Seuraa
Hussain Almohri
Hussain Almohri
Associate Professor, Kuwait University
Vahvistettu sähköpostiosoite verkkotunnuksessa ieee.org - Kotisivu
Nimike
Viittaukset
Viittaukset
Vuosi
Security optimization of dynamic networks with probabilistic graph modeling and linear programming
HMJ Almohri, LT Watson, D Yao, X Ou
IEEE Transactions on Dependable and Secure Computing 13 (4), 474-487, 2015
812015
On threat modeling and mitigation of medical cyber-physical systems
H Almohri, L Cheng, D Yao, H Alemzadeh
2017 IEEE/ACM International Conference on Connected Health: Applications …, 2017
672017
Cyberbiosecurity challenges of pathogen genome databases
BA Vinatzer, LS Heath, HMJ Almohri, MJ Stulberg, C Lowe, S Li
Frontiers in bioengineering and biotechnology 7, 106, 2019
372019
Fidelius charm: Isolating unsafe rust code
HMJ Almohri, D Evans
Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018
262018
Droidbarrier: Know what is executing on your android
HMJ Almohri, D Yao, D Kafura
Proceedings of the 4th ACM Conference on Data and Application Security and …, 2014
262014
Predictability of IP address allocations for cloud computing platforms
HMJ Almohri, LT Watson, D Evans
IEEE Transactions on Information Forensics and Security 15, 500-511, 2019
222019
Process authentication for high system assurance
HMJ Almohri, D Yao, D Kafura
IEEE Transactions on Dependable and Secure Computing 11 (2), 168-180, 2013
222013
An attack-resilient architecture for the Internet of Things
HMJ Almohri, LT Watson, D Evans
IEEE Transactions on Information Forensics and Security 15, 3940-3954, 2020
162020
Misery digraphs: delaying intrusion attacks in obscure clouds
HMJ Almohri, LT Watson, D Evans
IEEE Transactions on Information Forensics and Security 13 (6), 1361-1375, 2017
162017
Identifying android malware families using android-oriented metrics
W Blanc, LG Hashem, KO Elish, MJH Almohri
2019 IEEE international conference on big data (big data), 4708-4713, 2019
152019
Identifying native applications with high assurance
HMJ Almohri, D Yao, D Kafura
Second ACM Conference on Data and Application Security and Privacy, 275-282, 2012
132012
Lightweight, effective detection and characterization of mobile malware families
KO Elish, MO Elish, HMJ Almohri
IEEE Transactions on Computers 71 (11), 2982-2995, 2022
72022
An efficient deception architecture for cloud-based virtual networks
M Qasem, HMJ Almohri
arXiv preprint arXiv:2004.06933, 2020
4*2020
Methods and apparatus for a token management system for transactions
SA Almohri, H Almohri
US Patent App. 14/194,163, 2015
42015
A Client Bootstrapping Protocol for DoS Attack Mitigation on Entry Point Services in the Cloud
HMJ Almohri, M Almutawa, M Alawadh, K Elish
Security and Communication Networks 2020, 1-12, 2020
22020
Security risk prioritization for logical attack graphs
H Almohri
Kansas State University, 2008
22008
On Parallel Real-Time Security Improvement Using Mixed-Integer Programming
HMJ Almohri, LT Watson, H Alemzadeh, M Almutawa
IEEE Access 9, 58824-58837, 2021
12021
Security evaluation by arrogance: Saving time and money
HMJ Almohri, SA Almohri
2017 IEEE/ACM 1st International Workshop on Software Engineering for …, 2017
12017
High assurance models for secure systems
HMJ Almohri
Virginia Polytechnic Institute and State University, 2013
12013
Remark on Algorithm 1012: Computing projections with large data sets
TH Chang, LT Watson, S Leyffer, TCH Lux, HMJ Almohri
ACM Transactions on Mathematical Software, 2024
2024
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20