Follow
Hussain Almohri
Hussain Almohri
Associate Professor, Kuwait University
Verified email at ieee.org - Homepage
Title
Cited by
Cited by
Year
Security optimization of dynamic networks with probabilistic graph modeling and linear programming
HMJ Almohri, LT Watson, D Yao, X Ou
IEEE Transactions on Dependable and Secure Computing 13 (4), 474-487, 2015
812015
On threat modeling and mitigation of medical cyber-physical systems
H Almohri, L Cheng, D Yao, H Alemzadeh
2017 IEEE/ACM International Conference on Connected Health: Applications …, 2017
672017
Cyberbiosecurity challenges of pathogen genome databases
BA Vinatzer, LS Heath, HMJ Almohri, MJ Stulberg, C Lowe, S Li
Frontiers in bioengineering and biotechnology 7, 106, 2019
372019
Fidelius charm: Isolating unsafe rust code
HMJ Almohri, D Evans
Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018
262018
Droidbarrier: Know what is executing on your android
HMJ Almohri, D Yao, D Kafura
Proceedings of the 4th ACM Conference on Data and Application Security and …, 2014
262014
Predictability of IP address allocations for cloud computing platforms
HMJ Almohri, LT Watson, D Evans
IEEE Transactions on Information Forensics and Security 15, 500-511, 2019
222019
Process authentication for high system assurance
HMJ Almohri, D Yao, D Kafura
IEEE Transactions on Dependable and Secure Computing 11 (2), 168-180, 2013
222013
An attack-resilient architecture for the Internet of Things
HMJ Almohri, LT Watson, D Evans
IEEE Transactions on Information Forensics and Security 15, 3940-3954, 2020
162020
Misery digraphs: delaying intrusion attacks in obscure clouds
HMJ Almohri, LT Watson, D Evans
IEEE Transactions on Information Forensics and Security 13 (6), 1361-1375, 2017
162017
Identifying android malware families using android-oriented metrics
W Blanc, LG Hashem, KO Elish, MJH Almohri
2019 IEEE international conference on big data (big data), 4708-4713, 2019
152019
Identifying native applications with high assurance
HMJ Almohri, D Yao, D Kafura
Second ACM Conference on Data and Application Security and Privacy, 275-282, 2012
132012
Lightweight, effective detection and characterization of mobile malware families
KO Elish, MO Elish, HMJ Almohri
IEEE Transactions on Computers 71 (11), 2982-2995, 2022
72022
An efficient deception architecture for cloud-based virtual networks
M Qasem, HMJ Almohri
arXiv preprint arXiv:2004.06933, 2020
4*2020
Methods and apparatus for a token management system for transactions
SA Almohri, H Almohri
US Patent App. 14/194,163, 2015
42015
A Client Bootstrapping Protocol for DoS Attack Mitigation on Entry Point Services in the Cloud
HMJ Almohri, M Almutawa, M Alawadh, K Elish
Security and Communication Networks 2020, 1-12, 2020
22020
Security risk prioritization for logical attack graphs
H Almohri
Kansas State University, 2008
22008
On Parallel Real-Time Security Improvement Using Mixed-Integer Programming
HMJ Almohri, LT Watson, H Alemzadeh, M Almutawa
IEEE Access 9, 58824-58837, 2021
12021
Security evaluation by arrogance: Saving time and money
HMJ Almohri, SA Almohri
2017 IEEE/ACM 1st International Workshop on Software Engineering for …, 2017
12017
High assurance models for secure systems
HMJ Almohri
Virginia Polytechnic Institute and State University, 2013
12013
Model-Agnostic Federated Learning for Privacy-Preserving Systems
HMJ Almohri, LT Watson
2023 IEEE Secure Development Conference (SecDev), 99-105, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20