Issa M. Khalil
Orcid: 0000-0002-7660-9512
According to our database1,
Issa M. Khalil
authored at least 108 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Neural Networks Learn. Syst., April, 2024
PromSec: Prompt Optimization for Secure Generation of Functional Source Code with Large Language Models (LLMs).
CoRR, 2024
CoRR, 2024
Explainable AI-based Intrusion Detection System for Industry 5.0: An Overview of the Literature, associated Challenges, the existing Solutions, and Potential Research Directions.
CoRR, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
2023
A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs.
Proc. ACM Meas. Anal. Comput. Syst., December, 2023
DeviceWatch: A Data-Driven Network Analysis Approach to Identifying Compromised Mobile Devices with Graph-Inference.
ACM Trans. Priv. Secur., 2023
2022
CoRR, 2022
A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs.
CoRR, 2022
Model Transferring Attacks to Backdoor HyperNetwork in Personalized Federated Learning.
CoRR, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
TASHAROK: Using Mechanism Design for Enhancing Security Resource Allocation in Interdependent Systems.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the IEEE International Conference on Big Data, 2022
2021
Compromised or Attacker-Owned: A Large Scale Classification and Study of Hosting Domains of Malicious URLs.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the Eighth International Conference on Social Network Analysis, 2021
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021
Time-Window Based Group-Behavior Supported Method for Accurate Detection of Anomalous Users.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021
A Synergetic Attack against Neural Network Classifiers combining Backdoor and Adversarial Examples.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021
Morshed: Guiding Behavioral Decision-Makers towards Better Security Investment in Interdependent Systems.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
2020
Enabling Real-Time Indoor Tracking of IoT Devices Through Visible Light Retroreflection.
IEEE Trans. Mob. Comput., 2020
Following Passive DNS Traces to Detect Stealthy Malicious Domains Via Graph Inference.
ACM Trans. Priv. Secur., 2020
Time-Window Group-Correlation Support vs. Individual Features: A Detection of Abnormal Users.
CoRR, 2020
BASCPS: How does behavioral decision making impact the security of cyber-physical systems?
CoRR, 2020
IEEE Access, 2020
2019
Online Algorithm for Opportunistic Handling of Received Packets in Vehicular Networks.
IEEE Trans. Intell. Transp. Syst., 2019
DeviceWatch: Identifying Compromised Mobile Devices through Network Traffic Analysis and Graph Inference.
CoRR, 2019
Unmanned Aerial Vehicles (UAVs): A Survey on Civil Applications and Key Research Challenges.
IEEE Access, 2019
An Integrated Methodology for Big Data Classification and Security for Improving Cloud Systems Data Mobility.
IEEE Access, 2019
Proceedings of the ICT Systems Security and Privacy Protection, 2019
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2019
ZK-GanDef: A GAN Based Zero Knowledge Adversarial Training Defense for Neural Networks.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019
Analyzing Subgraph Statistics from Extended Local Views with Decentralized Differential Privacy.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
IEEE Syst. J., 2018
IEEE Syst. J., 2018
IEEE Syst. J., 2018
ACM Comput. Surv., 2018
Unmanned Aerial Vehicles: A Survey on Civil Applications and Key Research Challenges.
CoRR, 2018
RETRO: Retroreflector Based Visible Light Indoor Localization for Real-time Tracking of IoT Devices.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
A Domain is only as Good as its Buddies: Detecting Stealthy Malicious Domains via Graph Inference.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018
2017
Secur. Commun. Networks, 2017
IEEE Internet Things J., 2017
A Minorization-Maximization Algorithm for Maximizing the Secrecy Rate of the MIMOME Wiretap Channel.
IEEE Commun. Lett., 2017
Killing Two Birds with One Stone: Malicious Domain Detection with High Accuracy and Coverage.
CoRR, 2017
IEEE Commun. Surv. Tutorials, 2017
Systematization of Knowledge (SoK): A Systematic Review of Software-Based Web Phishing Detection.
IEEE Commun. Surv. Tutorials, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Towards efficient operation of internet data center networks: Joint data placement and flow control for cost optimization.
Simul. Model. Pract. Theory, 2016
Joint Link Scheduling and Brightness Control for Greening VLC-Based Indoor Access Networks.
JOCN, 2016
Proceedings of the 37th IEEE Sarnoff Symposium 2016, Newark, NJ, USA, 2016
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
Proceedings of the 2016 IEEE Global Conference on Signal and Information Processing, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System.
IEEE Trans. Serv. Comput., 2015
IEEE Trans. Parallel Distributed Syst., 2015
2014
Comput. Networks, 2014
Dependable wireless sensor networks for reliable and secure humanitarian relief applications.
Ad Hoc Networks, 2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Proceedings of the 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2014
Joint Caching and Routing for Greening Computer Networks with Renewable Energy Sources.
Proceedings of the 2014 International Conference on Future Internet of Things and Cloud, 2014
2013
Low Complexity and Provably Efficient Algorithm for Joint Inter and Intrasession Network Coding in Wireless Networks.
IEEE Trans. Parallel Distributed Syst., 2013
DISA: Detection and isolation of sneaky attackers in locally monitored multi-hop wireless networks.
Secur. Commun. Networks, 2013
Communications in Smart Grid: A Review with Performance, Reliability and Security Consideration.
J. Networks, 2013
J. Comput. Sci., 2013
Towards a client-side QoS monitoring and assessment using Generalized Pareto Distribution in a cloud-based environment.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference Workshops, 2013
Proceedings of the Tenth International Conference on Information Technology: New Generations, 2013
2012
IEEE Trans. Wirel. Commun., 2012
IEEE Trans. Syst. Man Cybern. Part B, 2012
An Adaptive OFDMA-Based MAC Protocol for Underwater Acoustic Wireless Sensor Networks.
Sensors, 2012
Secur. Commun. Networks, 2012
CTAC: Control traffic tunneling attacks' countermeasures in mobile wireless networks.
Comput. Networks, 2012
Proceedings of the 9th Annual IEEE Communications Society Conference on Sensor, 2012
Proceedings of the Thirteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2012
Proceedings of the International Conference on Computing, Networking and Communications, 2012
2011
IEEE Trans. Mob. Comput., 2011
IEEE Trans. Dependable Secur. Comput., 2011
Corrigendum to "A novel composite model approach to improve software quality prediction" [Information and Software Technology 52 (12) (2010) 1298-1311].
Inf. Softw. Technol., 2011
Polynomial Time and Provably Efficient Network Coding Scheme for Lossy Wireless Networks.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011
2010
Inf. Softw. Technol., 2010
UnMask: Utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks.
Ad Hoc Networks, 2010
Proceedings of the Global Communications Conference, 2010
2009
Wirel. Commun. Mob. Comput., 2009
Efficient wireless reprogramming through reduced bandwidth usage and opportunistic sleeping.
Ad Hoc Networks, 2009
Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, 2009
SVNM: Secure verification of neighborhood membership in static multi-hop wireless networks.
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
2008
Ad Hoc Networks, 2008
Proceedings of the 4th International Conference on Testbeds & Research Infrastructures for the DEvelopment of NeTworks & COMmunities (TRIDENTCOM 2008), 2008
MISPAR: mitigating stealthy packet dropping in locally-monitored multi-hop wireless ad hoc networks.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008
MIMI: Mitigating Packet Misrouting in Locally-Monitored Multi-Hop Wireless Ad Hoc Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
2007
LiteWorp: Detection and isolation of the wormhole attack in static multihop wireless networks.
Comput. Networks, 2007
Analysis and evaluation of Secos, a protocol for energy efficient and secure communication in sensor networks.
Ad Hoc Networks, 2007
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007
2005
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005
LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005