Hussain M. J. Almohri

Orcid: 0000-0002-7738-5864

Affiliations:
  • Kuwait University


According to our database1, Hussain M. J. Almohri authored at least 18 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Model-Agnostic Federated Learning for Privacy-Preserving Systems.
Proceedings of the IEEE Secure Development Conference, 2023

2022
Lightweight, Effective Detection and Characterization of Mobile Malware Families.
IEEE Trans. Computers, 2022

Dynamic System Diversification for Securing Cloud-based IoT Subnetworks.
ACM Trans. Auton. Adapt. Syst., 2022

2021
On Parallel Real-Time Security Improvement Using Mixed-Integer Programming.
IEEE Access, 2021

2020
An Attack-Resilient Architecture for the Internet of Things.
IEEE Trans. Inf. Forensics Secur., 2020

Predictability of IP Address Allocations for Cloud Computing Platforms.
IEEE Trans. Inf. Forensics Secur., 2020

A Client Bootstrapping Protocol for DoS Attack Mitigation on Entry Point Services in the Cloud.
Secur. Commun. Networks, 2020

An efficient deception architecture for cloud-based virtual networks.
CoRR, 2020

2019
Identifying Android Malware Families Using Android-Oriented Metrics.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
Misery Digraphs: Delaying Intrusion Attacks in Obscure Clouds.
IEEE Trans. Inf. Forensics Secur., 2018

Fidelius Charm: Isolating Unsafe Rust Code.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

2017
Security Evaluation by Arrogance: Saving Time and Money.
Proceedings of the 1st IEEE/ACM International Workshop on Software Engineeting for Startups, 2017

On Threat Modeling and Mitigation of Medical Cyber-Physical Systems.
Proceedings of the Second IEEE/ACM International Conference on Connected Health: Applications, 2017

2016
Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming.
IEEE Trans. Dependable Secur. Comput., 2016

2014
Process Authentication for High System Assurance.
IEEE Trans. Dependable Secur. Comput., 2014

DroidBarrier: know what is executing on your android.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

2012
Identifying native applications with high assurance.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

2010
A simulation-based software design framework for network-centric and parallel systems.
Proceedings of the SPLASH Workshop on Programming Support Innovations for Emerging Distributed Applications (PSI EtA, 2010


  Loading...