Research Output 2006 2019

Filter
Article
2019
1 Citation (Scopus)

An integrated methodology for big data classification and security for improving cloud systems data mobility

Hababeh, I., Gharaibeh, A., Nofal, S. & Khalil, I., 1 Jan 2019, In : IEEE Access. 7, p. 9153-9163 11 p., 8594554.

Research output: Contribution to journalArticle

Data privacy
Security of data
Big data
Health
2018
1 Citation (Scopus)

A survey on malicious domains detection through DNS data analysis

Zhauniarovich, Y., Khalil, I., Yu, T. & Dacier, M., 1 Jul 2018, In : ACM Computing Surveys. 51, 4, 3191329.

Research output: Contribution to journalArticle

Data analysis
Life cycle
Internet
Attack
Evaluation
1 Citation (Scopus)

Indoor Mobile Coverage Problem Using UAVs

Shakhatreh, H., Khreishah, A. & Khalil, I., 28 Apr 2018, (Accepted/In press) In : IEEE Systems Journal.

Research output: Contribution to journalArticle

Unmanned aerial vehicles (UAV)
Base stations
Disasters
Computational complexity
Antennas

K-Skyband query answering with differential privacy1

Chen, L., Yu, T. & Chirkova, R., 1 Jan 2018, In : Journal of Computer Security. 26, 5, p. 647-676 30 p.

Research output: Contribution to journalArticle

Bulletin boards
Decomposition
Experiments

Online Algorithm for Opportunistic Handling of Received Packets in Vehicular Networks

Al-Fuqaha, A., Gharaibeh, A., Mohammed, I., Hussini, S. J., Khreishah, A. & Khalil, I., 14 Mar 2018, (Accepted/In press) In : IEEE Transactions on Intelligent Transportation Systems.

Research output: Contribution to journalArticle

Scheduling
Vehicular ad hoc networks
Processing
Communication

Sealing ability of Biodentine versus ProRoot mineral trioxide aggregate as root-end filling materials

Nabeel, M., Tawfik, H. M., Abu-Seida, A. M. A. & Elgendy, A. A., 1 Jan 2018, (Accepted/In press) In : Saudi Dental Journal.

Research output: Contribution to journalArticle

Pemetrexed
Gutta-Percha
Incisor
Tooth
mineral trioxide aggregate
1 Citation (Scopus)

Your culture is in your password: An analysis of a demographically-diverse password dataset

Alsabah, M., Oligeri, G. & Riley, R., 1 Aug 2018, In : Computers and Security. 77, p. 427-441 15 p.

Research output: Contribution to journalArticle

Metadata
Electronic mail
Linguistics
online service
speaking
2017

A Novel and Robust Authentication Factor Based on Network Communications Latency

Dou, Z., Khalil, I. & Khreishah, A., 24 Apr 2017, (Accepted/In press) In : IEEE Systems Journal.

Research output: Contribution to journalArticle

Authentication
Telecommunication networks
Servers
Time measurement
Masks
1 Citation (Scopus)

CLAS: A Novel Communications Latency Based Authentication Scheme

Dou, Z., Khalil, I. & Khreishah, A., 1 Jan 2017, In : Security and Communication Networks. 2017, 4286903.

Research output: Contribution to journalArticle

Authentication
Communication
Network architecture
Telecommunication networks
2 Citations (Scopus)

Context-aware RAON middleware for opportunistic network

Lau, G., Alsabah, M., Jaseemuddin, M., Razavi, H. & Bhuiyan, M., 1 Oct 2017, In : Pervasive and Mobile Computing. 41, p. 28-45 18 p.

Research output: Contribution to journalArticle

Overlay networks
Overlay Networks
Context-aware
Middleware
Resources
1 Citation (Scopus)

Design and Implementation of a Stateful Network Packet Processing Framework for GPUs

Vasiliadis, G., Koromilas, L., Polychronakis, M. & Ioannidis, S., 1 Feb 2017, In : IEEE/ACM Transactions on Networking. 25, 1, p. 610-623 14 p., 7551177.

Research output: Contribution to journalArticle

Packet networks
Processing
HIgh speed networks
Parallel architectures
Pattern matching
3 Citations (Scopus)

Efficient Software Packet Processing on Heterogeneous and Asymmetric Hardware Architectures

Papadogiannaki, E., Koromilas, L., Vasiliadis, G. & Ioannidis, S., 27 Jan 2017, (Accepted/In press) In : IEEE/ACM Transactions on Networking.

Research output: Contribution to journalArticle

Hardware
Processing
Packet networks
Particle accelerators
Program processors
4 Citations (Scopus)

Online Auction of Cloud Resources in Support of the Internet of Things

Gharaibeh, A., Khreishah, A., Mohammadi, M., Al-Fuqaha, A., Khalil, I. & Rayes, A., 1 Oct 2017, In : IEEE Internet of Things Journal. 4, 5, p. 1583-1596 14 p., 7972940.

Research output: Contribution to journalArticle

Profitability
Quality of service
Internet of things
Polynomials
Communication
2 Citations (Scopus)

PriviPK: Certificate-less and secure email communication

Alsabah, M., Tomescu, A., Lebedev, I., Serpanos, D. & Devadas, S., 1 Sep 2017, In : Computers and Security. 70, p. 1-15 15 p.

Research output: Contribution to journalArticle

Electronic mail
Transparency
certification
transparency
Cryptography
2 Citations (Scopus)

Robust Insider Attacks Countermeasure for Hadoop: Design and Implementation

Dou, Z., Khalil, I., Khreishah, A. & Al-Fuqaha, A., 13 Mar 2017, (Accepted/In press) In : IEEE Systems Journal.

Research output: Contribution to journalArticle

Authentication
Network protocols
Availability
Processing
Experiments
18 Citations (Scopus)

Security Challenges and Opportunities of Software-Defined Networking

Dacier, M., Konig, H., Cwalinski, R., Kargl, F. & DIetrich, S., 2017, In : IEEE Security and Privacy. 15, 2, p. 96-100 5 p., 7891523.

Research output: Contribution to journalArticle

networking
Computer monitors
flexibility
Technical presentations
software
2016

Distributed Online En-Route Caching

Gharaibeh, A., Khreishah, A., Khalil, I. & Wu, J., 1 Dec 2016, In : IEEE Transactions on Parallel and Distributed Systems. 27, 12, p. 3455-3468 14 p., 7442568.

Research output: Contribution to journalArticle

Computer networks
Internet
Costs
2 Citations (Scopus)

DPcode: Privacy-Preserving Frequent Visual Patterns Publication on Cloud

Qin, Z., Ren, K., Yu, T. & Weng, J., 1 May 2016, In : IEEE Transactions on Multimedia. 18, 5, p. 929-939 11 p., 7422120.

Research output: Contribution to journalArticle

Industry
Experiments
7 Citations (Scopus)

Dynamic and efficient private keyword search over inverted index-based encrypted data

Zhang, R., Xue, R., Yu, T. & Liu, L., 1 Aug 2016, In : ACM Transactions on Internet Technology. 16, 3, 21.

Research output: Contribution to journalArticle

Cryptography
Communication
16 Citations (Scopus)

Íntegro: Leveraging victim prediction for robust fake account detection in large scale OSNs

Boshmaf, Y., Logothetis, D., Siganos, G., Lería, J., Lorenzo, J., Ripeanu, M., Beznosov, K. & Halawa, H., 1 Aug 2016, In : Computers and Security. 61, p. 142-168 27 p.

Research output: Contribution to journalArticle

social network
Distributed computer systems
Landing
Learning systems
Classifiers
15 Citations (Scopus)

Joint link scheduling and brightness control for greening VLC-based indoor access networks

Shao, S., Khreishah, A. & Khalil, I., 1 Mar 2016, In : Journal of Optical Communications and Networking. 8, 3, p. 148-161 14 p., 7444560.

Research output: Contribution to journalArticle

Telecommunication links
Luminance
Scheduling
Lighting
Electric power utilization
2 Citations (Scopus)

Renewable Energy-Aware Joint Caching and Routing for Green Communication Networks

Khreishah, A., Bany Salameh, H., Khalil, I. & Gharaibeh, A., 3 Mar 2016, (Accepted/In press) In : IEEE Systems Journal.

Research output: Contribution to journalArticle

Telecommunication networks
Internet
Polynomials
Carbon footprint
Video on demand
2 Citations (Scopus)

Towards efficient operation of internet data center networks: Joint data placement and flow control for cost optimization

Khreishah, A., Chakareski, J., Gharaibeh, A., Khalil, I. & Diabat, A., 2016, In : Simulation Modelling Practice and Theory. 64, p. 83-98 16 p.

Research output: Contribution to journalArticle

Data Placement
Cost Optimization
Data Center
Flow Control
Data Flow
2015
5 Citations (Scopus)

Coevolution analysis of HIV-1 envelope glycoprotein complex

Rawi, R., Kunji, K., Haoudi, A. & Bensmail, H., 1 Nov 2015, In : PLoS One. 10, 11, 0143245.

Research output: Contribution to journalArticle

coevolution
Human immunodeficiency virus 1
HIV-1
glycoproteins
Glycoproteins
8 Citations (Scopus)

Designing high performance web-based computing services to promote telemedicine database management system

Hababeh, I., Khalil, I. & Khreishah, A., 1 Jan 2015, In : IEEE Transactions on Services Computing. 8, 1, p. 47-64 18 p., 6714614.

Research output: Contribution to journalArticle

Telemedicine
Websites
Throughput
Communication
Web-based

Foreword

Kaoudi, Z., Kementsietsidis, T. & Quiane Ruiz, J. A., 19 Jun 2015, In : Unknown Journal. 2015-June, p. 51 1 p., 7129543.

Research output: Contribution to journalArticle

5 Citations (Scopus)

GPU-assisted malware

Vasiliadis, G., Polychronakis, M. & Ioannidis, S., 1 Jun 2015, In : International Journal of Information Security. 14, 3, p. 289-297 9 p.

Research output: Contribution to journalArticle

Polymorphism
Computer viruses
Graphics processing unit
Malware
Program processors

Model selection emphasises the importance of non-chromosomal information in genetic studies

Rawi, R., Anbari, M. E. & Bensmail, H., 27 Jan 2015, In : PLoS One. 10, 1, e0117014.

Research output: Contribution to journalArticle

Yeast
heritability
Yeasts
Phenotype
Growth
4 Citations (Scopus)

Universal network coding-based opportunistic routing for unicast

Khreishah, A., Khalil, I. & Wu, J., 1 Jun 2015, In : IEEE Transactions on Parallel and Distributed Systems. 26, 6, p. 1765-1774 10 p., 6812230.

Research output: Contribution to journalArticle

Network coding
Feedback
Redundancy
Wireless networks
Throughput
2014
78 Citations (Scopus)

Cloud computing security: A survey

Khalil, I., Khreishah, A. & Azeem, M., 1 Mar 2014, In : Computers. 3, 1, p. 1-35 35 p.

Research output: Contribution to journalArticle

Open Access
Cloud computing
Outsourcing
Electricity
Economics
Water
20 Citations (Scopus)

Consolidated Identity Management System for secure mobile cloud computing

Khalil, I., Khreishah, A. & Azeem, M., 2 Jun 2014, In : Computer Networks. 65, p. 99-110 12 p.

Research output: Contribution to journalArticle

Mobile cloud computing
Mobile devices
Cloud computing
Telecommunication traffic
Authentication
9 Citations (Scopus)

Insights on the security and dependability of industrial control systems

Kargl, F., Van Der Heijden, R. W., König, H., Valdes, A. & Dacier, M., 1 Nov 2014, In : IEEE Security and Privacy. 12, 6, p. 75-78 4 p., 7006412.

Research output: Contribution to journalArticle

research focus
control system
Control systems
Technical presentations

Introduction to special issue on risk and trust in embedded critical systems

Rossebø, J. E. Y., Houmb, S. H., Georg, G., Franqueira, V. N. L. & Serpanos, D., 1 Jan 2014, In : ACM Transactions on Embedded Computing Systems. 13, 152.

Research output: Contribution to journalArticle

2013
7 Citations (Scopus)

Low complexity and provably efficient algorithm for joint inter and intrasession network coding in wireless networks

Khreishah, A., Khalil, I. & Wu, J., 9 Sep 2013, In : IEEE Transactions on Parallel and Distributed Systems. 24, 10, p. 2015-2024 10 p., 6244791.

Research output: Contribution to journalArticle

Network coding
Wireless networks
Linear equations
Linear programming
Telecommunication links
1 Citation (Scopus)

Performance evaluation of wormhole security approaches for ad-hoc networks

Hababeh, I., Khalil, I., Khreishah, A. & Bataineh, S., 19 Dec 2013, In : Journal of Computer Science. 9, 12, p. 1626-1637 12 p.

Research output: Contribution to journalArticle

Wireless ad hoc networks
Ad hoc networks
Wireless networks
Topology