Obserwuj
Hussain Almohri
Hussain Almohri
Associate Professor, Kuwait University
Zweryfikowany adres z vt.edu - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
Security optimization of dynamic networks with probabilistic graph modeling and linear programming
HMJ Almohri, LT Watson, D Yao, X Ou
IEEE Transactions on Dependable and Secure Computing 13 (4), 474-487, 2015
832015
On threat modeling and mitigation of medical cyber-physical systems
H Almohri, L Cheng, D Yao, H Alemzadeh
2017 IEEE/ACM International Conference on Connected Health: Applications …, 2017
782017
Cyberbiosecurity challenges of pathogen genome databases
BA Vinatzer, LS Heath, HMJ Almohri, MJ Stulberg, C Lowe, S Li
Frontiers in bioengineering and biotechnology 7, 106, 2019
422019
Fidelius charm: Isolating unsafe rust code
HMJ Almohri, D Evans
Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018
362018
Droidbarrier: Know what is executing on your android
HMJ Almohri, D Yao, D Kafura
Proceedings of the 4th ACM Conference on Data and Application Security and …, 2014
262014
Predictability of IP address allocations for cloud computing platforms
HMJ Almohri, LT Watson, D Evans
IEEE Transactions on Information Forensics and Security 15, 500-511, 2019
232019
Process authentication for high system assurance
HMJ Almohri, D Yao, D Kafura
IEEE Transactions on Dependable and Secure Computing 11 (2), 168-180, 2013
232013
An attack-resilient architecture for the Internet of Things
HMJ Almohri, LT Watson, D Evans
IEEE Transactions on Information Forensics and Security 15, 3940-3954, 2020
212020
Identifying android malware families using android-oriented metrics
W Blanc, LG Hashem, KO Elish, MJH Almohri
2019 IEEE international conference on big data (big data), 4708-4713, 2019
162019
Misery digraphs: delaying intrusion attacks in obscure clouds
HMJ Almohri, LT Watson, D Evans
IEEE Transactions on Information Forensics and Security 13 (6), 1361-1375, 2017
162017
Lightweight, effective detection and characterization of mobile malware families
KO Elish, MO Elish, HMJ Almohri
IEEE Transactions on Computers 71 (11), 2982-2995, 2022
122022
Identifying native applications with high assurance
HMJ Almohri, D Yao, D Kafura
Second ACM Conference on Data and Application Security and Privacy, 275-282, 2012
122012
An efficient deception architecture for cloud-based virtual networks
M Qasem, HMJ Almohri
arXiv preprint arXiv:2004.06933, 2020
42020
Methods and apparatus for a token management system for transactions
SA Almohri, H Almohri
US Patent App. 14/194,163, 2015
42015
A Client Bootstrapping Protocol for DoS Attack Mitigation on Entry Point Services in the Cloud
HMJ Almohri, M Almutawa, M Alawadh, K Elish
Security and Communication Networks 2020 (1), 8873258, 2020
32020
Dynamic system diversification for securing cloud-based IoT subnetworks
H Almohri, L Watson, D Evans, S Billups
ACM Transactions on Autonomous and Adaptive Systems (TAAS) 17 (1-2), 1-23, 2022
22022
Security risk prioritization for logical attack graphs
H Almohri
Kansas State University, 2008
22008
On Parallel Real-Time Security Improvement Using Mixed-Integer Programming
HMJ Almohri, LT Watson, H Alemzadeh, M Almutawa
IEEE Access 9, 58824-58837, 2021
12021
Security evaluation by arrogance: Saving time and money
HMJ Almohri, SA Almohri
2017 IEEE/ACM 1st International Workshop on Software Engineering for …, 2017
12017
High assurance models for secure systems
HMJ Almohri
Virginia Polytechnic Institute and State University, 2013
12013
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20