Research Output 2006 2019

2019
1 Citation (Scopus)

An integrated methodology for big data classification and security for improving cloud systems data mobility

Hababeh, I., Gharaibeh, A., Nofal, S. & Khalil, I., 1 Jan 2019, In : IEEE Access. 7, p. 9153-9163 11 p., 8594554.

Research output: Contribution to journalArticle

Data privacy
Security of data
Big data
Health

BlockTag: Design and applications of a tagging system for blockchain analysis

Boshmaf, Y., Jawaheri, H. A. & Sabah, M. A., 1 Jan 2019, ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Proceedings. Dhillon, G., Zúquete, A., Karlsson, F. & Hedström, K. (eds.). Springer New York LLC, p. 299-313 15 p. (IFIP Advances in Information and Communication Technology; vol. 562).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Tagging
Law enforcement
Roads
World Wide Web
Agora

GanDef: A GAN based adversarial training defense for neural network classifier

Liu, G., Khalil, I. & Khreishah, A., 1 Jan 2019, ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Proceedings. Dhillon, G., Zúquete, A., Karlsson, F. & Hedström, K. (eds.). Springer New York LLC, p. 19-32 14 p. (IFIP Advances in Information and Communication Technology; vol. 562).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Classifier
Neural networks
Natural language processing
Train
Evaluation

Optimizing cross-platform data movement

Kruse, S., Kaoudi, Z., Quiane Ruiz, J. A., Chawla, S., Naumann, F. & Contreras-Rojas, B., 1 Apr 2019, Proceedings - 2019 IEEE 35th International Conference on Data Engineering, ICDE 2019. IEEE Computer Society, p. 1642-1645 4 p. 8731354. (Proceedings - International Conference on Data Engineering; vol. 2019-April).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Costs

Truth Inference on Sparse Crowdsourcing Data with Local Differential Privacy

Sun, H., Dong, B., Wang, H. W., Yu, T. & Qin, Z., 22 Jan 2019, Proceedings - 2018 IEEE International Conference on Big Data, Big Data 2018. Song, Y., Liu, B., Lee, K., Abe, N., Pu, C., Qiao, M., Ahmed, N., Kossmann, D., Saltz, J., Tang, J., He, J., Liu, H. & Hu, X. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 488-497 10 p. 8622635. (Proceedings - 2018 IEEE International Conference on Big Data, Big Data 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Factorization
Experiments

Unmanned Aerial Vehicles (UAVs): A Survey on Civil Applications and Key Research Challenges

Shakhatreh, H., Sawalmeh, A. H., Al-Fuqaha, A., Dou, Z., Almaita, E., Khalil, I., Othman, N. S., Khreishah, A. & Guizani, M., 1 Jan 2019, In : IEEE Access. 7, p. 48572-48634 63 p., 8682048.

Research output: Contribution to journalReview article

Unmanned aerial vehicles (UAV)
Collision avoidance
Agriculture
Remote sensing
Inspection
2018

A domain is only as good as its buddies: Detecting stealthy malicious domains via graph inference

Khalil, I., Guan, B., Nabeel, M. & Yu, T., 13 Mar 2018, CODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, Vol. 2018-January. p. 330-341 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Scalability
Experiments
3 Citations (Scopus)

A survey on malicious domains detection through DNS data analysis

Zhauniarovich, Y., Khalil, I., Yu, T. & Dacier, M., 1 Jul 2018, In : ACM Computing Surveys. 51, 4, 3191329.

Research output: Contribution to journalArticle

Data analysis
Life cycle
Internet
Attack
Evaluation
2 Citations (Scopus)

Cross-platform data processing: Use cases and challenges

Kaoudi, Z. & Quiane Ruiz, J. A., 24 Oct 2018, Proceedings - IEEE 34th International Conference on Data Engineering, ICDE 2018. Institute of Electrical and Electronics Engineers Inc., p. 1723-1726 4 p. 8509444

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Tutorial
Ad hoc
Excel
End users
Zoo
2 Citations (Scopus)

Enabling GPU-assisted antivirus protection on android devices through edge offloading

Deyannis, D., Tsirbas, R., Vasiliadis, G., Montella, R., Kosta, S. & Ioannidis, S., 10 Jun 2018, EdgeSys 2018 - Proceedings of the 1st ACM International Workshop on Edge Systems, Analytics and Networking, Part of MobiSys 2018. Association for Computing Machinery, Inc, p. 13-18 6 p. (EdgeSys 2018 - Proceedings of the 1st ACM International Workshop on Edge Systems, Analytics and Networking, Part of MobiSys 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
Data storage equipment
Scalability
Graphics processing unit
Malware
1 Citation (Scopus)

Indoor Mobile Coverage Problem Using UAVs

Shakhatreh, H., Khreishah, A. & Khalil, I., 28 Apr 2018, (Accepted/In press) In : IEEE Systems Journal.

Research output: Contribution to journalArticle

Unmanned aerial vehicles (UAV)
Base stations
Disasters
Computational complexity
Antennas

K-Skyband query answering with differential privacy1

Chen, L., Yu, T. & Chirkova, R., 1 Jan 2018, In : Journal of Computer Security. 26, 5, p. 647-676 30 p.

Research output: Contribution to journalArticle

Bulletin boards
Decomposition
Experiments

Online Algorithm for Opportunistic Handling of Received Packets in Vehicular Networks

Al-Fuqaha, A., Gharaibeh, A., Mohammed, I., Hussini, S. J., Khreishah, A. & Khalil, I., 14 Mar 2018, (Accepted/In press) In : IEEE Transactions on Intelligent Transportation Systems.

Research output: Contribution to journalArticle

Scheduling
Vehicular ad hoc networks
Processing
Communication
2 Citations (Scopus)

RETRO: Retroreflector Based Visible Light Indoor Localization for Real-time Tracking of IoT Devices

Shao, S., Khreishah, A. & Khalil, I., 8 Oct 2018, INFOCOM 2018 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-April. p. 1025-1033 9 p. 8485817

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Photodiodes
Light sources
Lighting
Experiments
Cameras

Sealing ability of Biodentine versus ProRoot mineral trioxide aggregate as root-end filling materials

Nabeel, M., Tawfik, H. M., Abu-Seida, A. M. A. & Elgendy, A. A., 1 Jan 2018, (Accepted/In press) In : Saudi Dental Journal.

Research output: Contribution to journalArticle

Pemetrexed
Gutta-Percha
Incisor
Tooth
mineral trioxide aggregate

Securing named data networks: Challenges and theway forward

Bertino, E. & Nabeel, M., 7 Jun 2018, SACMAT 2018 - Proceedings of the 23rd ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery, Vol. Part F137153. p. 51-59 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet
Slate
Servers
Network protocols
Communication
1 Citation (Scopus)

Source attribution of cryptographic API misuse in android applications

Muslukhov, I., Boshmaf, Y. & Beznosov, K., 29 May 2018, ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 133-146 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programming interfaces (API)
Cryptography
1 Citation (Scopus)

Your culture is in your password: An analysis of a demographically-diverse password dataset

Alsabah, M., Oligeri, G. & Riley, R., 1 Aug 2018, In : Computers and Security. 77, p. 427-441 15 p.

Research output: Contribution to journalArticle

Metadata
Electronic mail
Linguistics
online service
speaking
2017
10 Citations (Scopus)

A cost-based optimizer for gradient descent optimization

Kaoudi, Z., Quiané-Ruiz, J. A., Thirumuruganathan, S., Chawla, S. & Agrawal, D., 9 May 2017, SIGMOD 2017 - Proceedings of the 2017 ACM International Conference on Management of Data. Association for Computing Machinery, Vol. Part F127746. p. 977-992 16 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Learning systems
Costs
Mathematical operators
Specifications
Experiments
2 Citations (Scopus)

A minorization-maximization algorithm for an-based mimome secrecy rate maximization

Masood, M., Ghrayeb, A., Babu, P., Khalil, I. & Hasna, M., 19 Apr 2017, 2016 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2016 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 975-980 6 p. 7905987

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Antennas
Beamforming
Transmitters

A Novel and Robust Authentication Factor Based on Network Communications Latency

Dou, Z., Khalil, I. & Khreishah, A., 24 Apr 2017, (Accepted/In press) In : IEEE Systems Journal.

Research output: Contribution to journalArticle

Authentication
Telecommunication networks
Servers
Time measurement
Masks
9 Citations (Scopus)

A rigorous and efficient run-time security monitor for real-time critical embedded system applications

Khan, M. T., Serpanos, D. & Shrobe, H., 6 Feb 2017, 2016 IEEE 3rd World Forum on Internet of Things, WF-IoT 2016. Institute of Electrical and Electronics Engineers Inc., p. 100-105 6 p. 7845510

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Embedded systems
Specification languages
Acoustic waves
Legacy systems
Intrusion detection
1 Citation (Scopus)

CLAS: A Novel Communications Latency Based Authentication Scheme

Dou, Z., Khalil, I. & Khreishah, A., 1 Jan 2017, In : Security and Communication Networks. 2017, 4286903.

Research output: Contribution to journalArticle

Authentication
Communication
Network architecture
Telecommunication networks
2 Citations (Scopus)

Context-aware RAON middleware for opportunistic network

Lau, G., Alsabah, M., Jaseemuddin, M., Razavi, H. & Bhuiyan, M., 1 Oct 2017, In : Pervasive and Mobile Computing. 41, p. 28-45 18 p.

Research output: Contribution to journalArticle

Overlay networks
Overlay Networks
Context-aware
Middleware
Resources
2 Citations (Scopus)

Design and Implementation of a Stateful Network Packet Processing Framework for GPUs

Vasiliadis, G., Koromilas, L., Polychronakis, M. & Ioannidis, S., 1 Feb 2017, In : IEEE/ACM Transactions on Networking. 25, 1, p. 610-623 14 p., 7551177.

Research output: Contribution to journalArticle

Packet networks
Processing
HIgh speed networks
Parallel architectures
Pattern matching
1 Citation (Scopus)

Detecting opinion spammer groups and spam targets through community discovery and sentiment analysis

Choo, E., Yu, T. & Chi, M., 1 Jan 2017, In : Journal of Computer Security. 25, 3, p. 283-318 36 p.

Research output: Contribution to journalReview article

Classifiers
Experiments
1 Citation (Scopus)

Differentially private k-skyband query answering through adaptive spatial decomposition

Chen, L., Yu, T. & Chirkova, R., 1 Jan 2017, Data and Applications Security and Privacy XXXI - 31st Annual IFIP WG 11.3 Conference, DBSec 2017, Proceedings. Springer Verlag, p. 142-163 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10359 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bulletin boards
Query
Decomposition
Decompose
K-tree
2 Citations (Scopus)

Distributed Cardinality Estimation of Set Operations with Differential Privacy

Stanojevic, R., Nabeel, M. & Yu, T., 4 Dec 2017, Proceedings - 2017 IEEE Symposium on Privacy-Aware Computing, PAC 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2017-January. p. 37-48 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Servers
Data integration
Monitoring
Sensors
16 Citations (Scopus)

Efficient 3D placement of a UAV using particle swarm optimization

Shakhatreh, H., Khreishah, A., Alsarhan, A., Khalil, I., Sawalmeh, A. & Othman, N. S., 8 May 2017, 2017 8th International Conference on Information and Communication Systems, ICICS 2017. Institute of Electrical and Electronics Engineers Inc., p. 258-263 6 p. 7921981

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Earthquakes
Disasters
Unmanned aerial vehicles (UAV)
Particle swarm optimization (PSO)
Air
3 Citations (Scopus)

Efficient Software Packet Processing on Heterogeneous and Asymmetric Hardware Architectures

Papadogiannaki, E., Koromilas, L., Vasiliadis, G. & Ioannidis, S., 27 Jan 2017, (Accepted/In press) In : IEEE/ACM Transactions on Networking.

Research output: Contribution to journalArticle

Hardware
Processing
Packet networks
Particle accelerators
Program processors
1 Citation (Scopus)

Exact detection of information leakage: Decidability and complexity

Chirkova, R. & Yu, T., 1 Jan 2017, Transactions on Large-Scale Data- and Knowledge- Centered Systems XXXII - Special Issue on Big Data Analytics and Knowledge Discovery. Springer Verlag, p. 1-23 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10420 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computability and decidability
Decidability
Access control
Leakage
Electronic data interchange
13 Citations (Scopus)

Generating synthetic decentralized social graphs with local differential privacy

Qin, Z., Yu, T., Yang, Y., Khalil, I., Xiao, X. & Ren, K., 30 Oct 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, Vol. Part F131467. p. 425-438 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Experiments
3 Citations (Scopus)

No sugar but all the taste! Memory encryption without architectural support

Papadopoulos, P., Vasiliadis, G., Christou, G., Markatos, E. & Ioannidis, S., 1 Jan 2017, Computer Security – ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Proceedings. Springer Verlag, p. 362-380 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10493 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sugars
Encryption
Cryptography
Data storage equipment
Architecture
6 Citations (Scopus)

Online Auction of Cloud Resources in Support of the Internet of Things

Gharaibeh, A., Khreishah, A., Mohammadi, M., Al-Fuqaha, A., Khalil, I. & Rayes, A., 1 Oct 2017, In : IEEE Internet of Things Journal. 4, 5, p. 1583-1596 14 p., 7972940.

Research output: Contribution to journalArticle

Profitability
Quality of service
Internet of things
Polynomials
Communication
12 Citations (Scopus)

On the continuous coverage problem for a swarm of UAVs

Shakhatreh, H., Khreishah, A., Chakareski, J., Salameh, H. B. & Khalil, I., 7 Feb 2017, 37th IEEE Sarnoff Symposium, Sarnoff 2016. Institute of Electrical and Electronics Engineers Inc., p. 130-135 6 p. 7846742

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Unmanned aerial vehicles (UAV)
Disasters
Computational complexity
Wireless networks
10 Citations (Scopus)

Please hold on: Unobtrusive user authentication using smartphone's built-in sensors

Buriro, A., Crispo, B. & Zhauniarovich, Y., 13 Jun 2017, 2017 IEEE International Conference on Identity, Security and Behavior Analysis, ISBA 2017. Institute of Electrical and Electronics Engineers Inc., 7947684

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Smartphones
Authentication
Sensors
Electronic mail
transaction

Preface

Dacier, M. & Bailey, M., 1 Jan 2017, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 10453 LNCS, p. V-VI

Research output: Contribution to journalEditorial

2 Citations (Scopus)

PriviPK: Certificate-less and secure email communication

Alsabah, M., Tomescu, A., Lebedev, I., Serpanos, D. & Devadas, S., 1 Sep 2017, In : Computers and Security. 70, p. 1-15 15 p.

Research output: Contribution to journalArticle

Electronic mail
Transparency
certification
transparency
Cryptography
2 Citations (Scopus)

Profiling DRDoS attacks with data analytics pipeline

Berti-Equille, L. & Zhauniarovich, Y., 6 Nov 2017, CIKM 2017 - Proceedings of the 2017 ACM Conference on Information and Knowledge Management. Association for Computing Machinery, Vol. Part F131841. p. 1983-1986 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Denial
Attack
Profiling
Filter
Commonality
4 Citations (Scopus)

RHEEM: Enabling cross platform data processing

Agrawal, D., Chawla, S., Contreras-Rojas, B., Elmagarmid, A., Idris, Y., Kaoudi, Z., Kruse, S., Lucas, J., Mansour, E., Ouzzani, M., Papotti, P., Quiane´-Ruiz, J. A., Tang, N., Thirumuruganathan, S. & Troudi, A., 1 Jan 2017, In : Proceedings of the VLDB Endowment. 11, 11, p. 1414-1427 14 p.

Research output: Contribution to journalConference article

Costs
Industry
Mechanics
2 Citations (Scopus)

Robust Insider Attacks Countermeasure for Hadoop: Design and Implementation

Dou, Z., Khalil, I., Khreishah, A. & Al-Fuqaha, A., 13 Mar 2017, (Accepted/In press) In : IEEE Systems Journal.

Research output: Contribution to journalArticle

Authentication
Network protocols
Availability
Processing
Experiments
18 Citations (Scopus)

Security Challenges and Opportunities of Software-Defined Networking

Dacier, M., Konig, H., Cwalinski, R., Kargl, F. & DIetrich, S., 2017, In : IEEE Security and Privacy. 15, 2, p. 96-100 5 p., 7891523.

Research output: Contribution to journalArticle

networking
Computer monitors
flexibility
Technical presentations
software
69 Citations (Scopus)

Smart Cities: A Survey on Data Management, Security, and Enabling Technologies

Gharaibeh, A., Salahuddin, M. A., Hussini, S. J., Khreishah, A., Khalil, I., Guizani, M. & Al-Fuqaha, A., 1 Oct 2017, In : IEEE Communications Surveys and Tutorials. 19, 4, p. 2456-2501 46 p., 8003273.

Research output: Contribution to journalReview article

Information management
Data privacy
Security of data
Reusability
Smart city
5 Citations (Scopus)

Systematization of Knowledge (SoK): A Systematic Review of Software-Based Web Phishing Detection

Dou, Z., Khalil, I., Khreishah, A., Al-Fuqaha, A. & Guizani, M., 1 Oct 2017, In : IEEE Communications Surveys and Tutorials. 19, 4, p. 2797-2819 23 p., 8036198.

Research output: Contribution to journalReview article

Websites
Taxonomies

The Many Faces of End-to-End Encryption and Their Security Analysis

Nabeel, M., 7 Sep 2017, Proceedings - 2017 IEEE 1st International Conference on Edge Computing, EDGE 2017. Institute of Electrical and Electronics Engineers Inc., p. 252-259 8 p. 8029288

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Metadata
Systems analysis
Wire
Communication
2016
1 Citation (Scopus)

A design study to identify inconsistencies in kinship information: The case of the 1000 Genomes project

Aupetit, M., Ullah, E., Rawi, R. & Bensmail, H., 4 May 2016, 2016 IEEE Pacific Visualization Symposium, PacificVis 2016 - Proceedings. IEEE Computer Society, Vol. 2016-May. p. 254-258 5 p. 7465281

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Genes
Data visualization
7 Citations (Scopus)

An O(1)-competitive online caching algorithm for content centric networking

Gharaibeh, A., Khreishah, A. & Khalil, I., 27 Jul 2016, IEEE INFOCOM 2016 - 35th Annual IEEE International Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., Vol. 2016-July. 7524444

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet service providers
Costs
Internet
10 Citations (Scopus)

Automated vulnerability analysis of AC state estimation under constrained false data injection in electric power systems

Gao, S., Xie, L., Solar-Lezama, A., Serpanos, D. & Shrobe, H., 8 Feb 2016, Proceedings of the IEEE Conference on Decision and Control. Institute of Electrical and Electronics Engineers Inc., Vol. 2016-February. p. 2613-2620 8 p. 7402610

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electric Power System
State Estimation
State estimation
Electric power systems
Vulnerability
20 Citations (Scopus)

Discovering malicious domains through passive DNS data graph analysis

Khalil, I., Yu, T. & Guan, B., 30 May 2016, ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 663-674 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Classifiers
Experiments

Distributed Online En-Route Caching

Gharaibeh, A., Khreishah, A., Khalil, I. & Wu, J., 1 Dec 2016, In : IEEE Transactions on Parallel and Distributed Systems. 27, 12, p. 3455-3468 14 p., 7442568.

Research output: Contribution to journalArticle

Computer networks
Internet
Costs