Segui
Issa Khalil
Issa Khalil
Principal Scientist - Qatar Computing Research Institute (QCRI)
Email verificata su hbku.edu.qa
Titolo
Citata da
Citata da
Anno
Unmanned aerial vehicles (UAVs): A survey on civil applications and key research challenges
H Shakhatreh, AH Sawalmeh, A Al-Fuqaha, Z Dou, E Almaita, I Khalil, ...
Ieee Access 7, 48572-48634, 2019
14422019
Smart cities: A survey on data management, security, and enabling technologies
A Gharaibeh, MA Salahuddin, SJ Hussini, A Khreishah, I Khalil, M Guizani, ...
IEEE Communications Surveys & Tutorials 19 (4), 2456-2501, 2017
4942017
LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks
I Khalil, S Bagchi, NB Shroff
2005 International Conference on Dependable Systems and Networks (DSN'05 …, 2005
4322005
Cloud computing security: A survey
IM Khalil, A Khreishah, M Azeem
Computers 3 (1), 1-35, 2014
3302014
Heavy hitter estimation over set-valued data with local differential privacy
Z Qin, Y Yang, T Yu, I Khalil, X Xiao, K Ren
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
3142016
MOBIWORP: Mitigation of the wormhole attack in mobile multihop wireless networks
I Khalil, S Bagchi, NB Shroff
Ad Hoc Networks 6 (3), 344-362, 2008
2022008
A Survey on Malicious Domains Detection through DNS Data Analysis
Y Zhauniarovich, I Khalil, T Yu, M Dacier
ACM Comput. Surv 51 (4), 1-67, 2018
1682018
Generating Synthetic Decentralized Social Graphs with Local Differential Privac
Z Qin, T Yu, Y Yang, I Khalil, X Xiao, K Ren
CCS 2017, 425-438, 2017
1572017
Stream: Low overhead wireless reprogramming for sensor networks
RK Panta, I Khalil, S Bagchi
IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007
1472007
Prediction of user's web-browsing behavior: Application of markov model
MA Awad, I Khalil
IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 42 …, 2012
1432012
Liteworp: Detection and isolation of the wormhole attack in static multihop wireless networks
I Khalil, S Bagchi, NB Shroff
Computer networks 51 (13), 3750-3772, 2007
1212007
Protocol for secure and energy-efficient reprogramming of wireless multi-hop sensor networks
S Bagchi, NB Shroff, IMI Khalil, RK Panta, MD Krasniewski, JV Krogmeier
US Patent 8,107,397, 2012
1132012
Efficient 3D placement of a UAV using particle swarm optimization
H Shakhatreh, A Khreishah, A Alsarhan, I Khalil, A Sawalmeh, ...
2017 8th International Conference on Information and Communication Systems …, 2017
1122017
WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks
MY Su
Computers & Security 29 (2), 208-224, 2010
1032010
Discovering Malicious Domains through Passive DNS Data Graph Analysis
I Khalil, T Yu, B Guan
ACM AsiaCCS, 2016
982016
DICAS: detection, diagnosis and isolation of control attacks in sensor networks
I Khalil, S Bagchi, C Nina-Rotaru
First International Conference on Security and Privacy for Emerging Areas in …, 2005
942005
Stealthy attacks in wireless ad hoc networks: detection and countermeasure
I Khalil, S Bagchi
IEEE Transactions on Mobile Computing 10 (8), 1096-1112, 2010
842010
Systematization of knowledge (sok): A systematic review of software-based web phishing detection
Z Dou, I Khalil, A Khreishah, A Al-Fuqaha, M Guizani
IEEE Communications Surveys & Tutorials 19 (4), 2797-2819, 2017
822017
ECG biometric with abnormal cardiac conditions in remote monitoring system
KA Sidek, I Khalil, HF Jelinek
IEEE Transactions on systems, man, and cybernetics: systems 44 (11), 1498-1509, 2014
822014
UnMask: Utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks
I Khalil, S Bagchi, CN Rotaru, NB Shroff
Ad Hoc Networks 8 (2), 148-164, 2010
792010
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20