Ibrahim Khalil

According to our database1, Ibrahim Khalil authored at least 141 papers between 1998 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
A lightweight authentication scheme for vehicular ad hoc networks based on MSR.
Vehicular Communications, 2019

Privacy preserving service selection using fully homomorphic encryption scheme on untrusted cloud service platform.
Knowl.-Based Syst., 2019

Efficient threshold password-authenticated secret sharing protocols for cloud computing.
J. Parallel Distrib. Comput., 2019

Privacy-preserving anomaly detection in the cloud for quality assured decision-making in smart cities.
J. Parallel Distrib. Comput., 2019

Privacy-preserving aggregation for cooperative spectrum sensing.
J. Network and Computer Applications, 2019

A lossless DNA data hiding approach for data authenticity in mobile cloud based healthcare systems.
Int J. Information Management, 2019

Collaborative extreme learning machine with a confidence interval for P2P learning in healthcare.
Computer Networks, 2019

Real-time Secure Health Surveillance for Smarter Health Communities.
IEEE Communications Magazine, 2019

Secure Edge of Things for Smart Healthcare Surveillance Framework.
IEEE Access, 2019

A Novel Privacy Preserving Search Technique for Stego Data in Untrusted Cloud.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

A Novel Architecture for Tamper Proof Electronic Health Record Management System using Blockchain Wrapper.
Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2019

2018
Gaussian Approximation-Based Lossless Compression of Smart Meter Readings.
IEEE Trans. Smart Grid, 2018

Efficient data perturbation for privacy preserving and accurate data stream mining.
Pervasive and Mobile Computing, 2018

Fast and peer-to-peer vital signal learning system for cloud-based healthcare.
Future Generation Comp. Syst., 2018

Determining Anxiety in Obsessive Compulsive Disorder through Behavioural Clustering and Variations in Repetition Intensity.
Computer Methods and Programs in Biomedicine, 2018

Privacy Preserving User Based Web Service Recommendations.
IEEE Access, 2018

Designing Privacy-Preserving Protocols for Content Sharing and Aggregation in Content Centric Networking.
IEEE Access, 2018

An Improved Lightweight RFID Authentication Protocol for Internet of Things.
Proceedings of the Web Information Systems Engineering - WISE 2018, 2018

GazeRevealer: Inferring Password Using Smartphone Front Camera.
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018

2017
Cloud-Based Utility Service Framework for Trust Negotiations Using Federated Identity Management.
IEEE Trans. Cloud Computing, 2017

BDCaM: Big Data for Context-Aware Monitoring - A Personalized Knowledge Discovery Framework for Assisted Healthcare.
IEEE Trans. Cloud Computing, 2017

Walsh-Hadamard-Based 3-D Steganography for Protecting Sensitive Information in Point-of-Care.
IEEE Trans. Biomed. Engineering, 2017

PEACE-Home: Probabilistic estimation of abnormal clinical events using vital sign correlations for reliable home-based monitoring.
Pervasive and Mobile Computing, 2017

Privacy-preserving anomaly detection in cloud with lightweight homomorphic encryption.
J. Comput. Syst. Sci., 2017

Privacy-preserving cloud-based billing with lightweight homomorphic encryption for sensor-enabled smart grid infrastructure.
IET Wireless Sensor Systems, 2017

Design and implementation of a secure cloud-based billing model for smart meters as an Internet of things using homomorphic cryptography.
Future Generation Comp. Syst., 2017

ViSiBiD: A learning model for early discovery and real-time prediction of severe clinical events using vital signs as big data.
Computer Networks, 2017

A clinical decision-making mechanism for context-aware and patient-specific remote monitoring systems using the correlations of multiple vital signs.
Computer Methods and Programs in Biomedicine, 2017

Reliable delay-sensitive spectrum handoff management for re-entrant secondary users.
Ad Hoc Networks, 2017

Privacy Preserving Location Recommendations.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017

Highly Imperceptible and Reversible Text Steganography Using Invisible Character based Codeword.
Proceedings of the 21st Pacific Asia Conference on Information Systems, 2017

Private Recommendations Generation for Vertically Partitioned Datasets.
Proceedings of the 21st Pacific Asia Conference on Information Systems, 2017

Privacy-preserving Data clustering in Cloud Computing based on Fully Homomorphic Encryption.
Proceedings of the 21st Pacific Asia Conference on Information Systems, 2017

Privacy Preserving User-Based Recommender System.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

2016
Distributed collision control with the integration of packet size for congestion control in wireless sensor networks.
Wireless Communications and Mobile Computing, 2016

kNNVWC: An Efficient k-Nearest Neighbors Approach Based on Various-Widths Clustering.
IEEE Trans. Knowl. Data Eng., 2016

A Novel Congestion Avoidance Technique for Simultaneous Real-Time Medical Data Transmission.
IEEE J. Biomedical and Health Informatics, 2016

ID2S Password-Authenticated Key Exchange Protocols.
IEEE Trans. Computers, 2016

A Practical Privacy-Preserving Recommender System.
Data Science and Engineering, 2016

Hybrid Cryptographic Access Control for Cloud-Based EHR Systems.
IEEE Cloud Computing, 2016

Secure Data Analytics for Cloud-Integrated Internet of Things Applications.
IEEE Cloud Computing, 2016

Trust based reliable transmissions strategies for smart home energy consumption management in cognitive radio based smart grid.
Ad Hoc Networks, 2016

Resilient to shared spectrum noise scheme for protecting cognitive radio smart grid readings - BCH based steganographic approach.
Ad Hoc Networks, 2016

A probabilistic model for early prediction of abnormal clinical events using vital sign correlations in home-based monitoring.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communications, 2016

Securing Body Sensor Network with ECG.
Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media, 2016

kNNVWC: An efficient k-nearest neighbours approach based on Various-Widths Clustering.
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016

2015
Data Summarization Techniques for Big Data - A Survey.
Proceedings of the Handbook on Data Centers, 2015

Enhancing Availability in Content Delivery Networks for Mobile Platforms.
IEEE Trans. Parallel Distrib. Syst., 2015

Cooperative Web Caching Using Dynamic Interest-Tagged Filtered Bloom Filters.
IEEE Trans. Parallel Distrib. Syst., 2015

By-Passing Infected Areas in Wireless Sensor Networks Using BPR.
IEEE Trans. Computers, 2015

Granular Evaluation of Anomalies in Wireless Sensor Networks Using Dynamic Data Partitioning with an Entropy Criteria.
IEEE Trans. Computers, 2015

A context-aware approach for long-term behavioural change detection and abnormality prediction in ambient assisted living.
Pattern Recognition, 2015

Secure and reliable surveillance over cognitive radio sensor networks in smart grid.
Pervasive and Mobile Computing, 2015

Robust privacy preservation and authenticity of the collected data in cognitive radio network - Walsh-Hadamard based steganographic approach.
Pervasive and Mobile Computing, 2015

Wavelet based steganographic technique to protect household confidential information and seal the transmitted smart grid readings.
Inf. Syst., 2015

Multi-objective optimisation for selective packet discarding in wireless sensor network.
IET Wireless Sensor Systems, 2015

Location-dependent disclosure risk based decision support framework for persistent authentication in pervasive computing applications.
Computer Networks, 2015

Multi-Binomial mixes: A proposal for secure and efficient anonymous communication.
Computer Networks, 2015

Security and Privacy in Cloud Computing: Vision, Trends, and Challenges.
IEEE Cloud Computing, 2015

2014
ECG Biometric with Abnormal Cardiac Conditions in Remote Monitoring System.
IEEE Trans. Systems, Man, and Cybernetics: Systems, 2014

A Survey of Clustering Algorithms for Big Data: Taxonomy and Empirical Analysis.
IEEE Trans. Emerging Topics Comput., 2014

Data mining in mobile ECG based biometric identification.
J. Network and Computer Applications, 2014

Garbled Routing (GR): A generic framework towards unification of anonymous communication systems.
J. Network and Computer Applications, 2014

Data summarization for network traffic monitoring.
J. Network and Computer Applications, 2014

PileCast: Multiple bit rate live video streaming over BitTorrent.
J. Network and Computer Applications, 2014

An ID-based approach to the caching and distribution of peer-to-peer, proxy-based video content.
J. Network and Computer Applications, 2014

Accurate positioning using long range active RFID technology to assist visually impaired people.
J. Network and Computer Applications, 2014

A distributed aggregation and fast fractal clustering approach for SOAP traffic.
J. Network and Computer Applications, 2014

Cloud enabled fractal based ECG compression in wireless body sensor networks.
Future Generation Comp. Syst., 2014

CoCaMAAL: A cloud-oriented context-aware middleware in ambient assisted living.
Future Generation Comp. Syst., 2014

An optimal and stable feature selection approach for traffic classification based on multi-criterion fusion.
Future Generation Comp. Syst., 2014

PPFSCADA: Privacy preserving framework for SCADA data publishing.
Future Generation Comp. Syst., 2014

An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems.
Computers & Security, 2014

Load-sensitive dynamic workflow re-orchestration and optimisation for faster patient healthcare.
Computer Methods and Programs in Biomedicine, 2014

Securing Big Data Applications in the Cloud [Guest editors' introduction].
IEEE Cloud Computing, 2014

Multiplicative Attributes Graph Approach for Persistent Authentication in Single-Sign-On Mobile Systems.
Proceedings of the 13th IEEE International Conference on Trust, 2014

CluClas: Hybrid clustering-classification approach for accurate and efficient network classification.
Proceedings of the IEEE 39th Conference on Local Computer Networks, 2014

2013
Wavelet-Based ECG Steganography for Protecting Patient Confidential Information in Point-of-Care Systems.
IEEE Trans. Biomed. Engineering, 2013

Automatic and Autonomous Load Management in Peer-to-Peer Virtual Environments.
IEEE Journal on Selected Areas in Communications, 2013

Distributed anomaly detection for industrial wireless sensor networks based on fuzzy data modelling.
J. Parallel Distrib. Comput., 2013

Fractal self-similarity measurements based clustering technique for SOAP Web messages.
J. Parallel Distrib. Comput., 2013

Toward an efficient and scalable feature selection approach for internet traffic classification.
Computer Networks, 2013

Enhancement of low sampling frequency recordings for ECG biometric matching using interpolation.
Computer Methods and Programs in Biomedicine, 2013

Garbled Routing (GR): Towards Unification of Anonymous Networks.
Proceedings of the 12th IEEE International Conference on Trust, 2013

A Framework for Improving the Accuracy of Unsupervised Intrusion Detection for SCADA Systems.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Turbo-coded HARQ scheme in multi-hop cooperative wireless networks.
Proceedings of the 6th Joint IFIP Wireless and Mobile Networking Conference, 2013

SCADAVT-A framework for SCADA security testbed based on virtualization technology.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013

Preference based load balancing as an outpatient appointment scheduling aid.
Proceedings of the 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2013

Steganography-based access control to medical data hidden in electrocardiogram.
Proceedings of the 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2013

Protection of electronic health records (EHRs) in cloud.
Proceedings of the 35th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2013

Context-aware Cardiac Monitoring for Early Detection of Heart Diseases.
Proceedings of the Computing in Cardiology, 2013

2012
Redundancy-aware SOAP messages compression and aggregation for enhanced performance.
J. Network and Computer Applications, 2012

Fully peer-to-peer virtual environments with 3D Voronoi diagrams.
Computing, 2012

Safe trajectory estimation at a pedestrian crossing to assist visually impaired people.
Proceedings of the Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2012

2011
Diagnosis of Cardiovascular Abnormalities From Compressed ECG: A Data Mining-Based Approach.
IEEE Trans. Information Technology in Biomedicine, 2011

Cardioids-based faster authentication and diagnosis of remote cardiovascular patients.
Security and Communication Networks, 2011

A chaos-based encryption technique to protect ECG packets for time critical telecardiology applications.
Security and Communication Networks, 2011

An embedded DSP hardware encryption module for secure e-commerce transactions.
Security and Communication Networks, 2011

Faster person identification using compressed ECG in time critical wireless telecardiology applications.
J. Network and Computer Applications, 2011

Seamless integration of dependability and security concepts in SOA: A feedback control system based framework and taxonomy.
J. Network and Computer Applications, 2011

Compressed ECG Biometric: A Fast, Secured and Efficient Method for Identification of CVD Patient.
J. Medical Systems, 2011

A clustering based system for instant detection of cardiac abnormalities from compressed ECG.
Expert Syst. Appl., 2011

Timely Arbitrator Selection in P2P Virtual Environments with 3D Voronoi Diagrams.
Proceedings of The Tenth IEEE International Symposium on Networking Computing and Applications, 2011

Clustering SOAP Web Services on Internet Computing Using Fast Fractals.
Proceedings of The Tenth IEEE International Symposium on Networking Computing and Applications, 2011

On the Effectiveness of Relaxation Theory for Controlling High Traffic Volumes in Body Sensor Networks.
Proceedings of the Wireless Mobile Communication and Healthcare, 2011

Turbo-Coded HARQ with Switchable Relaying Mechanism in Single Hop Cooperative Wireless System.
Proceedings of the 2011 Frontiers of Information Technology, 2011

Person identification in irregular cardiac conditions using electrocardiogram signals.
Proceedings of the 33rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2011

Real-time wearable telecardiology from representative signals.
Proceedings of the 33rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2011

ECG biometric using multilayer perceptron and radial basis function neural networks.
Proceedings of the 33rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2011

Dynamic Fractal Clustering Technique for SOAP Web Messages.
Proceedings of the IEEE International Conference on Services Computing, 2011

2010
ECG-Based Authentication.
Proceedings of the Handbook of Information and Communication Security, 2010

Intranet Security via Firewalls.
Proceedings of the Handbook of Information and Communication Security, 2010

Polynomial distance measurement for ECG based biometric authentication.
Security and Communication Networks, 2010

Performance Analysis of Optimal Packet Size for Congestion Control in Wireless Sensor Networks.
Proceedings of The Ninth IEEE International Symposium on Networking Computing and Applications, 2010

Dynamic Game-Play Arbitrators with 3D Voronoi Diagrams.
Proceedings of The Ninth IEEE International Symposium on Networking Computing and Applications, 2010

SOAP Web Services Compression Using Variable and Fixed Length Coding.
Proceedings of The Ninth IEEE International Symposium on Networking Computing and Applications, 2010

Load-Balancing Properties of 3D Voronoi Diagrams in Peer-to-Peer Virtual Environments.
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010

Reducing network load in large-scale, Peer-to-Peer Virtual Environments with 3D Voronoi Diagrams.
Proceedings of the 2010 International Conference on High Performance Computing, 2010

2009
Novel methods of faster cardiovascular diagnosis in wireless telecardiology.
IEEE Journal on Selected Areas in Communications, 2009

A New Feature Detection Mechanism and Its Application in Secured ECG Transmission with Noise Masking.
J. Medical Systems, 2009

Cooperative Remote Video Consultation on Demand for e-Patients.
J. Medical Systems, 2009

2008
Enforcing secured ECG transmission for realtime telemonitoring: A joint encoding, compression, encryption mechanism.
Security and Communication Networks, 2008

A novel wavelet packet-based anti-spoofing technique to secure ECG data.
IJBM, 2008

QoS-aware Application Layer Multicast.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

2007
An Architecture for Distributed Content Delivery Network.
Proceedings of the 15th IEEE International Conference on Networks, 2007

Efficient Proxy Selection in Cooperative Web Caching.
Proceedings of the 15th IEEE International Conference on Networks, 2007

An End-Systems Supported Highly Distributed Content Delivery Network.
Proceedings of the Distributed Computing and Internet Technology, 2007

2006
Making Application Layer Multicast Reliableis Feasible.
Proceedings of the LCN 2006, 2006

An Adaptive Membership Algorithm for Application Layer Multicast.
Proceedings of the 2006 International Conference on Networking and Services (ICNS 2006), 2006

Reliability Enhanced Large-Scale Application Layer Multicast.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Load Sharing in Peer-to-Peer Networks using Dynamic Replication.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

Probabilistic QoS Routing inWiFi P2P Networks.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
A Gossip-based Membership Management Algorithm for Large-Scale Peer-to-Peer Media Streaming.
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005

2004
A Scalable and Roboust QoS Architecture for WiFi P2P Networks.
Proceedings of the Distributed Computing and Internet Technology, 2004

2002
Automated service provisioning in heterogeneous large-scale environment.
Proceedings of the Management Solutions for the New Communications World, 2002

2001
Implementation of a Bandwidth Broker for Dynamic End-to-End Capacity Reservation over Multiple Diffserv Domains.
Proceedings of the Management of Multimedia on the Internet, 2001

A Range-Based SLA and Edge Driven Virtual Core Provisioning in DiffServ-VPNs.
Proceedings of the 26th Annual IEEE Conference on Local Computer Networks (LCN 2001), 2001

2000
Implementation of a Bandwidth Broker for Dynamic End-to-End Resource Reservation in Outsourced Virtual Private Networks.
Proceedings of the Proceedings 27th Conference on Local Computer Networks, 2000

Edge provisioning and fairness in VPN-Diffserv networks.
Proceedings of the Proceedings Ninth International Conference on Computer Communications and Networks, 2000

1999
An Architecture for Managing QoS-Enabled VPNs over the Internet.
Proceedings of the Proceedings 26th Conference on Local Computer Networks, 1999

1998
Differentiated Internet Services.
Proceedings of the Workshop on Wide Area Networks and High Performance Computing, 1998


  Loading...