Fingerprint The fingerprint is based on mining the text of the scientific documents related to the associated persons. Based on that an index of weighted terms is created, which defines the key subjects of research unit

Authentication Engineering & Materials Science
Access control Engineering & Materials Science
Internet Engineering & Materials Science
Cryptography Engineering & Materials Science
Communication Engineering & Materials Science
Classifiers Engineering & Materials Science
Servers Engineering & Materials Science
Telecommunication networks Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2006 2018

A domain is only as good as its buddies: Detecting stealthy malicious domains via graph inference

Khalil, I., Guan, B., Nabeel, M. & Yu, T., 13 Mar 2018, CODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, Vol. 2018-January. p. 330-341 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution


A survey on malicious domains detection through DNS data analysis

Zhauniarovich, Y., Khalil, I., Yu, T. & Dacier, M., 1 Jul 2018, In : ACM Computing Surveys. 51, 4, 3191329.

Research output: Contribution to journalArticle

Data analysis
Life cycle

Indoor Mobile Coverage Problem Using UAVs

Shakhatreh, H., Khreishah, A. & Khalil, I., 28 Apr 2018, (Accepted/In press) In : IEEE Systems Journal.

Research output: Contribution to journalArticle

Unmanned aerial vehicles (UAV)
Base stations
Computational complexity