Research Output

Filter
Article
2020

Enabling Real-Time Indoor Tracking of IoT Devices through Visible Light Retroreflection

Shao, S., Khreishah, A. & Khalil, I., 1 Apr 2020, In : IEEE Transactions on Mobile Computing. 19, 4, p. 836-851 16 p., 8654691.

Research output: Contribution to journalArticle

1 Citation (Scopus)

RHEEMix in the data jungle: a cost-based optimizer for cross-platform systems

Kruse, S., Kaoudi, Z., Contreras-Rojas, B., Chawla, S., Naumann, F. & Quiane Ruiz, J. A., 1 Jan 2020, (Accepted/In press) In : VLDB Journal.

Research output: Contribution to journalArticle

Open Access

StaDART: Addressing the problem of dynamic code updates in the security analysis of android applications

Ahmad, M., Costamagna, V., Crispo, B., Bergadano, F. & Zhauniarovich, Y., Jan 2020, In : Journal of Systems and Software. 159, 110386.

Research output: Contribution to journalArticle

1 Citation (Scopus)
2019

An integrated methodology for big data classification and security for improving cloud systems data mobility

Hababeh, I., Gharaibeh, A., Nofal, S. & Khalil, I., 1 Jan 2019, In : IEEE Access. 7, p. 9153-9163 11 p., 8594554.

Research output: Contribution to journalArticle

3 Citations (Scopus)
2018

A survey on malicious domains detection through DNS data analysis

Zhauniarovich, Y., Khalil, I., Yu, T. & Dacier, M., Jul 2018, In : ACM Computing Surveys. 51, 4, 3191329.

Research output: Contribution to journalArticle

17 Citations (Scopus)

Indoor Mobile Coverage Problem Using UAVs

Shakhatreh, H., Khreishah, A. & Khalil, I., 28 Apr 2018, (Accepted/In press) In : IEEE Systems Journal.

Research output: Contribution to journalArticle

9 Citations (Scopus)

K-Skyband query answering with differential privacy1

Chen, L., Yu, T. & Chirkova, R., 1 Jan 2018, In : Journal of Computer Security. 26, 5, p. 647-676 30 p.

Research output: Contribution to journalArticle

Online Algorithm for Opportunistic Handling of Received Packets in Vehicular Networks

Al-Fuqaha, A., Gharaibeh, A., Mohammed, I., Hussini, S. J., Khreishah, A. & Khalil, I., 14 Mar 2018, (Accepted/In press) In : IEEE Transactions on Intelligent Transportation Systems.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Robust insider attacks countermeasure for hadoop: Design and implementation

Dou, Z., Khalil, I., Khreishah, A. & Al-Fuqaha, A., Jun 2018, In : IEEE Systems Journal. 12, 2, p. 1874-1885 12 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)

Sealing ability of Biodentine versus ProRoot mineral trioxide aggregate as root-end filling materials

Nabeel, M., Tawfik, H. M., Abu-Seida, A. M. A. & Elgendy, A. A., 1 Jan 2018, (Accepted/In press) In : Saudi Dental Journal.

Research output: Contribution to journalArticle

Your culture is in your password: An analysis of a demographically-diverse password dataset

Alsabah, M., Oligeri, G. & Riley, R., 1 Aug 2018, In : Computers and Security. 77, p. 427-441 15 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)
2017

A Minorization-Maximization Algorithm for Maximizing the Secrecy Rate of the MIMOME Wiretap Channel

Masood, M., Ghrayeb, A., Babu, P., Khalil, I. & Hasna, M., Mar 2017, In : IEEE Communications Letters. 21, 3, p. 520-523 4 p., 7776840.

Research output: Contribution to journalArticle

14 Citations (Scopus)

A Novel and Robust Authentication Factor Based on Network Communications Latency

Dou, Z., Khalil, I. & Khreishah, A., 24 Apr 2017, (Accepted/In press) In : IEEE Systems Journal.

Research output: Contribution to journalArticle

CLAS: A Novel Communications Latency Based Authentication Scheme

Dou, Z., Khalil, I. & Khreishah, A., 1 Jan 2017, In : Security and Communication Networks. 2017, 4286903.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Context-aware RAON middleware for opportunistic network

Lau, G., Alsabah, M., Jaseemuddin, M., Razavi, H. & Bhuiyan, M., 1 Oct 2017, In : Pervasive and Mobile Computing. 41, p. 28-45 18 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Design and Implementation of a Stateful Network Packet Processing Framework for GPUs

Vasiliadis, G., Koromilas, L., Polychronakis, M. & Ioannidis, S., 1 Feb 2017, In : IEEE/ACM Transactions on Networking. 25, 1, p. 610-623 14 p., 7551177.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Efficient Software Packet Processing on Heterogeneous and Asymmetric Hardware Architectures

Papadogiannaki, E., Koromilas, L., Vasiliadis, G. & Ioannidis, S., 27 Jan 2017, (Accepted/In press) In : IEEE/ACM Transactions on Networking.

Research output: Contribution to journalArticle

6 Citations (Scopus)

Online Auction of Cloud Resources in Support of the Internet of Things

Gharaibeh, A., Khreishah, A., Mohammadi, M., Al-Fuqaha, A., Khalil, I. & Rayes, A., 1 Oct 2017, In : IEEE Internet of Things Journal. 4, 5, p. 1583-1596 14 p., 7972940.

Research output: Contribution to journalArticle

7 Citations (Scopus)

PriviPK: Certificate-less and secure email communication

Alsabah, M., Tomescu, A., Lebedev, I., Serpanos, D. & Devadas, S., 1 Sep 2017, In : Computers and Security. 70, p. 1-15 15 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Security Challenges and Opportunities of Software-Defined Networking

Dacier, M., Konig, H., Cwalinski, R., Kargl, F. & DIetrich, S., 2017, In : IEEE Security and Privacy. 15, 2, p. 96-100 5 p., 7891523.

Research output: Contribution to journalArticle

31 Citations (Scopus)
2016

Distributed Online En-Route Caching

Gharaibeh, A., Khreishah, A., Khalil, I. & Wu, J., 1 Dec 2016, In : IEEE Transactions on Parallel and Distributed Systems. 27, 12, p. 3455-3468 14 p., 7442568.

Research output: Contribution to journalArticle

DPcode: Privacy-Preserving Frequent Visual Patterns Publication on Cloud

Qin, Z., Ren, K., Yu, T. & Weng, J., 1 May 2016, In : IEEE Transactions on Multimedia. 18, 5, p. 929-939 11 p., 7422120.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Dynamic and efficient private keyword search over inverted index-based encrypted data

Zhang, R., Xue, R., Yu, T. & Liu, L., Aug 2016, In : ACM Transactions on Internet Technology. 16, 3, 21.

Research output: Contribution to journalArticle

12 Citations (Scopus)

Íntegro: Leveraging victim prediction for robust fake account detection in large scale OSNs

Boshmaf, Y., Logothetis, D., Siganos, G., Lería, J., Lorenzo, J., Ripeanu, M., Beznosov, K. & Halawa, H., 1 Aug 2016, In : Computers and Security. 61, p. 142-168 27 p.

Research output: Contribution to journalArticle

26 Citations (Scopus)

Joint link scheduling and brightness control for greening VLC-based indoor access networks

Shao, S., Khreishah, A. & Khalil, I., 1 Mar 2016, In : Journal of Optical Communications and Networking. 8, 3, p. 148-161 14 p., 7444560.

Research output: Contribution to journalArticle

27 Citations (Scopus)

Performance and security improvements for Tor: A survey

Alsabah, M. & Goldberg, I., Sep 2016, In : ACM Computing Surveys. 49, 2, 32.

Research output: Contribution to journalArticle

24 Citations (Scopus)

Renewable Energy-Aware Joint Caching and Routing for Green Communication Networks

Khreishah, A., Bany Salameh, H., Khalil, I. & Gharaibeh, A., 3 Mar 2016, (Accepted/In press) In : IEEE Systems Journal.

Research output: Contribution to journalArticle

7 Citations (Scopus)

Spammers operations: A multifaceted strategic analysis

Thonnard, O., Vervier, P. A. & Dacier, M., 10 Mar 2016, In : Security and Communication Networks. 9, 4, p. 336-356 21 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Towards efficient operation of internet data center networks: Joint data placement and flow control for cost optimization

Khreishah, A., Chakareski, J., Gharaibeh, A., Khalil, I. & Diabat, A., 2016, In : Simulation Modelling Practice and Theory. 64, p. 83-98 16 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)
2015

Coevolution analysis of HIV-1 envelope glycoprotein complex

Rawi, R., Kunji, K., Haoudi, A. & Bensmail, H., 1 Nov 2015, In : PloS one. 10, 11, 0143245.

Research output: Contribution to journalArticle

6 Citations (Scopus)

Designing high performance web-based computing services to promote telemedicine database management system

Hababeh, I., Khalil, I. & Khreishah, A., 1 Jan 2015, In : IEEE Transactions on Services Computing. 8, 1, p. 47-64 18 p., 6714614.

Research output: Contribution to journalArticle

10 Citations (Scopus)

Foreword

Kaoudi, Z., Kementsietsidis, T. & Quiané-Ruiz, J. A., 19 Jun 2015, In : Unknown Journal. 2015-June, p. 51 1 p., 7129543.

Research output: Contribution to journalArticle

GPU-assisted malware

Vasiliadis, G., Polychronakis, M. & Ioannidis, S., 1 Jun 2015, In : International Journal of Information Security. 14, 3, p. 289-297 9 p.

Research output: Contribution to journalArticle

7 Citations (Scopus)

Model selection emphasises the importance of non-chromosomal information in genetic studies

Rawi, R., Anbari, M. E. & Bensmail, H., 27 Jan 2015, In : PLoS One. 10, 1, e0117014.

Research output: Contribution to journalArticle

Universal network coding-based opportunistic routing for unicast

Khreishah, A., Khalil, I. & Wu, J., 1 Jun 2015, In : IEEE Transactions on Parallel and Distributed Systems. 26, 6, p. 1765-1774 10 p., 6812230.

Research output: Contribution to journalArticle

6 Citations (Scopus)
2014

Cloud computing security: A survey

Khalil, I., Khreishah, A. & Azeem, M., 1 Mar 2014, In : Computers. 3, 1, p. 1-35 35 p.

Research output: Contribution to journalArticle

Open Access
106 Citations (Scopus)

Consolidated Identity Management System for secure mobile cloud computing

Khalil, I., Khreishah, A. & Azeem, M., 2 Jun 2014, In : Computer Networks. 65, p. 99-110 12 p.

Research output: Contribution to journalArticle

26 Citations (Scopus)

Dependable wireless sensor networks for reliable and secure humanitarian relief applications

Khalil, I. M., Khreishah, A., Ahmed, F. & Shuaib, K., 1 Feb 2014, In : Ad Hoc Networks. 13, PART A, p. 94-106 13 p.

Research output: Contribution to journalArticle

20 Citations (Scopus)

Insights on the security and dependability of industrial control systems

Kargl, F., Van Der Heijden, R. W., König, H., Valdes, A. & Dacier, M., 1 Nov 2014, In : IEEE Security and Privacy. 12, 6, p. 75-78 4 p., 7006412.

Research output: Contribution to journalArticle

13 Citations (Scopus)

MOSES: Supporting and enforcing security profiles on smartphones

Zhauniarovich, Y., Russello, G., Conti, M., Crispo, B. & Fernandes, E., 1 Jan 2014, In : IEEE Transactions on Dependable and Secure Computing. 11, 3, p. 211-223 13 p., 2300482.

Research output: Contribution to journalArticle

34 Citations (Scopus)

Scalable distributed service integrity attestation for software-as-a- service clouds

Du, J., Dean, D. J., Tan, Y., Gu, X. & Yu, T., 1 Mar 2014, In : IEEE Transactions on Parallel and Distributed Systems. 25, 3, p. 730-739 10 p., 6471974.

Research output: Contribution to journalArticle

12 Citations (Scopus)
2013

Adaptive composition of distributed pervasive applications in heterogeneous environments

Schuhmann, S., Herrmann, K., Rothermel, K. & Boshmaf, Y., 1 Jul 2013, In : ACM Transactions on Autonomous and Adaptive Systems. 8, 2, 10.

Research output: Contribution to journalArticle

12 Citations (Scopus)

A Small Set of Succinct Signature Patterns Distinguishes Chinese and Non-Chinese HIV-1 Genomes

Wang, Y., Rawi, R., Wilms, C., Heider, D., Yang, R. & Hoffmann, D., 19 Mar 2013, In : PloS one. 8, 3, e58804.

Research output: Contribution to journalArticle

7 Citations (Scopus)

Communications in smart grid: A review with performance, reliability and security consideration

Shuaib, K., Khalil, I. & Abdel-Hafez, M., 25 Jun 2013, In : Journal of Networks. 8, 6, p. 1229-1240 12 p.

Research output: Contribution to journalArticle

8 Citations (Scopus)

Design and analysis of a social botnet

Boshmaf, Y., Muslukhov, I., Beznosov, K. & Ripeanu, M., 4 Feb 2013, In : Computer Networks. 57, 2, p. 556-578 23 p.

Research output: Contribution to journalArticle

89 Citations (Scopus)

DISA: Detection and isolation of sneaky attackers in locally monitored multi-hop wireless networks

Khalil, I., Bagchi, S., Abuali, N. & Hayajneh, M., Dec 2013, In : Security and Communication Networks. 6, 12, p. 1524-1538 15 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Inference of global HIV-1 sequence patterns and preliminary feature analysis

Wang, Y., Rawi, R., Hoffmann, D., Sun, B. & Yang, R., 1 Aug 2013, In : Virologica Sinica. 28, 4, p. 228-238 11 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Low complexity and provably efficient algorithm for joint inter and intrasession network coding in wireless networks

Khreishah, A., Khalil, I. & Wu, J., 9 Sep 2013, In : IEEE Transactions on Parallel and Distributed Systems. 24, 10, p. 2015-2024 10 p., 6244791.

Research output: Contribution to journalArticle

8 Citations (Scopus)

PAQO: A preferenceaware query optimizer for postgreSQL

Farnan, N. L., Lee, A. J., Chrysanthis, P. K. & Yu, T., Aug 2013, In : Proceedings of the VLDB Endowment. 6, 12, p. 1334-1337 4 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Performance evaluation of wormhole security approaches for ad-hoc networks

Hababeh, I., Khalil, I., Khreishah, A. & Bataineh, S., 1 Jan 2013, In : Journal of Computer Science. 9, 12, p. 1626-1637 12 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)