default search action
Issa M. Khalil
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j46]Guanxiong Liu, Abdallah Khreishah, Fatima Sharadgah, Issa Khalil:
An Adaptive Black-Box Defense Against Trojan Attacks (TrojDef). IEEE Trans. Neural Networks Learn. Syst. 35(4): 5367-5381 (2024) - [c52]Mahmoud Nazzal, Issa Khalil, Abdallah Khreishah, NhatHai Phan:
PromSec: Prompt Optimization for Secure Generation of Functional Source Code with Large Language Models (LLMs). CCS 2024: 2266-2280 - [c51]Khiem Ton, Nhi Nguyen, Mahmoud Nazzal, Abdallah Khreishah, Cristian Borcea, NhatHai Phan, Ruoming Jin, Issa Khalil, Yelong Shen:
Demo: SGCode: A Flexible Prompt-Optimizing System for Secure Generation of Code. CCS 2024: 5078-5080 - [c50]Euijin Choo, Mohamed Nabeel, Doowon Kim, Ravindu De Silva, Ting Yu, Issa Khalil:
A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs. SIGMETRICS/Performance (Abstracts) 2024: 55-56 - [c49]Mahmoud Nazzal, Issa Khalil, Abdallah Khreishah, NhatHai Phan, Yao Ma:
Multi-Instance Adversarial Attack on GNN-Based Malicious Domain Detection. SP 2024: 1236-1254 - [c48]Saravanan Thirumuruganathan, Fatih Deniz, Issa Khalil, Ting Yu, Mohamed Nabeel, Mourad Ouzzani:
Detecting and Mitigating Sampling Bias in Cybersecurity with Unlabeled Data. USENIX Security Symposium 2024 - [i29]Naseem Khan, Kashif Ahmad, Aref Al-Tamimi, Mohammed M. Alani, Amine Bermak, Issa Khalil:
Explainable AI-based Intrusion Detection System for Industry 5.0: An Overview of the Literature, associated Challenges, the existing Solutions, and Potential Research Directions. CoRR abs/2408.03335 (2024) - [i28]Khiem Ton, Nhi Nguyen, Mahmoud Nazzal, Abdallah Khreishah, Cristian Borcea, NhatHai Phan, Ruoming Jin, Issa Khalil, Yelong Shen:
Demo: SGCode: A Flexible Prompt-Optimizing System for Secure Generation of Code. CoRR abs/2409.07368 (2024) - [i27]Mahmoud Nazzal, Issa Khalil, Abdallah Khreishah, NhatHai Phan:
PromSec: Prompt Optimization for Secure Generation of Functional Source Code with Large Language Models (LLMs). CoRR abs/2409.12699 (2024) - 2023
- [j45]Euijin Choo, Mohamed Nabeel, Doowon Kim, Ravindu De Silva, Ting Yu, Issa Khalil:
A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs. Proc. ACM Meas. Anal. Comput. Syst. 7(3): 59:1-59:26 (2023) - [j44]Euijin Choo, Mohamed Nabeel, Mashael AlSabah, Issa Khalil, Ting Yu, Wei Wang:
DeviceWatch: A Data-Driven Network Analysis Approach to Identifying Compromised Mobile Devices with Graph-Inference. ACM Trans. Priv. Secur. 26(1): 9:1-9:32 (2023) - [i26]Khang Tran, Ferdinando Fioretto, Issa Khalil, My T. Thai, NhatHai Phan:
FairDP: Certified Fairness with Differential Privacy. CoRR abs/2305.16474 (2023) - [i25]Mahmoud Nazzal, Issa Khalil, Abdallah Khreishah, NhatHai Phan, Yao Ma:
Multi-Instance Adversarial Attack on GNN-Based Malicious Domain Detection. CoRR abs/2308.11754 (2023) - 2022
- [c47]Khang Tran, Phung Lai, NhatHai Phan, Issa Khalil, Yao Ma, Abdallah Khreishah, My T. Thai, Xintao Wu:
Heterogeneous Randomized Response for Differential Privacy in Graph Neural Networks. IEEE Big Data 2022: 1582-1587 - [c46]Mustafa Abdallah, Daniel Woods, Parinaz Naghizadeh, Issa Khalil, Timothy N. Cason, Shreyas Sundaram, Saurabh Bagchi:
TASHAROK: Using Mechanism Design for Enhancing Security Resource Allocation in Interdependent Systems. SP 2022: 249-266 - [c45]Saravanan Thirumuruganathan, Mohamed Nabeel, Euijin Choo, Issa Khalil, Ting Yu:
SIRAJ: A Unified Framework for Aggregation of Malicious Entity Detectors. SP 2022: 507-521 - [i24]Phung Lai, NhatHai Phan, Abdallah Khreishah, Issa Khalil, Xintao Wu:
Model Transferring Attacks to Backdoor HyperNetwork in Personalized Federated Learning. CoRR abs/2201.07063 (2022) - [i23]Euijin Choo, Mohamed Nabeel, Ravindu De Silva, Ting Yu, Issa Khalil:
A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs. CoRR abs/2205.13155 (2022) - [i22]Enes Altinisik, Husrev Taha Sencar, Mohamed Nabeel, Issa Khalil, Ting Yu:
Exploration of Enterprise Server Data to Assess Ease of Modeling System Behavior. CoRR abs/2206.05679 (2022) - [i21]Guanxiong Liu, Abdallah Khreishah, Fatima Sharadgah, Issa Khalil:
An Adaptive Black-box Defense against Trojan Attacks (TrojDef). CoRR abs/2209.01721 (2022) - [i20]Sanjay Chawla, Preslav Nakov, Ahmed Ali, Wendy Hall, Issa Khalil, Xiaosong Ma, Husrev Taha Sencar, Ingmar Weber, Michael A. Wooldridge, Ting Yu:
Ten Years after ImageNet: A 360° Perspective on AI. CoRR abs/2210.01797 (2022) - [i19]Khang Tran, Phung Lai, NhatHai Phan, Issa Khalil, Yao Ma, Abdallah Khreishah, My Tra Thai, Xintao Wu:
Heterogeneous Randomized Response for Differential Privacy in Graph Neural Networks. CoRR abs/2211.05766 (2022) - 2021
- [c44]Mustafa Abdallah, Daniel Woods, Parinaz Naghizadeh, Issa Khalil, Timothy N. Cason, Shreyas Sundaram, Saurabh Bagchi:
Morshed: Guiding Behavioral Decision-Makers towards Better Security Investment in Interdependent Systems. AsiaCCS 2021: 378-392 - [c43]Guanxiong Liu, Issa Khalil, Abdallah Khreishah, NhatHai Phan:
A Synergetic Attack against Neural Network Classifiers combining Backdoor and Adversarial Examples. IEEE BigData 2021: 834-846 - [c42]Guanxiong Liu, Issa Khalil, Abdallah Khreishah:
Using Single-Step Adversarial Training to Defend Iterative Adversarial Examples. CODASPY 2021: 17-27 - [c41]Pengcheng Xia, Mohamed Nabeel, Issa Khalil, Haoyu Wang, Ting Yu:
Identifying and Characterizing COVID-19 Themed Malicious Domain Campaigns. CODASPY 2021: 209-220 - [c40]Lun-Pin Yuan, Euijin Choo, Ting Yu, Issa Khalil, Sencun Zhu:
Time-Window Based Group-Behavior Supported Method for Accurate Detection of Anomalous Users. DSN 2021: 250-262 - [c39]Mohamed Nabeel, Enes Altinisik, Haipei Sun, Issa Khalil, Wendy Hui Wang, Ting Yu:
CADUE: Content-Agnostic Detection of Unwanted Emails for Enterprise Security. RAID 2021: 205-219 - [c38]Fatima Alsharadgah, Abdallah Khreishah, Mahmoud Al-Ayyoub, Yaser Jararweh, Guanxiong Liu, Issa Khalil, Muhannad Almutiry, Nasir Saeed:
An Adaptive Black-box Defense against Trojan Attacks on Text Data. SNAMS 2021: 1-8 - [c37]Ravindu De Silva, Mohamed Nabeel, Charith Elvitigala, Issa Khalil, Ting Yu, Chamath Keppitiyagama:
Compromised or Attacker-Owned: A Large Scale Classification and Study of Hosting Domains of Malicious URLs. USENIX Security Symposium 2021: 3721-3738 - [i18]Guanxiong Liu, Issa Khalil, Abdallah Khreishah, NhatHai Phan:
A Synergetic Attack against Neural Network Classifiers combining Backdoor and Adversarial Examples. CoRR abs/2109.01275 (2021) - 2020
- [j43]Guanxiong Liu, Issa Khalil, Abdallah Khreishah, Abdulelah Abdallah Algosaibi, Adel Aldalbahi, Mohammed Alnaeem, Abdulaziz Alhumam, Mohammed Anan:
ManiGen: A Manifold Aided Black-Box Generator of Adversarial Examples. IEEE Access 8: 197086-197096 (2020) - [j42]Mohamed Nabeel, Issa M. Khalil, Bei Guan, Ting Yu:
Following Passive DNS Traces to Detect Stealthy Malicious Domains Via Graph Inference. ACM Trans. Priv. Secur. 23(4): 17:1-17:36 (2020) - [j41]Sihua Shao, Abdallah Khreishah, Issa Khalil:
Enabling Real-Time Indoor Tracking of IoT Devices Through Visible Light Retroreflection. IEEE Trans. Mob. Comput. 19(4): 836-851 (2020) - [i17]Guanxiong Liu, Issa Khalil, Abdallah Khreishah:
Using Single-Step Adversarial Training to Defend Iterative Adversarial Examples. CoRR abs/2002.09632 (2020) - [i16]Mustafa Abdallah, Daniel Woods, Parinaz Naghizadeh, Issa Khalil, Timothy N. Cason, Shreyas Sundaram, Saurabh Bagchi:
BASCPS: How does behavioral decision making impact the security of cyber-physical systems? CoRR abs/2004.01958 (2020) - [i15]Guanxiong Liu, Issa Khalil, Abdallah Khreishah, Abdulelah Abdallah Algosaibi, Adel Aldalbahi, Mohammed Alaneem, Abdulaziz Alhumam, Mohammed Anan:
ManiGen: A Manifold Aided Black-box Generator of Adversarial Examples. CoRR abs/2007.05817 (2020) - [i14]Mustafa Abdallah, Daniel Woods, Parinaz Naghizadeh, Issa Khalil, Timothy N. Cason, Shreyas Sundaram, Saurabh Bagchi:
Morshed: Guiding Behavioral Decision-Makers towards Better Security Investment in Interdependent Systems. CoRR abs/2011.06933 (2020) - [i13]Lun-Pin Yuan, Euijin Choo, Ting Yu, Issa Khalil, Sencun Zhu:
Time-Window Group-Correlation Support vs. Individual Features: A Detection of Abnormal Users. CoRR abs/2012.13971 (2020)
2010 – 2019
- 2019
- [j40]Ismail Omar Hababeh, Ammar Gharaibeh, Samer Nofal, Issa Khalil:
An Integrated Methodology for Big Data Classification and Security for Improving Cloud Systems Data Mobility. IEEE Access 7: 9153-9163 (2019) - [j39]Hazim Shakhatreh, Ahmad Sawalmeh, Ala I. Al-Fuqaha, Zuochao Dou, Eyad K. Almaita, Issa Khalil, Noor Shamsiah Othman, Abdallah Khreishah, Mohsen Guizani:
Unmanned Aerial Vehicles (UAVs): A Survey on Civil Applications and Key Research Challenges. IEEE Access 7: 48572-48634 (2019) - [j38]Ala I. Al-Fuqaha, Ammar Gharaibeh, Ihab Mohammed, Sayed Jahed Hussini, Abdallah Khreishah, Issa Khalil:
Online Algorithm for Opportunistic Handling of Received Packets in Vehicular Networks. IEEE Trans. Intell. Transp. Syst. 20(1): 285-296 (2019) - [c36]Haipei Sun, Xiaokui Xiao, Issa Khalil, Yin Yang, Zhan Qin, Wendy Hui Wang, Ting Yu:
Analyzing Subgraph Statistics from Extended Local Views with Decentralized Differential Privacy. CCS 2019: 703-717 - [c35]Guanxiong Liu, Issa Khalil, Abdallah Khreishah:
Using Intuition from Empirical Properties to Simplify Adversarial Training Defense. DSN Workshops 2019: 58-61 - [c34]Guanxiong Liu, Issa Khalil, Abdallah Khreishah:
ZK-GanDef: A GAN Based Zero Knowledge Adversarial Training Defense for Neural Networks. DSN 2019: 64-75 - [c33]Guanxiong Liu, Issa Khalil, Abdallah Khreishah:
GanDef: A GAN Based Adversarial Training Defense for Neural Network Classifier. SEC 2019: 19-32 - [i12]Guanxiong Liu, Issa Khalil, Abdallah Khreishah:
GanDef: A GAN based Adversarial Training Defense for Neural Network Classifier. CoRR abs/1903.02585 (2019) - [i11]Guanxiong Liu, Issa Khalil, Abdallah Khreishah:
ZK-GanDef: A GAN based Zero Knowledge Adversarial Training Defense for Neural Networks. CoRR abs/1904.08516 (2019) - [i10]Guanxiong Liu, Issa Khalil, Abdallah Khreishah:
Using Intuition from Empirical Properties to Simplify Adversarial Training Defense. CoRR abs/1906.11729 (2019) - [i9]Euijin Choo, Mohamed Nabeel, Mashael AlSabah, Issa Khalil, Ting Yu, Wei Wang:
DeviceWatch: Identifying Compromised Mobile Devices through Network Traffic Analysis and Graph Inference. CoRR abs/1911.12080 (2019) - 2018
- [j37]Yury Zhauniarovich, Issa Khalil, Ting Yu, Marc Dacier:
A Survey on Malicious Domains Detection through DNS Data Analysis. ACM Comput. Surv. 51(4): 67:1-67:36 (2018) - [j36]Abdallah Khreishah, Haythem Bany Salameh, Issa Khalil, Ammar Gharaibeh:
Renewable Energy-Aware Joint Caching and Routing for Green Communication Networks. IEEE Syst. J. 12(1): 768-777 (2018) - [j35]Zuochao Dou, Issa Khalil, Abdallah Khreishah, Ala I. Al-Fuqaha:
Robust Insider Attacks Countermeasure for Hadoop: Design and Implementation. IEEE Syst. J. 12(2): 1874-1885 (2018) - [j34]Zuochao Dou, Issa Khalil, Abdallah Khreishah:
A Novel and Robust Authentication Factor Based on Network Communications Latency. IEEE Syst. J. 12(4): 3279-3290 (2018) - [j33]Hazim Shakhatreh, Abdallah Khreishah, Issa Khalil:
Indoor Mobile Coverage Problem Using UAVs. IEEE Syst. J. 12(4): 3837-3848 (2018) - [c32]Issa M. Khalil, Bei Guan, Mohamed Nabeel, Ting Yu:
A Domain is only as Good as its Buddies: Detecting Stealthy Malicious Domains via Graph Inference. CODASPY 2018: 330-341 - [c31]Sihua Shao, Abdallah Khreishah, Issa Khalil:
RETRO: Retroreflector Based Visible Light Indoor Localization for Real-time Tracking of IoT Devices. INFOCOM 2018: 1025-1033 - [i8]Hazim Shakhatreh, Ahmad Sawalmeh, Ala I. Al-Fuqaha, Zuochao Dou, Eyad K. Almaita, Issa Khalil, Noor Shamsiah Othman, Abdallah Khreishah, Mohsen Guizani:
Unmanned Aerial Vehicles: A Survey on Civil Applications and Key Research Challenges. CoRR abs/1805.00881 (2018) - [i7]Yury Zhauniarovich, Issa Khalil, Ting Yu, Marc Dacier:
A Survey on Malicious Domains Detection through DNS Data Analysis. CoRR abs/1805.08426 (2018) - 2017
- [j32]Ammar Gharaibeh, Mohammad A. Salahuddin, Sayed Jahed Hussini, Abdallah Khreishah, Issa Khalil, Mohsen Guizani, Ala I. Al-Fuqaha:
Smart Cities: A Survey on Data Management, Security, and Enabling Technologies. IEEE Commun. Surv. Tutorials 19(4): 2456-2501 (2017) - [j31]Zuochao Dou, Issa Khalil, Abdallah Khreishah, Ala I. Al-Fuqaha, Mohsen Guizani:
Systematization of Knowledge (SoK): A Systematic Review of Software-Based Web Phishing Detection. IEEE Commun. Surv. Tutorials 19(4): 2797-2819 (2017) - [j30]Mudassir Masood, Ali Ghrayeb, Prabhu Babu, Issa Khalil, Mazen O. Hasna:
A Minorization-Maximization Algorithm for Maximizing the Secrecy Rate of the MIMOME Wiretap Channel. IEEE Commun. Lett. 21(3): 520-523 (2017) - [j29]Ammar Gharaibeh, Abdallah Khreishah, Mehdi Mohammadi, Ala I. Al-Fuqaha, Issa Khalil, Ammar Rayes:
Online Auction of Cloud Resources in Support of the Internet of Things. IEEE Internet Things J. 4(5): 1583-1596 (2017) - [j28]Zuochao Dou, Issa Khalil, Abdallah Khreishah:
CLAS: A Novel Communications Latency Based Authentication Scheme. Secur. Commun. Networks 2017: 4286903:1-4286903:20 (2017) - [c30]Zhan Qin, Ting Yu, Yin Yang, Issa Khalil, Xiaokui Xiao, Kui Ren:
Generating Synthetic Decentralized Social Graphs with Local Differential Privacy. CCS 2017: 425-438 - [i6]Hazim Shakhatreh, Abdallah Khreishah, Jacob Chakareski, Haythem Bany Salameh, Issa Khalil:
On The Continuous Coverage Problem for a Swarm of UAVs. CoRR abs/1705.09766 (2017) - [i5]Hazim Shakhatreh, Abdallah Khreishah, Ayoub Alsarhan, Issa Khalil, Ahmad Sawalmeh, Noor Shamsiah Othman:
Efficient 3D Placement of a UAV Using Particle Swarm Optimization. CoRR abs/1705.09769 (2017) - [i4]Hazim Shakhatreh, Abdallah Khreishah, Issa Khalil:
The Indoor Mobile Coverage Problem Using UAVs. CoRR abs/1705.09771 (2017) - [i3]Issa Khalil, Bei Guan, Mohamed Nabeel, Ting Yu:
Killing Two Birds with One Stone: Malicious Domain Detection with High Accuracy and Coverage. CoRR abs/1711.00300 (2017) - 2016
- [j27]Sihua Shao, Abdallah Khreishah, Issa Khalil:
Joint Link Scheduling and Brightness Control for Greening VLC-Based Indoor Access Networks. JOCN 8(3): 148-161 (2016) - [j26]Abdallah Khreishah, Jacob Chakareski, Ammar Gharaibeh, Issa Khalil, Ali Diabat:
Towards efficient operation of internet data center networks: Joint data placement and flow control for cost optimization. Simul. Model. Pract. Theory 64: 83-98 (2016) - [j25]Ammar Gharaibeh, Abdallah Khreishah, Issa Khalil, Jie Wu:
Distributed Online En-Route Caching. IEEE Trans. Parallel Distributed Syst. 27(12): 3455-3468 (2016) - [c29]Zhan Qin, Yin Yang, Ting Yu, Issa Khalil, Xiaokui Xiao, Kui Ren:
Heavy Hitter Estimation over Set-Valued Data with Local Differential Privacy. CCS 2016: 192-203 - [c28]Issa Khalil, Ting Yu, Bei Guan:
Discovering Malicious Domains through Passive DNS Data Graph Analysis. AsiaCCS 2016: 663-674 - [c27]Issa Khalil, Zuochao Dou, Abdallah Khreishah:
Your Credentials Are Compromised, Do Not Panic: You Can Be Well Protected. AsiaCCS 2016: 925-930 - [c26]Mudassir Masood, Ali Ghrayeb, Prabhu Babu, Issa M. Khalil, Mazen O. Hasna:
A minorization-maximization algorithm for an-based mimome secrecy rate maximization. GlobalSIP 2016: 975-980 - [c25]Ammar Gharaibeh, Abdallah Khreishah, Issa Khalil:
An O(1)-competitive online caching algorithm for content centric networking. INFOCOM 2016: 1-9 - [c24]Hazim Shakhatreh, Abdallah Khreishah, Jacob Chakareski, Haythem Bany Salameh, Issa M. Khalil:
On the continuous coverage problem for a swarm of UAVs. Sarnoff Symposium 2016: 130-135 - 2015
- [j24]Abdallah Khreishah, Issa M. Khalil, Jie Wu:
Universal Network Coding-Based Opportunistic Routing for Unicast. IEEE Trans. Parallel Distributed Syst. 26(6): 1765-1774 (2015) - [j23]Ismail Omar Hababeh, Issa M. Khalil, Abdallah Khreishah:
Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System. IEEE Trans. Serv. Comput. 8(1): 47-64 (2015) - [i2]Sihua Shao, Abdallah Khreishah, Issa Khalil:
Joint Link Scheduling and Brightness Control for Greening VLC-based Indoor Access Networks. CoRR abs/1510.00026 (2015) - 2014
- [j22]Issa M. Khalil, Abdallah Khreishah, Faheem Ahmed, Khaled Shuaib:
Dependable wireless sensor networks for reliable and secure humanitarian relief applications. Ad Hoc Networks 13: 94-106 (2014) - [j21]Issa Khalil, Abdallah Khreishah, Muhammad Azeem:
Consolidated Identity Management System for secure mobile cloud computing. Comput. Networks 65: 99-110 (2014) - [j20]Issa M. Khalil, Abdallah Khreishah, Muhammad Azeem:
Cloud Computing Security: A Survey. Comput. 3(1): 1-35 (2014) - [c23]Abdallah Khreishah, Issa Khalil, Ammar Gharaibeh, Haythem Bany Salameh, Rafe Alasem:
Joint Caching and Routing for Greening Computer Networks with Renewable Energy Sources. FiCloud 2014: 101-106 - [c22]Ammar Gharaibeh, Abdallah Khreishah, Issa Khalil, Jie Wu:
Asymptotically-Optimal Incentive-Based En-Route Caching Scheme. MASS 2014: 318-326 - [c21]Issa M. Khalil, Zuochao Dou, Abdallah Khreishah:
TPM-Based Authentication Mechanism for Apache Hadoop. SecureComm (1) 2014: 105-122 - [i1]Ammar Gharaibeh, Abdallah Khreishah, Issa Khalil, Jie Wu:
Asymptotically-Optimal Incentive-Based En-Route Caching Scheme. CoRR abs/1404.4639 (2014) - 2013
- [j19]Ismail Omar Hababeh, Issa Khalil, Abdallah Khreishah, Samir Bataineh:
Performance Evaluation of Wormhole Security Approaches for Ad-Hoc Networks. J. Comput. Sci. 9(12): 1626-1637 (2013) - [j18]Khaled Shuaib, Issa Khalil, Mohammed Abdel-Hafez:
Communications in Smart Grid: A Review with Performance, Reliability and Security Consideration. J. Networks 8(6): 1229-1240 (2013) - [j17]Issa Khalil, Saurabh Bagchi, Najah AbuAli, Mohammad Hayajneh:
DISA: Detection and isolation of sneaky attackers in locally monitored multi-hop wireless networks. Secur. Commun. Networks 6(12): 1524-1538 (2013) - [j16]Abdallah Khreishah, Issa Khalil, Jie Wu:
Low Complexity and Provably Efficient Algorithm for Joint Inter and Intrasession Network Coding in Wireless Networks. IEEE Trans. Parallel Distributed Syst. 24(10): 2015-2024 (2013) - [c20]Issa M. Khalil, Abdallah Khreishah, Salah Bouktif, Azeem Ahmad:
Security Concerns in Cloud Computing. ITNG 2013: 411-416 - [c19]Ammar Kamel, Ala I. Al-Fuqaha, Dionysios Kountanis, Issa Khalil:
Towards a client-side QoS monitoring and assessment using Generalized Pareto Distribution in a cloud-based environment. WCNC Workshops 2013: 123-128 - 2012
- [j15]Issa Khalil, Mamoun A. Awad, Abdallah Khreishah:
CTAC: Control traffic tunneling attacks' countermeasures in mobile wireless networks. Comput. Networks 56(14): 3300-3317 (2012) - [j14]Issa Khalil, Mamoun A. Awad, Salah Bouktif, Falah R. Awwad:
MSN: mutual secure neighbor verification in multi-hop wireless networks. Secur. Commun. Networks 5(2): 186-196 (2012) - [j13]Issa M. Khalil, Yasser Gadallah, Mohammad Hayajneh, Abdallah Khreishah:
An Adaptive OFDMA-Based MAC Protocol for Underwater Acoustic Wireless Sensor Networks. Sensors 12(7): 8782-8805 (2012) - [j12]Mamoun A. Awad, Issa Khalil:
Prediction of User's Web-Browsing Behavior: Application of Markov Model. IEEE Trans. Syst. Man Cybern. Part B 42(4): 1131-1142 (2012) - [j11]Abdallah Khreishah, Issa M. Khalil, Pouya Ostovari, Jie Wu:
Flow-based XOR Network Coding for Lossy Wireless Networks. IEEE Trans. Wirel. Commun. 11(6): 2321-2329 (2012) - [c18]Issa M. Khalil, Abdallah Khreishah:
On the analysis of identity delegation attacks. ICNC 2012: 990-994 - [c17]Abdallah Khreishah, Issa M. Khalil, Jie Wu:
Distributed network coding-based opportunistic routing for multicast. MobiHoc 2012: 115-124 - [c16]Abdallah Khreishah, Issa M. Khalil, Jie Wu:
Universal opportunistic routing scheme using network coding. SECON 2012: 353-361 - 2011
- [j10]Salah Bouktif, Faheem Ahmed, Issa Khalil, Giuliano Antoniol:
Corrigendum to "A novel composite model approach to improve software quality prediction" [Information and Software Technology 52 (12) (2010) 1298-1311]. Inf. Softw. Technol. 53(3): 291 (2011) - [j9]Issa Khalil:
ELMO: Energy Aware Local Monitoring in Sensor Networks. IEEE Trans. Dependable Secur. Comput. 8(4): 523-536 (2011) - [j8]Issa M. Khalil, Saurabh Bagchi:
Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure. IEEE Trans. Mob. Comput. 10(8): 1096-1112 (2011) - [c15]Abdallah Khreishah, Jie Wu, Pouya Ostovari, Issa M. Khalil:
Flow Based XOR Network Coding for Lossy Wireless Networks. GLOBECOM 2011: 1-5 - [c14]Abdallah Khreishah, Issa M. Khalil, Jie Wu:
Polynomial Time and Provably Efficient Network Coding Scheme for Lossy Wireless Networks. MASS 2011: 391-400 - 2010
- [j7]Issa M. Khalil, Saurabh Bagchi, Cristina Nita-Rotaru, Ness B. Shroff:
UnMask: Utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks. Ad Hoc Networks 8(2): 148-164 (2010) - [j6]Salah Bouktif, Faheem Ahmed, Issa Khalil, Giuliano Antoniol:
A novel composite model approach to improve software quality prediction. Inf. Softw. Technol. 52(12): 1298-1311 (2010) - [c13]Issa Khalil:
MCC: Mitigating Colluding Collision Attacks in Wireless Sensor Networks. GLOBECOM 2010: 1-5
2000 – 2009
- 2009
- [j5]Rajesh Krishna Panta, Saurabh Bagchi, Issa M. Khalil:
Efficient wireless reprogramming through reduced bandwidth usage and opportunistic sleeping. Ad Hoc Networks 7(1): 42-62 (2009) - [j4]Mohammad Hayajneh, Najah A. Abu Ali, Issa Khalil:
Uplink and downlink scheduling for point to multipoint WiMAX Networks. Wirel. Commun. Mob. Comput. 9(9): 1231-1242 (2009) - [c12]Issa Khalil:
MPC: Mitigating Stealthy Power Control Attacks in Wireless Ad Hoc Networks. GLOBECOM 2009: 1-6 - [c11]Issa Khalil, Mohammad Hayajneh, Mamoun A. Awad:
SVNM: Secure verification of neighborhood membership in static multi-hop wireless networks. ISCC 2009: 368-373 - [c10]Mohammad Hayajneh, Issa Khalil, Mamoun A. Awad:
Non-cooperative uplink power control game for CDMA wireless communications systems. ISCC 2009: 587-592 - [c9]Mohammad Hayajneh, Issa Khalil, Yasser Gadallah:
An OFDMA-based MAC protocol for under water acoustic wireless sensor networks. IWCMC 2009: 810-814 - 2008
- [j3]Issa M. Khalil, Saurabh Bagchi, Ness B. Shroff:
MobiWorp: Mitigation of the wormhole attack in mobile multihop wireless networks. Ad Hoc Networks 6(3): 344-362 (2008) - [c8]Issa Khalil:
MIMI: Mitigating Packet Misrouting in Locally-Monitored Multi-Hop Wireless Ad Hoc Networks. GLOBECOM 2008: 773-777 - [c7]Issa Khalil, Saurabh Bagchi:
MISPAR: mitigating stealthy packet dropping in locally-monitored multi-hop wireless ad hoc networks. SecureComm 2008: 28 - [c6]Rajesh Krishna Panta, Saurabh Bagchi, Issa M. Khalil, Luis Antonio Montestruque:
Single versus multi-hop wireless reprogramming in sensor networks. TRIDENTCOM 2008: 34 - 2007
- [j2]Issa M. Khalil, Saurabh Bagchi, Ness B. Shroff:
Analysis and evaluation of Secos, a protocol for energy efficient and secure communication in sensor networks. Ad Hoc Networks 5(3): 360-391 (2007) - [j1]Issa M. Khalil, Saurabh Bagchi, Ness B. Shroff:
LiteWorp: Detection and isolation of the wormhole attack in static multihop wireless networks. Comput. Networks 51(13): 3750-3772 (2007) - [c5]Issa M. Khalil, Saurabh Bagchi, Ness B. Shroff:
SLAM: Sleep-Wake Aware Local Monitoring in Sensor Networks. DSN 2007: 565-574 - [c4]Rajesh Krishna Panta, Issa M. Khalil, Saurabh Bagchi:
Stream: Low Overhead Wireless Reprogramming for Sensor Networks. INFOCOM 2007: 928-936 - 2006
- [c3]Issa M. Khalil, Saurabh Bagchi, Ness B. Shroff:
MOBIWORP: Mitigation of the Wormhole Attack in Mobile Multihop Wireless Networks. SecureComm 2006: 1-12 - 2005
- [c2]Issa M. Khalil, Saurabh Bagchi, Ness B. Shroff:
LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks. DSN 2005: 612-621 - [c1]Issa M. Khalil, Saurabh Bagchi, Cristina Nita-Rotaru:
DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks. SecureComm 2005: 89-100
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-11 21:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint