• 1309 Citations
  • 18 h-Index
If you made any changes in Pure these will be visible here soon.

Fingerprint Fingerprint is based on mining the text of the person's scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 41 Similar Profiles
Wireless networks Engineering & Materials Science
Sensor networks Engineering & Materials Science
Network coding Engineering & Materials Science
Network protocols Engineering & Materials Science
Monitoring Engineering & Materials Science
Wireless ad hoc networks Engineering & Materials Science
Communication Engineering & Materials Science
Wireless sensor networks Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2005 2019

  • 1309 Citations
  • 18 h-Index
  • 37 Conference contribution
  • 37 Article
  • 3 Review article
  • 1 Chapter
1 Citation (Scopus)

An integrated methodology for big data classification and security for improving cloud systems data mobility

Hababeh, I., Gharaibeh, A., Nofal, S. & Khalil, I., 1 Jan 2019, In : IEEE Access. 7, p. 9153-9163 11 p., 8594554.

Research output: Contribution to journalArticle

Data privacy
Security of data
Big data

Unmanned Aerial Vehicles (UAVs): A Survey on Civil Applications and Key Research Challenges

Shakhatreh, H., Sawalmeh, A. H., Al-Fuqaha, A., Dou, Z., Almaita, E., Khalil, I., Othman, N. S., Khreishah, A. & Guizani, M., 1 Jan 2019, In : IEEE Access. 7, p. 48572-48634 63 p., 8682048.

Research output: Contribution to journalReview article

Unmanned aerial vehicles (UAV)
Collision avoidance
Remote sensing

A domain is only as good as its buddies: Detecting stealthy malicious domains via graph inference

Khalil, I., Guan, B., Nabeel, M. & Yu, T., 13 Mar 2018, CODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, Vol. 2018-January. p. 330-341 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

A survey on malicious domains detection through DNS data analysis

Zhauniarovich, Y., Khalil, I., Yu, T. & Dacier, M., 1 Jul 2018, In : ACM Computing Surveys. 51, 4, 3191329.

Research output: Contribution to journalArticle

Data analysis
Life cycle
1 Citation (Scopus)

Indoor Mobile Coverage Problem Using UAVs

Shakhatreh, H., Khreishah, A. & Khalil, I., 28 Apr 2018, (Accepted/In press) In : IEEE Systems Journal.

Research output: Contribution to journalArticle

Unmanned aerial vehicles (UAV)
Base stations
Computational complexity