Comparative study on range free localization algorithms E Shakshuki, AA Elkhail, I Nemer, M Adam, T Sheltami Procedia Computer Science 151, 501-510, 2019 | 71 | 2019 |
Internet of things for healthcare monitoring applications based on RFID clustering scheme A Abuelkhail, U Baroudi, M Raad, T Sheltami Wireless Networks 27 (1), 747-763, 2021 | 66 | 2021 |
Vehicle security: A survey of security issues and vulnerabilities, malware attacks and defenses AA Elkhail, RUD Refat, R Habre, A Hafeez, A Bacha, H Malik IEEE Access 9, 162401-162437, 2021 | 61 | 2021 |
Performance evaluation of range-free localization algorithms for wireless sensor networks I Nemer, T Sheltami, E Shakshuki, AA Elkhail, M Adam Personal and Ubiquitous Computing 25 (1), 177-203, 2021 | 55 | 2021 |
Detecting can bus intrusion by applying machine learning method to graph based features RUD Refat, AA Elkhail, A Hafeez, H Malik Intelligent Systems and Applications: Proceedings of the 2021 Intelligent …, 2022 | 36 | 2022 |
A cross-stack approach towards defending against cryptojacking N Lachtar, AA Elkhail, A Bacha, H Malik IEEE Computer Architecture Letters 19 (2), 126-129, 2020 | 32 | 2020 |
On relating code smells to security vulnerabilities AA Elkhail, T Cerny 2019 IEEE 5th intl conference on big data security on cloud (BigDataSecurity …, 2019 | 18 | 2019 |
Seamlessly safeguarding data against ransomware attacks AA Elkhail, N Lachtar, D Ibdah, R Aslam, H Khan, A Bacha, H Malik IEEE Transactions on Dependable and Secure Computing 20 (1), 1-16, 2023 | 15 | 2023 |
Machine learning for automotive cybersecurity: Challenges, opportunities and future directions RUD Refat, AA Elkhail, H Malik AI-enabled Technologies for Autonomous and Connected Vehicles, 547-567, 2022 | 8 | 2022 |
A lightweight intrusion detection system for can protocol using neighborhood similarity RUD Refat, AA Elkhail, H Malik 2022 7th International Conference on Data Science and Machine Learning …, 2022 | 8 | 2022 |
Dark firmware: a systematic approach to exploring application security risks in the presence of untrusted firmware D Ibdah, N Lachtar, AA Elkhail, A Bacha, H Malik 23rd International Symposium on Research in Attacks, Intrusions and Defenses …, 2020 | 8 | 2020 |
An application agnostic defense against the dark arts of cryptojacking N Lachtar, AA Elkhail, A Bacha, H Malik 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021 | 7 | 2021 |
Intelligent token-based code clone detection system for large scale source code AA Elkhail, J Svacina, T Cerny Proceedings of the Conference on Research in Adaptive and Convergent Systems …, 2019 | 7 | 2019 |
Internet of things for healthcare monitoring applications based on RFID clustering scheme AA Elkhail, U Baroudi US Patent App. 16/566,412, 2020 | 5 | 2020 |
Real-time healthcare monitoring system using smartphones AA Elkhail, U Baroudi 2018 IEEE/ACS 15th International Conference on Computer Systems and …, 2018 | 5 | 2018 |
Optimum bi-level hierarchical clustering for wireless mobile tracking systems U Baroudi, A Abu Elkhail, H Alfares Wireless Networks 26, 1227-1242, 2020 | 2 | 2020 |
Iterative clustering for energy-efficient large-scale tracking systems HK Alfares, A Abu Elkhail, U Baroudi Wireless Personal Communications 110, 713-733, 2020 | 2 | 2020 |
Wsn routing protocols: anonymity prospective analysis AA Elkhail, U Baroudi, M Younis 2022 14th International Conference on Computational Intelligence and …, 2022 | 1 | 2022 |
System and method for hierarchical clustering of wireless mobile network AA Elkhail, U Baroudi, H Alfares US Patent 11,412,039, 2022 | 1 | 2022 |
RANSOMWARE DETECTION AND PREVENTION A Bacha, A Abu Elkhail, H Malik US Patent 20,240,411,914, 2024 | | 2024 |