Khalil El-Khatib
Orcid: 0000-0002-5960-6942
According to our database1,
Khalil El-Khatib
authored at least 107 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Trans. Netw. Serv. Manag., February, 2024
A hybrid artificial intelligence framework for enhancing digital forensic investigations of infotainment systems.
Forensic Sci. Int. Digit. Investig., 2024
Proceedings of the 20th International Conference on the Design of Reliable Communication Networks, 2024
2023
ECKN: An Integrated Approach for Position Estimation, Packet Routing, and Sleep Scheduling in Wireless Sensor Networks.
Sensors, July, 2023
Guest Editorial: Special Section on Machine Learning and Artificial Intelligence for Managing Networks, Systems, and Services - Part II.
IEEE Trans. Netw. Serv. Manag., June, 2023
Securing the Electric Vehicle Charging Infrastructure: An In-Depth Analysis of Vulnerabilities and Countermeasures.
Proceedings of the Int'l ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications, 2023
Trust-based Knowledge Sharing Among Federated Learning Servers in Vehicular Edge Computing.
Proceedings of the Int'l ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications, 2023
Proceedings of the 19th International Conference on Network and Service Management, 2023
2022
Guest Editorial: Special Issue on Machine Learning and Artificial Intelligence for Managing Networks, Systems, and Services - Part I.
IEEE Trans. Netw. Serv. Manag., December, 2022
Comput. Electr. Eng., 2022
2021
IEEE Access, 2021
Proceedings of the IEEE Global Communications Conference, 2021
2020
J. Database Manag., 2020
Functionality-based mobile application recommendation system with security and privacy awareness.
Comput. Secur., 2020
Proceedings of the SIN 2020: 13th International Conference on Security of Information and Networks, 2020
Proceedings of the Q2SWinet '20: Proceedings of the 16th ACM Symposium on QoS and Security for Wireless and Mobile Networks, 2020
Proceedings of the DIVANet '20: Proceedings of the 10th ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications, 2020
Proceedings of the 46th Graphics Interface Conference 2020, 2020
Proceedings of the IEEE Canadian Conference on Electrical and Computer Engineering, 2020
2019
Cooperative Localization Improvement Using Distance Information in Vehicular Ad Hoc Networks.
Sensors, 2019
Sensors, 2019
Pervasive Mob. Comput., 2019
Int. J. Secur. Networks, 2019
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019
Proceedings of the 16th IEEE Symposium on Visualization for Cyber Security, VizSec 2019, 2019
Proceedings of the International Conference on Smart Applications, 2019
A Distance-based Data Fusion Technique for Minimizing GPS Positioning Error in Vehicular Ad Hoc Networks.
Proceedings of the 15th ACM International Symposium on QoS and Security for Wireless and Mobile Networks, 2019
Proceedings of the 9th ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications, 2019
2018
Proceedings of the 11th International Conference on Security of Information and Networks, 2018
Proceedings of the International Conference On Cyber Situational Awareness, 2018
2017
Veh. Commun., 2017
On the Possibility of Insider Threat Prevention Using Intent-Based Access Control (IBAC).
IEEE Syst. J., 2017
A Comparative Analysis of the Impact of Features on Human Activity Recognition with Smartphone Sensors.
Proceedings of the 23rd Brazillian Symposium on Multimedia and the Web, 2017
Proceedings of the 6th ACM Symposium on Development and Analysis of Intelligent VehicularNetworks and Applications, 2017
Proceedings of the 13th ACM Symposium on QoS and Security for Wireless and Mobile Networks, 2017
A Privacy Enhanced Facial Recognition Access Control System Using Biometric Encryption.
Proceedings of the 13th International Conference on Distributed Computing in Sensor Systems, 2017
2016
Proceedings of the 9th International Conference on Security of Information and Networks, 2016
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Proceedings of the 6th ACM Symposium on Development and Analysis of Intelligent Vehicular Networks and Applications, 2016
Paving the way for Intelligent Transport Systems (ITS): Privacy Implications of Vehicle Infotainment and Telematics Systems.
Proceedings of the 6th ACM Symposium on Development and Analysis of Intelligent Vehicular Networks and Applications, 2016
Proceedings of the 2016 IEEE International Symposium on Medical Measurements and Applications, 2016
2015
On the use of homomorphic encryption to secure cloud computing, services, and routing protocols.
CoRR, 2015
Privacy and security concerns for health data collected using off-the-shelf health monitoring devices.
Proceedings of the 11th IEEE International Conference on Wireless and Mobile Computing, 2015
Proceedings of the 5th ACM Symposium on Development and Analysis of Intelligent Vehicular Networks and Applications, 2015
Design and Implementation of a Software-Defined Integrated Wired-Wireless Network Testbed.
Proceedings of the 13th ACM International Symposium on Mobility Management and Wireless Access, 2015
Proceedings of the 18th International Conference on Intelligence in Next Generation Networks, 2015
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015
2014
On the Possibility of Insider Threat Detection Using Physiological Signal Monitoring.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014
Proceedings of the 2014 IEEE World Congress on Services, 2014
A prediction based clustering algorithm for target tracking in vehicular ad-hoc networks.
Proceedings of the fourth ACM international symposium on Development and analysis of intelligent vehicular networks and applications, 2014
2013
A Tweet of the Mind: Automated Emotion Detection for Social Media Using Brain Wave Pattern Analysis.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013
Proceedings of the 6th International Conference on Security of Information and Networks, 2013
Encouraging second thoughts: Obstructive user interfaces for raising security awareness.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013
Proceedings of the third ACM international symposium on Design and analysis of intelligent vehicular networks and applications, 2013
Proceedings of the third ACM international symposium on Design and analysis of intelligent vehicular networks and applications, 2013
Securing modbus transactions using hash-based message authentication codes and stream transmission control protocol.
Proceedings of the Third International Conference on Communications and Information Technology, 2013
Proceedings of the Third International Conference on Communications and Information Technology, 2013
Proceedings of the Advanced Technologies, Embedded and Multimedia for Human-centric Computing, 2013
2012
Proceedings of the second ACM international symposium on Design and analysis of intelligent vehicular networks and applications, 2012
Proceedings of the International Conference on Communications and Information Technology, 2012
Proceedings of the 25th IEEE Canadian Conference on Electrical and Computer Engineering, 2012
2011
Proceedings of the Security and Trust Management - 7th International Workshop, 2011
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011
Proceedings of the Modern Approaches in Applied Intelligence, 2011
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011
Proceedings of the Center for Advanced Studies on Collaborative Research, 2011
2010
Impact of Feature Reduction on the Efficiency of Wireless Intrusion Detection Systems.
IEEE Trans. Parallel Distributed Syst., 2010
Corrigendum to "Private key agreement and secure communication for heterogeneous sensor networks" [J. Parallel Distrib. Comput 70 (2010) 858-870].
J. Parallel Distributed Comput., 2010
J. Parallel Distributed Comput., 2010
Pair-wise Cryptographic Models for Secure Data Exchange in P2P Database Management Systems.
IACR Cryptol. ePrint Arch., 2010
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Proceedings of the 2010 conference of the Centre for Advanced Studies on Collaborative Research, 2010
2009
Secure Anonymous Communication for Wireless Sensor Networks Based on Pairing over Elliptic Curves.
J. Interconnect. Networks, 2009
Analysis of Chinese Remainder Theorem Based Group Key Management Protocols.
Proceedings of the 2009 International Conference on Security & Management, 2009
Proceedings of the 2009 conference of the Centre for Advanced Studies on Collaborative Research, 2009
2008
Proceedings of the 9th IEEE International Symposium on a World of Wireless, 2008
Proceedings of the NTMS 2008, 2008
Proceedings of the Q2SWinet'08, 2008
Proceedings of the 2008 Conference on Future Play: Research, Play, Share, 2008
2007
A performance evaluation of distributed dynamic channel allocation protocols for mobile networks.
Wirel. Commun. Mob. Comput., 2007
Corrigendum to "Trust-based security for wireless ad hoc and sensor networks" [Computer Communications 30 (2007) 2413-2427].
Comput. Commun., 2007
Proceedings of the 23rd International Conference on Data Engineering Workshops, 2007
2006
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks.
Perform. Evaluation, 2006
Proceedings of the WMuNeP'06, 2006
2005
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks.
Comput. Commun., 2005
2004
Wirel. Commun. Mob. Comput., 2004
Proceedings of the 1st International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks (QSHINE 2004), 2004
Proceedings of the 1st International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks (QSHINE 2004), 2004
Proceedings of the 1st ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, 2004
A performance comparison of dynamic channel and ressource allocation protocols for mobile cellular networks.
Proceedings of the Second International Workshop on Mobility Management & Wireless Access Protocols, 2004
SDAR: A Secure Distributed Anonymous Routing Protocol for Wireless and Mobile Ad Hoc Networks.
Proceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), 2004
2003
Proceedings of the Mobile Agents for Telecommunication Applications, 2003
Proceedings of the 32nd International Conference on Parallel Processing Workshops (ICPP 2003 Workshops), 2003
Proceedings of the Euro-Par 2003. Parallel Processing, 2003
2001
Selecting the QoS Parameters for Multicast Applications Based on User Profile and Device Capability.
Proceedings of the Interactive Distributed Multimedia Systems, 2001
1999
Proceedings of the 32nd Annual Hawaii International Conference on System Sciences (HICSS-32), 1999