Issa Khalil
Principal Scientist - Qatar Computing Research Institute (QCRI)
Verified email at hbku.edu.qa
TitleCited byYear
A survey of clustering algorithms for big data: Taxonomy and empirical analysis
A Fahad, N Alshatri, Z Tari, A Alamri, I Khalil, AY Zomaya, S Foufou, ...
IEEE transactions on emerging topics in computing 2 (3), 267-279, 2014
4932014
LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks
I Khalil, S Bagchi, NB Shroff
2005 International Conference on Dependable Systems and Networks (DSN'05 …, 2005
3522005
Cloud computing security: A survey
I Khalil, A Khreishah, M Azeem
Computers 3 (1), 1-35, 2014
1632014
MOBIWORP: Mitigation of the wormhole attack in mobile multihop wireless networks
I Khalil, S Bagchi, NB Shroff
Ad Hoc Networks 6 (3), 344-362, 2008
1602008
CoCaMAAL: A cloud-oriented context-aware middleware in ambient assisted living
A Forkan, I Khalil, Z Tari
Future Generation Computer Systems 35, 114-127, 2014
1302014
Stream: Low overhead wireless reprogramming for sensor networks
RK Panta, I Khalil, S Bagchi
IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007
1302007
Smart cities: A survey on data management, security, and enabling technologies
A Gharaibeh, MA Salahuddin, SJ Hussini, A Khreishah, I Khalil, M Guizani, ...
IEEE Communications Surveys & Tutorials 19 (4), 2456-2501, 2017
1172017
Wavelet-based ECG steganography for protecting patient confidential information in point-of-care systems
A Ibaida, I Khalil
IEEE Transactions on biomedical engineering 60 (12), 3322-3330, 2013
1132013
Heavy hitter estimation over set-valued data with local differential privacy
Z Qin, Y Yang, T Yu, I Khalil, X Xiao, K Ren
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
1112016
Liteworp: Detection and isolation of the wormhole attack in static multihop wireless networks
I Khalil, S Bagchi, NB Shroff
Computer networks 51 (13), 3750-3772, 2007
1042007
Prediction of user's web-browsing behavior: Application of markov model
MA Awad, I Khalil
IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 42 …, 2012
982012
DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks.
IM Khalil, S Bagchi, C Nita-Rotaru
SecureComm, 89-100, 2005
872005
Stealthy attacks in wireless ad hoc networks: detection and countermeasure
I Khalil, S Bagchi
IEEE Transactions on Mobile Computing 10 (8), 1096-1112, 2010
672010
UnMask: Utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks
I Khalil, S Bagchi, CN Rotaru, NB Shroff
Ad Hoc Networks 8 (2), 148-164, 2010
672010
Unmanned aerial vehicles (UAVs): A survey on civil applications and key research challenges
H Shakhatreh, AH Sawalmeh, A Al-Fuqaha, Z Dou, E Almaita, I Khalil, ...
IEEE Access 7, 48572-48634, 2019
642019
Protocol for secure and energy-efficient reprogramming of wireless multi-hop sensor networks
S Bagchi, NB Shroff, IMI Khalil, RK Panta, MD Krasniewski, JV Krogmeier
US Patent 8,107,397, 2012
612012
SoftWater: Software-defined networking for next-generation underwater communication systems
IF Akyildiz, P Wang, SC Lin
Ad Hoc Networks 46, 1-11, 2016
462016
Security concerns in cloud computing
IM Khalil, A Khreishah, S Bouktif, A Ahmad
2013 10th International Conference on Information Technology: New …, 2013
462013
Consolidated Identity Management System for secure mobile cloud computing
I Khalil, A Khreishah, M Azeem
Computer Networks 65, 99-110, 2014
452014
Distributed network coding-based opportunistic routing for multicast
A Khreishah, IM Khalil, J Wu
Proceedings of the thirteenth ACM international symposium on Mobile Ad Hoc …, 2012
452012
The system can't perform the operation now. Try again later.
Articles 1–20