Khalil El-Khatib

Orcid: 0000-0002-5960-6942

According to our database1, Khalil El-Khatib authored at least 105 papers between 1999 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Unknown, Atypical and Polymorphic Network Intrusion Detection: A Systematic Survey.
IEEE Trans. Netw. Serv. Manag., February, 2024

2023
ECKN: An Integrated Approach for Position Estimation, Packet Routing, and Sleep Scheduling in Wireless Sensor Networks.
Sensors, July, 2023

Guest Editorial: Special Section on Machine Learning and Artificial Intelligence for Managing Networks, Systems, and Services - Part II.
IEEE Trans. Netw. Serv. Manag., June, 2023

Securing the Electric Vehicle Charging Infrastructure: An In-Depth Analysis of Vulnerabilities and Countermeasures.
Proceedings of the Int'l ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications, 2023

Trust-based Knowledge Sharing Among Federated Learning Servers in Vehicular Edge Computing.
Proceedings of the Int'l ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications, 2023

Analyzing the Quality of Synthetic Adversarial Cyberattacks.
Proceedings of the 19th International Conference on Network and Service Management, 2023

2022
Guest Editorial: Special Issue on Machine Learning and Artificial Intelligence for Managing Networks, Systems, and Services - Part I.
IEEE Trans. Netw. Serv. Manag., December, 2022

Artificial intelligence for intrusion detection systems in Unmanned Aerial Vehicles.
Comput. Electr. Eng., 2022

2021

Privacy and Artificial Intelligence.
IEEE Trans. Artif. Intell., 2021

Building an Intrusion Detection System to Detect Atypical Cyberattack Flows.
IEEE Access, 2021

CVAE-AN: Atypical Attack Flow Detection Using Incremental Adversarial Learning.
Proceedings of the IEEE Global Communications Conference, 2021

2020
A Service Architecture Using Machine Learning to Contextualize Anomaly Detection.
J. Database Manag., 2020

Functionality-based mobile application recommendation system with security and privacy awareness.
Comput. Secur., 2020

Eye Gaze-Based Human Error Prevention System: Experts vs. Non-Experts.
Proceedings of the SIN 2020: 13th International Conference on Security of Information and Networks, 2020

Novelty-based Intrusion Detection of Sensor Attacks on Unmanned Aerial Vehicles.
Proceedings of the Q2SWinet '20: Proceedings of the 16th ACM Symposium on QoS and Security for Wireless and Mobile Networks, 2020

Machine Learning-Based Intrusion Detection System for Controller Area Networks.
Proceedings of the DIVANet '20: Proceedings of the 10th ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications, 2020

UniNet: A Mixed Reality Driving Simulator.
Proceedings of the 45th Graphics Interface Conference 2020, 2020

A New Statistical Method for Anomaly Detection in Distributed Systems.
Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering, 2020

2019
Cooperative Localization Improvement Using Distance Information in Vehicular Ad Hoc Networks.
Sensors, 2019

Human Activity Recognition Using Inertial Sensors in a Smartphone: An Overview.
Sensors, 2019

A survey of privacy enhancing technologies for smart cities.
Pervasive Mob. Comput., 2019

Techniques to detect data leakage in mobile applications.
Int. J. Secur. Networks, 2019

Detecting Malicious Driving with Machine Learning.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

A Visual Analytics Framework for Adversarial Text Generation.
Proceedings of the 16th IEEE Symposium on Visualization for Cyber Security, VizSec 2019, 2019

Evaluation of Deep Learning in Detecting Unknown Network Attacks.
Proceedings of the International Conference on Smart Applications, 2019

A Distance-based Data Fusion Technique for Minimizing GPS Positioning Error in Vehicular Ad Hoc Networks.
Proceedings of the 15th ACM International Symposium on QoS and Security for Wireless and Mobile Networks, 2019

Ridesharing Architecture for Patterned Commute Traffic.
Proceedings of the 9th ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications, 2019

2018
Big Data Analytics Architecture for Security Intelligence.
Proceedings of the 11th International Conference on Security of Information and Networks, 2018

Compound Password System for Mobile.
Proceedings of the International Conference On Cyber Situational Awareness, 2018

2017
Using clustering for target tracking in vehicular ad hoc networks.
Veh. Commun., 2017

SDN-based wireless user management system.
Telecommun. Syst., 2017

On the Possibility of Insider Threat Prevention Using Intent-Based Access Control (IBAC).
IEEE Syst. J., 2017

A Comparative Analysis of the Impact of Features on Human Activity Recognition with Smartphone Sensors.
Proceedings of the 23rd Brazillian Symposium on Multimedia and the Web, 2017

SoLVE: A Localization System Framework for VANets using the Cloud and Fog Computing.
Proceedings of the 6th ACM Symposium on Development and Analysis of Intelligent VehicularNetworks and Applications, 2017

Proactive Certificate Distribution for PKI in VANET.
Proceedings of the 13th ACM Symposium on QoS and Security for Wireless and Mobile Networks, 2017

A Privacy Enhanced Facial Recognition Access Control System Using Biometric Encryption.
Proceedings of the 13th International Conference on Distributed Computing in Sensor Systems, 2017

2016
Phishing Susceptibility Detection through Social Media Analytics.
Proceedings of the 9th International Conference on Security of Information and Networks, 2016

Intention-based Trust Re-evaluation.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Vehicular Digital Forensics: What Does My Vehicle Know About Me?
Proceedings of the 6th ACM Symposium on Development and Analysis of Intelligent Vehicular Networks and Applications, 2016

Paving the way for Intelligent Transport Systems (ITS): Privacy Implications of Vehicle Infotainment and Telematics Systems.
Proceedings of the 6th ACM Symposium on Development and Analysis of Intelligent Vehicular Networks and Applications, 2016

An architecture for health data collection using off-the-shelf health sensors.
Proceedings of the 2016 IEEE International Symposium on Medical Measurements and Applications, 2016

2015
An Encrypted Trust-Based Routing Protocol.
CoRR, 2015

On the use of homomorphic encryption to secure cloud computing, services, and routing protocols.
CoRR, 2015

A Secure Database System using Homomorphic Encryption Schemes.
CoRR, 2015

Privacy and security concerns for health data collected using off-the-shelf health monitoring devices.
Proceedings of the 11th IEEE International Conference on Wireless and Mobile Computing, 2015

Smartphone-based Architecture for Smart Cities.
Proceedings of the 5th ACM Symposium on Development and Analysis of Intelligent Vehicular Networks and Applications, 2015

Design and Implementation of a Software-Defined Integrated Wired-Wireless Network Testbed.
Proceedings of the 13th ACM International Symposium on Mobility Management and Wireless Access, 2015

Smart city architecture for community level services through the internet of things.
Proceedings of the 18th International Conference on Intelligence in Next Generation Networks, 2015

Identifying and Classifying Suspicious Network Behavior Using Passive DNS Analysis.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
On the Possibility of Insider Threat Detection Using Physiological Signal Monitoring.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

Toward a Big Data Healthcare Analytics System: A Mathematical Modeling Perspective.
Proceedings of the 2014 IEEE World Congress on Services, 2014

A prediction based clustering algorithm for target tracking in vehicular ad-hoc networks.
Proceedings of the fourth ACM international symposium on Development and analysis of intelligent vehicular networks and applications, 2014

2013
Infrastructure Logicielle d un Environnement Hospitalier Intelligent.
CoRR, 2013

A Tweet of the Mind: Automated Emotion Detection for Social Media Using Brain Wave Pattern Analysis.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Authorized! access denied, unauthorized! access granted.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

Encouraging second thoughts: Obstructive user interfaces for raising security awareness.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

Privacy representation in VANET.
Proceedings of the third ACM international symposium on Design and analysis of intelligent vehicular networks and applications, 2013

A distributed clustering algorithm for target tracking in vehicular ad-hoc networks.
Proceedings of the third ACM international symposium on Design and analysis of intelligent vehicular networks and applications, 2013

Securing modbus transactions using hash-based message authentication codes and stream transmission control protocol.
Proceedings of the Third International Conference on Communications and Information Technology, 2013

The state of the art in electroencephalogram and access control.
Proceedings of the Third International Conference on Communications and Information Technology, 2013

Supporting Health Informatics with Platform-as-a-Service Cloud Computing.
Proceedings of the Advanced Technologies, Embedded and Multimedia for Human-centric Computing, 2013

2012
Privacy Preserving Scheme for Location-Based Services.
J. Information Security, 2012

Examining privacy in vehicular ad-hoc networks.
Proceedings of the second ACM international symposium on Design and analysis of intelligent vehicular networks and applications, 2012

Security model for real time tracking system (RTLS) in the healthcare sector.
Proceedings of the International Conference on Communications and Information Technology, 2012

A fully private video on-Demand service.
Proceedings of the 25th IEEE Canadian Conference on Electrical and Computer Engineering, 2012

2011
Measuring Privacy.
J. Internet Serv. Inf. Secur., 2011

Defining and Investigating Device Comfort.
J. Inf. Process., 2011

Non-standards for Trust: Foreground Trust and Second Thoughts for Mobile Security.
Proceedings of the Security and Trust Management - 7th International Workshop, 2011

Cryptographic security models for eHealth P2P database management systems network.
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011

Negotiating Privacy Preferences in Video Surveillance Systems.
Proceedings of the Modern Approaches in Applied Intelligence, 2011

Encrypted processes for oblivious data retrieval.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

Privacy and security of smart grid communication.
Proceedings of the Center for Advanced Studies on Collaborative Research, 2011

2010
Impact of Feature Reduction on the Efficiency of Wireless Intrusion Detection Systems.
IEEE Trans. Parallel Distributed Syst., 2010

Corrigendum to "Private key agreement and secure communication for heterogeneous sensor networks" [J. Parallel Distrib. Comput 70 (2010) 858-870].
J. Parallel Distributed Comput., 2010

Private key agreement and secure communication for heterogeneous sensor networks.
J. Parallel Distributed Comput., 2010

Pair-wise Cryptographic Models for Secure Data Exchange in P2P Database Management Systems.
IACR Cryptol. ePrint Arch., 2010

Cybersecurity issues for businesses.
Proceedings of the 2010 conference of the Centre for Advanced Studies on Collaborative Research, 2010

2009
Secure Anonymous Communication for Wireless Sensor Networks Based on Pairing over Elliptic Curves.
J. Interconnect. Networks, 2009

A privacy-enabled architecture for an RFID-based location monitoring system.
Proceedings of the Seventh ACM International Workshop on Mobility Management & Wireless Access, 2009

Analysis of Chinese Remainder Theorem Based Group Key Management Protocols.
Proceedings of the 2009 International Conference on Security & Management, 2009

Workshop on cybersecurity: security and privacy in the 21st century.
Proceedings of the 2009 conference of the Centre for Advanced Studies on Collaborative Research, 2009

2008
Wireless networks security: Proof of chopchop attack.
Proceedings of the 9th IEEE International Symposium on a World of Wireless, 2008

Biometric Identification System Based on Electrocardiogram Data.
Proceedings of the NTMS 2008, 2008

The cost of protecting privacy in multimedia applications.
Proceedings of the Q2SWinet'08, 2008

A secure digital asset managment network for game development and education.
Proceedings of the 2008 Conference on Future Play: Research, Play, Share, 2008

2007
A performance evaluation of distributed dynamic channel allocation protocols for mobile networks.
Wirel. Commun. Mob. Comput., 2007

Corrigendum to "Trust-based security for wireless ad hoc and sensor networks" [Computer Communications 30 (2007) 2413-2427].
Comput. Commun., 2007

Trust-based security for wireless ad hoc and sensor networks.
Comput. Commun., 2007

A QoS-based Service Composition for Content Adaptation.
Proceedings of the 23rd International Conference on Data Engineering Workshops, 2007

2006
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks.
Perform. Evaluation, 2006

Protecting the privacy of user's QoS preferences for multimedia applications.
Proceedings of the WMuNeP'06, 2006

2005
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks.
Comput. Commun., 2005

2004
Personal and service mobility in ubiquitous computing environments.
Wirel. Commun. Mob. Comput., 2004

A QoE Sensitive Architecture for Advanced Collaborative Environments.
Proceedings of the 1st International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks (QSHINE 2004), 2004

A QoS-Based Framework for Distributed Content Adaptation.
Proceedings of the 1st International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks (QSHINE 2004), 2004

A novel solution for achieving anonymity in wireless ad hoc networks.
Proceedings of the 1st ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, 2004

A performance comparison of dynamic channel and ressource allocation protocols for mobile cellular networks.
Proceedings of the Second International Workshop on Mobility Management & Wireless Access Protocols, 2004

SDAR: A Secure Distributed Anonymous Routing Protocol for Wireless and Mobile Ad Hoc Networks.
Proceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), 2004

2003
Privacy and Security in E-Learning.
Int. J. Distance Educ. Technol., 2003

Agent Support for Context-Aware Services and Personal Mobility.
Proceedings of the Mobile Agents for Telecommunication Applications, 2003

Secure Dynamic Distributed Routing Algorithm for Ad Hoc Wireless Networks.
Proceedings of the 32nd International Conference on Parallel Processing Workshops (ICPP 2003 Workshops), 2003

Support for Personal and Service Mobility in Ubiquitous Computing Environments.
Proceedings of the Euro-Par 2003. Parallel Processing, 2003

2001
Selecting the QoS Parameters for Multicast Applications Based on User Profile and Device Capability.
Proceedings of the Interactive Distributed Multimedia Systems, 2001

1999
On Metrics for the Dynamic Load Balancing of Optimistic Simulations.
Proceedings of the 32nd Annual Hawaii International Conference on System Sciences (HICSS-32), 1999


  Loading...