Issa M. Khalil

Orcid: 0000-0002-7660-9512

According to our database1, Issa M. Khalil authored at least 108 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
An Adaptive Black-Box Defense Against Trojan Attacks (TrojDef).
IEEE Trans. Neural Networks Learn. Syst., April, 2024

Explainable AI-based Intrusion Detection System for Industry 5.0: An Overview of the Literature, associated Challenges, the existing Solutions, and Potential Research Directions.
CoRR, 2024

Detecting and Mitigating Sampling Bias in Cybersecurity with Unlabeled Data.
Proceedings of the 33rd USENIX Security Symposium, 2024

Multi-Instance Adversarial Attack on GNN-Based Malicious Domain Detection.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Demo: SGCode: A Flexible Prompt-Optimizing System for Secure Generation of Code.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

PromSec: Prompt Optimization for Secure Generation of Functional Source Code with Large Language Models (LLMs).
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs.
Proc. ACM Meas. Anal. Comput. Syst., December, 2023

DeviceWatch: A Data-Driven Network Analysis Approach to Identifying Compromised Mobile Devices with Graph-Inference.
ACM Trans. Priv. Secur., 2023

FairDP: Certified Fairness with Differential Privacy.
CoRR, 2023

2022
Ten Years after ImageNet: A 360° Perspective on AI.
CoRR, 2022

Exploration of Enterprise Server Data to Assess Ease of Modeling System Behavior.
CoRR, 2022

A Large Scale Study and Classification of VirusTotal Reports on Phishing and Malware URLs.
CoRR, 2022

Model Transferring Attacks to Backdoor HyperNetwork in Personalized Federated Learning.
CoRR, 2022

SIRAJ: A Unified Framework for Aggregation of Malicious Entity Detectors.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

TASHAROK: Using Mechanism Design for Enhancing Security Resource Allocation in Interdependent Systems.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Heterogeneous Randomized Response for Differential Privacy in Graph Neural Networks.
Proceedings of the IEEE International Conference on Big Data, 2022

2021
Compromised or Attacker-Owned: A Large Scale Classification and Study of Hosting Domains of Malicious URLs.
Proceedings of the 30th USENIX Security Symposium, 2021

An Adaptive Black-box Defense against Trojan Attacks on Text Data.
Proceedings of the Eighth International Conference on Social Network Analysis, 2021

CADUE: Content-Agnostic Detection of Unwanted Emails for Enterprise Security.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

Time-Window Based Group-Behavior Supported Method for Accurate Detection of Anomalous Users.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

Identifying and Characterizing COVID-19 Themed Malicious Domain Campaigns.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

Using Single-Step Adversarial Training to Defend Iterative Adversarial Examples.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

A Synergetic Attack against Neural Network Classifiers combining Backdoor and Adversarial Examples.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

Morshed: Guiding Behavioral Decision-Makers towards Better Security Investment in Interdependent Systems.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
Enabling Real-Time Indoor Tracking of IoT Devices Through Visible Light Retroreflection.
IEEE Trans. Mob. Comput., 2020

Following Passive DNS Traces to Detect Stealthy Malicious Domains Via Graph Inference.
ACM Trans. Priv. Secur., 2020

Time-Window Group-Correlation Support vs. Individual Features: A Detection of Abnormal Users.
CoRR, 2020

ManiGen: A Manifold Aided Black-box Generator of Adversarial Examples.
CoRR, 2020

BASCPS: How does behavioral decision making impact the security of cyber-physical systems?
CoRR, 2020

ManiGen: A Manifold Aided Black-Box Generator of Adversarial Examples.
IEEE Access, 2020

2019
Online Algorithm for Opportunistic Handling of Received Packets in Vehicular Networks.
IEEE Trans. Intell. Transp. Syst., 2019

DeviceWatch: Identifying Compromised Mobile Devices through Network Traffic Analysis and Graph Inference.
CoRR, 2019

Unmanned Aerial Vehicles (UAVs): A Survey on Civil Applications and Key Research Challenges.
IEEE Access, 2019

An Integrated Methodology for Big Data Classification and Security for Improving Cloud Systems Data Mobility.
IEEE Access, 2019

GanDef: A GAN Based Adversarial Training Defense for Neural Network Classifier.
Proceedings of the ICT Systems Security and Privacy Protection, 2019

Using Intuition from Empirical Properties to Simplify Adversarial Training Defense.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2019

ZK-GanDef: A GAN Based Zero Knowledge Adversarial Training Defense for Neural Networks.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

Analyzing Subgraph Statistics from Extended Local Views with Decentralized Differential Privacy.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Indoor Mobile Coverage Problem Using UAVs.
IEEE Syst. J., 2018

Renewable Energy-Aware Joint Caching and Routing for Green Communication Networks.
IEEE Syst. J., 2018

Robust Insider Attacks Countermeasure for Hadoop: Design and Implementation.
IEEE Syst. J., 2018

A Novel and Robust Authentication Factor Based on Network Communications Latency.
IEEE Syst. J., 2018

A Survey on Malicious Domains Detection through DNS Data Analysis.
ACM Comput. Surv., 2018

Unmanned Aerial Vehicles: A Survey on Civil Applications and Key Research Challenges.
CoRR, 2018

RETRO: Retroreflector Based Visible Light Indoor Localization for Real-time Tracking of IoT Devices.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

A Domain is only as Good as its Buddies: Detecting Stealthy Malicious Domains via Graph Inference.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

2017
CLAS: A Novel Communications Latency Based Authentication Scheme.
Secur. Commun. Networks, 2017

Online Auction of Cloud Resources in Support of the Internet of Things.
IEEE Internet Things J., 2017

A Minorization-Maximization Algorithm for Maximizing the Secrecy Rate of the MIMOME Wiretap Channel.
IEEE Commun. Lett., 2017

Killing Two Birds with One Stone: Malicious Domain Detection with High Accuracy and Coverage.
CoRR, 2017

Efficient 3D Placement of a UAV Using Particle Swarm Optimization.
CoRR, 2017

Smart Cities: A Survey on Data Management, Security, and Enabling Technologies.
IEEE Commun. Surv. Tutorials, 2017

Systematization of Knowledge (SoK): A Systematic Review of Software-Based Web Phishing Detection.
IEEE Commun. Surv. Tutorials, 2017

Generating Synthetic Decentralized Social Graphs with Local Differential Privacy.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Distributed Online En-Route Caching.
IEEE Trans. Parallel Distributed Syst., 2016

Towards efficient operation of internet data center networks: Joint data placement and flow control for cost optimization.
Simul. Model. Pract. Theory, 2016

Joint Link Scheduling and Brightness Control for Greening VLC-Based Indoor Access Networks.
JOCN, 2016

On the continuous coverage problem for a swarm of UAVs.
Proceedings of the 37th IEEE Sarnoff Symposium 2016, Newark, NJ, USA, 2016

An O(1)-competitive online caching algorithm for content centric networking.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

A minorization-maximization algorithm for an-based mimome secrecy rate maximization.
Proceedings of the 2016 IEEE Global Conference on Signal and Information Processing, 2016

Heavy Hitter Estimation over Set-Valued Data with Local Differential Privacy.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Discovering Malicious Domains through Passive DNS Data Graph Analysis.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Your Credentials Are Compromised, Do Not Panic: You Can Be Well Protected.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System.
IEEE Trans. Serv. Comput., 2015

Universal Network Coding-Based Opportunistic Routing for Unicast.
IEEE Trans. Parallel Distributed Syst., 2015

2014
Cloud Computing Security: A Survey.
Comput., 2014

Consolidated Identity Management System for secure mobile cloud computing.
Comput. Networks, 2014

Dependable wireless sensor networks for reliable and secure humanitarian relief applications.
Ad Hoc Networks, 2014

TPM-Based Authentication Mechanism for Apache Hadoop.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Asymptotically-Optimal Incentive-Based En-Route Caching Scheme.
Proceedings of the 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2014

Joint Caching and Routing for Greening Computer Networks with Renewable Energy Sources.
Proceedings of the 2014 International Conference on Future Internet of Things and Cloud, 2014

2013
Low Complexity and Provably Efficient Algorithm for Joint Inter and Intrasession Network Coding in Wireless Networks.
IEEE Trans. Parallel Distributed Syst., 2013

DISA: Detection and isolation of sneaky attackers in locally monitored multi-hop wireless networks.
Secur. Commun. Networks, 2013

Communications in Smart Grid: A Review with Performance, Reliability and Security Consideration.
J. Networks, 2013

Performance Evaluation of Wormhole Security Approaches for Ad-Hoc Networks.
J. Comput. Sci., 2013

Towards a client-side QoS monitoring and assessment using Generalized Pareto Distribution in a cloud-based environment.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference Workshops, 2013

Security Concerns in Cloud Computing.
Proceedings of the Tenth International Conference on Information Technology: New Generations, 2013

2012
Flow-based XOR Network Coding for Lossy Wireless Networks.
IEEE Trans. Wirel. Commun., 2012

Prediction of User's Web-Browsing Behavior: Application of Markov Model.
IEEE Trans. Syst. Man Cybern. Part B, 2012

An Adaptive OFDMA-Based MAC Protocol for Underwater Acoustic Wireless Sensor Networks.
Sensors, 2012

MSN: mutual secure neighbor verification in multi-hop wireless networks.
Secur. Commun. Networks, 2012

CTAC: Control traffic tunneling attacks' countermeasures in mobile wireless networks.
Comput. Networks, 2012

Universal opportunistic routing scheme using network coding.
Proceedings of the 9th Annual IEEE Communications Society Conference on Sensor, 2012

Distributed network coding-based opportunistic routing for multicast.
Proceedings of the Thirteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2012

On the analysis of identity delegation attacks.
Proceedings of the International Conference on Computing, Networking and Communications, 2012

2011
Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure.
IEEE Trans. Mob. Comput., 2011

ELMO: Energy Aware Local Monitoring in Sensor Networks.
IEEE Trans. Dependable Secur. Comput., 2011

Corrigendum to "A novel composite model approach to improve software quality prediction" [Information and Software Technology 52 (12) (2010) 1298-1311].
Inf. Softw. Technol., 2011

Polynomial Time and Provably Efficient Network Coding Scheme for Lossy Wireless Networks.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

2010
A novel composite model approach to improve software quality prediction.
Inf. Softw. Technol., 2010

UnMask: Utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks.
Ad Hoc Networks, 2010

MCC: Mitigating Colluding Collision Attacks in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2010

2009
Uplink and downlink scheduling for point to multipoint WiMAX Networks.
Wirel. Commun. Mob. Comput., 2009

Efficient wireless reprogramming through reduced bandwidth usage and opportunistic sleeping.
Ad Hoc Networks, 2009

An OFDMA-based MAC protocol for under water acoustic wireless sensor networks.
Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, 2009

SVNM: Secure verification of neighborhood membership in static multi-hop wireless networks.
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009

Non-cooperative uplink power control game for CDMA wireless communications systems.
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009

MPC: Mitigating Stealthy Power Control Attacks in Wireless Ad Hoc Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
MobiWorp: Mitigation of the wormhole attack in mobile multihop wireless networks.
Ad Hoc Networks, 2008

Single versus multi-hop wireless reprogramming in sensor networks.
Proceedings of the 4th International Conference on Testbeds & Research Infrastructures for the DEvelopment of NeTworks & COMmunities (TRIDENTCOM 2008), 2008

MISPAR: mitigating stealthy packet dropping in locally-monitored multi-hop wireless ad hoc networks.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

MIMI: Mitigating Packet Misrouting in Locally-Monitored Multi-Hop Wireless Ad Hoc Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
LiteWorp: Detection and isolation of the wormhole attack in static multihop wireless networks.
Comput. Networks, 2007

Analysis and evaluation of Secos, a protocol for energy efficient and secure communication in sensor networks.
Ad Hoc Networks, 2007

Stream: Low Overhead Wireless Reprogramming for Sensor Networks.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

SLAM: Sleep-Wake Aware Local Monitoring in Sensor Networks.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007

2005
DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005


  Loading...