Suivre
Abdulrahman Abu Elkhail
Abdulrahman Abu Elkhail
Adresse e-mail validée de umich.edu
Titre
Citée par
Citée par
Année
Comparative study on range free localization algorithms
E Shakshuki, AA Elkhail, I Nemer, M Adam, T Sheltami
Procedia Computer Science 151, 501-510, 2019
712019
Internet of things for healthcare monitoring applications based on RFID clustering scheme
A Abuelkhail, U Baroudi, M Raad, T Sheltami
Wireless Networks 27 (1), 747-763, 2021
662021
Vehicle security: A survey of security issues and vulnerabilities, malware attacks and defenses
AA Elkhail, RUD Refat, R Habre, A Hafeez, A Bacha, H Malik
IEEE Access 9, 162401-162437, 2021
612021
Performance evaluation of range-free localization algorithms for wireless sensor networks
I Nemer, T Sheltami, E Shakshuki, AA Elkhail, M Adam
Personal and Ubiquitous Computing 25 (1), 177-203, 2021
552021
Detecting can bus intrusion by applying machine learning method to graph based features
RUD Refat, AA Elkhail, A Hafeez, H Malik
Intelligent Systems and Applications: Proceedings of the 2021 Intelligent …, 2022
362022
A cross-stack approach towards defending against cryptojacking
N Lachtar, AA Elkhail, A Bacha, H Malik
IEEE Computer Architecture Letters 19 (2), 126-129, 2020
322020
On relating code smells to security vulnerabilities
AA Elkhail, T Cerny
2019 IEEE 5th intl conference on big data security on cloud (BigDataSecurity …, 2019
182019
Seamlessly safeguarding data against ransomware attacks
AA Elkhail, N Lachtar, D Ibdah, R Aslam, H Khan, A Bacha, H Malik
IEEE Transactions on Dependable and Secure Computing 20 (1), 1-16, 2023
152023
Machine learning for automotive cybersecurity: Challenges, opportunities and future directions
RUD Refat, AA Elkhail, H Malik
AI-enabled Technologies for Autonomous and Connected Vehicles, 547-567, 2022
82022
A lightweight intrusion detection system for can protocol using neighborhood similarity
RUD Refat, AA Elkhail, H Malik
2022 7th International Conference on Data Science and Machine Learning …, 2022
82022
Dark firmware: a systematic approach to exploring application security risks in the presence of untrusted firmware
D Ibdah, N Lachtar, AA Elkhail, A Bacha, H Malik
23rd International Symposium on Research in Attacks, Intrusions and Defenses …, 2020
82020
An application agnostic defense against the dark arts of cryptojacking
N Lachtar, AA Elkhail, A Bacha, H Malik
2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021
72021
Intelligent token-based code clone detection system for large scale source code
AA Elkhail, J Svacina, T Cerny
Proceedings of the Conference on Research in Adaptive and Convergent Systems …, 2019
72019
Internet of things for healthcare monitoring applications based on RFID clustering scheme
AA Elkhail, U Baroudi
US Patent App. 16/566,412, 2020
52020
Real-time healthcare monitoring system using smartphones
AA Elkhail, U Baroudi
2018 IEEE/ACS 15th International Conference on Computer Systems and …, 2018
52018
Optimum bi-level hierarchical clustering for wireless mobile tracking systems
U Baroudi, A Abu Elkhail, H Alfares
Wireless Networks 26, 1227-1242, 2020
22020
Iterative clustering for energy-efficient large-scale tracking systems
HK Alfares, A Abu Elkhail, U Baroudi
Wireless Personal Communications 110, 713-733, 2020
22020
Wsn routing protocols: anonymity prospective analysis
AA Elkhail, U Baroudi, M Younis
2022 14th International Conference on Computational Intelligence and …, 2022
12022
System and method for hierarchical clustering of wireless mobile network
AA Elkhail, U Baroudi, H Alfares
US Patent 11,412,039, 2022
12022
RANSOMWARE DETECTION AND PREVENTION
A Bacha, A Abu Elkhail, H Malik
US Patent 20,240,411,914, 2024
2024
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20