Security optimization of dynamic networks with probabilistic graph modeling and linear programming HMJ Almohri, LT Watson, D Yao, X Ou IEEE Transactions on Dependable and Secure Computing 13 (4), 474-487, 2015 | 83 | 2015 |
On threat modeling and mitigation of medical cyber-physical systems H Almohri, L Cheng, D Yao, H Alemzadeh 2017 IEEE/ACM International Conference on Connected Health: Applications …, 2017 | 78 | 2017 |
Cyberbiosecurity challenges of pathogen genome databases BA Vinatzer, LS Heath, HMJ Almohri, MJ Stulberg, C Lowe, S Li Frontiers in bioengineering and biotechnology 7, 106, 2019 | 42 | 2019 |
Fidelius charm: Isolating unsafe rust code HMJ Almohri, D Evans Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018 | 36 | 2018 |
Droidbarrier: Know what is executing on your android HMJ Almohri, D Yao, D Kafura Proceedings of the 4th ACM Conference on Data and Application Security and …, 2014 | 26 | 2014 |
Predictability of IP address allocations for cloud computing platforms HMJ Almohri, LT Watson, D Evans IEEE Transactions on Information Forensics and Security 15, 500-511, 2019 | 23 | 2019 |
Process authentication for high system assurance HMJ Almohri, D Yao, D Kafura IEEE Transactions on Dependable and Secure Computing 11 (2), 168-180, 2013 | 23 | 2013 |
An attack-resilient architecture for the Internet of Things HMJ Almohri, LT Watson, D Evans IEEE Transactions on Information Forensics and Security 15, 3940-3954, 2020 | 21 | 2020 |
Identifying android malware families using android-oriented metrics W Blanc, LG Hashem, KO Elish, MJH Almohri 2019 IEEE international conference on big data (big data), 4708-4713, 2019 | 16 | 2019 |
Misery digraphs: delaying intrusion attacks in obscure clouds HMJ Almohri, LT Watson, D Evans IEEE Transactions on Information Forensics and Security 13 (6), 1361-1375, 2017 | 16 | 2017 |
Lightweight, effective detection and characterization of mobile malware families KO Elish, MO Elish, HMJ Almohri IEEE Transactions on Computers 71 (11), 2982-2995, 2022 | 12 | 2022 |
Identifying native applications with high assurance HMJ Almohri, D Yao, D Kafura Second ACM Conference on Data and Application Security and Privacy, 275-282, 2012 | 12 | 2012 |
An efficient deception architecture for cloud-based virtual networks M Qasem, HMJ Almohri arXiv preprint arXiv:2004.06933, 2020 | 4 | 2020 |
Methods and apparatus for a token management system for transactions SA Almohri, H Almohri US Patent App. 14/194,163, 2015 | 4 | 2015 |
A Client Bootstrapping Protocol for DoS Attack Mitigation on Entry Point Services in the Cloud HMJ Almohri, M Almutawa, M Alawadh, K Elish Security and Communication Networks 2020 (1), 8873258, 2020 | 3 | 2020 |
Dynamic system diversification for securing cloud-based IoT subnetworks H Almohri, L Watson, D Evans, S Billups ACM Transactions on Autonomous and Adaptive Systems (TAAS) 17 (1-2), 1-23, 2022 | 2 | 2022 |
Security risk prioritization for logical attack graphs H Almohri Kansas State University, 2008 | 2 | 2008 |
On Parallel Real-Time Security Improvement Using Mixed-Integer Programming HMJ Almohri, LT Watson, H Alemzadeh, M Almutawa IEEE Access 9, 58824-58837, 2021 | 1 | 2021 |
Security evaluation by arrogance: Saving time and money HMJ Almohri, SA Almohri 2017 IEEE/ACM 1st International Workshop on Software Engineering for …, 2017 | 1 | 2017 |
High assurance models for secure systems HMJ Almohri Virginia Polytechnic Institute and State University, 2013 | 1 | 2013 |