Hussain Almohri
Hussain Almohri
Assistant Professor, Kuwait University
Verifierad e-postadress på ieee.org - Startsida
Titel
Citeras av
Citeras av
År
Security optimization of dynamic networks with probabilistic graph modeling and linear programming
HMJ Almohri, LT Watson, D Yao, X Ou
IEEE Transactions on Dependable and Secure Computing 13 (4), 474-487, 2015
412015
On threat modeling and mitigation of medical cyber-physical systems
H Almohri, L Cheng, D Yao, H Alemzadeh
2017 IEEE/ACM International Conference on Connected Health: Applications …, 2017
232017
Droidbarrier: Know what is executing on your android
HMJ Almohri, D Yao, D Kafura
Proceedings of the 4th ACM conference on Data and application security and …, 2014
222014
Process authentication for high system assurance
HMJ Almohri, D Yao, D Kafura
IEEE Transactions on Dependable and Secure Computing 11 (2), 168-180, 2013
162013
Identifying native applications with high assurance
HMJ Almohri, D Yao, D Kafura
Second ACM Conference on Data and Application Security and Privacy, 275-282, 2012
132012
Cyberbiosecurity Challenges of Pathogen Genome Databases
BA Vinatzer, LS Heath, HMJ Almohri, MJ Stulberg, C Lowe, S Li
Frontiers in bioengineering and biotechnology 7, 106, 2019
112019
Misery digraphs: delaying intrusion attacks in obscure clouds
HMJ Almohri, LT Watson, D Evans
IEEE Transactions on Information Forensics and Security 13 (6), 1361-1375, 2017
82017
Predictability of IP address allocations for cloud computing platforms
HMJ Almohri, LT Watson, D Evans
IEEE Transactions on Information Forensics and Security 15, 500-511, 2019
72019
Fidelius charm: Isolating unsafe rust code
HMJ Almohri, D Evans
Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018
62018
Methods and apparatus for a token management system for transactions
SA Almohri, H Almohri
US Patent App. 14/194,163, 2015
32015
An Attack-Resilient Architecture for the Internet of Things
HMJ Almohri, LT Watson, D Evans
IEEE Transactions on Information Forensics and Security, 2020
12020
Security risk prioritization for logical attack graphs
H Almohri
Kansas State University, 2008
12008
A Client Bootstrapping Protocol for DoS Attack Mitigation on Entry Point Services in the Cloud
HMJ Almohri, M Almutawa, M Alawadh, K Elish
Security and Communication Networks 2020, 2020
2020
An efficient deception architecture for cloud-based virtual networks
M Qasem, HMJ Almohri
arXiv preprint arXiv:2004.06933, 2020
2020
Security evaluation by arrogance: saving time and money
HMJ Almohri, SA Almohri
2017 IEEE/ACM 1st International Workshop on Software Engineering for …, 2017
2017
High assurance models for secure systems
H Almohri
Virginia Tech, 2013
2013
A simulation-based software design framework for network-centric and parallel systems
HMJ Almohri, O Balci
Programming Support Innovations for Emerging Distributed Applications, 1-5, 2010
2010
Virtual Execution of Network-Centric Software Design Models
H Almohri, O Balci
2010
in Cyberbiosecurity Cyberbiosecurity Challenges of Pathogen Genome Databases
BA Vinatzer, LS Heath, HMJ Almohri, MJ Stulberg, C Lowe, S Li
2016 Index IEEE Transactions on Dependable and Secure Computing Vol. 13
N Abbani, HM Almohri, H Artail, T Atkison, M Backes, F Bao, F Bernal, ...
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20