Unmanned aerial vehicles (UAVs): A survey on civil applications and key research challenges H Shakhatreh, AH Sawalmeh, A Al-Fuqaha, Z Dou, E Almaita, I Khalil, ... Ieee Access 7, 48572-48634, 2019 | 2029 | 2019 |
Smart cities: A survey on data management, security, and enabling technologies A Gharaibeh, MA Salahuddin, SJ Hussini, A Khreishah, I Khalil, M Guizani, ... IEEE Communications Surveys & Tutorials 19 (4), 2456-2501, 2017 | 600 | 2017 |
LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks I Khalil, S Bagchi, NB Shroff 2005 International Conference on Dependable Systems and Networks (DSN'05 …, 2005 | 439 | 2005 |
Cloud computing security: A survey IM Khalil, A Khreishah, M Azeem Computers 3 (1), 1-35, 2014 | 378 | 2014 |
Heavy hitter estimation over set-valued data with local differential privacy Z Qin, Y Yang, T Yu, I Khalil, X Xiao, K Ren Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 367 | 2016 |
Generating Synthetic Decentralized Social Graphs with Local Differential Privac Z Qin, T Yu, Y Yang, I Khalil, X Xiao, K Ren CCS 2017, 425-438, 2017 | 227 | 2017 |
MOBIWORP: Mitigation of the wormhole attack in mobile multihop wireless networks I Khalil, S Bagchi, NB Shroff Ad Hoc Networks 6 (3), 344-362, 2008 | 212 | 2008 |
A Survey on Malicious Domains Detection through DNS Data Analysis Y Zhauniarovich, I Khalil, T Yu, M Dacier ACM Comput. Surv 51 (4), 1-67, 2018 | 203 | 2018 |
Prediction of user's web-browsing behavior: Application of markov model MA Awad, I Khalil IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 42 …, 2012 | 152 | 2012 |
Stream: Low overhead wireless reprogramming for sensor networks RK Panta, I Khalil, S Bagchi IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007 | 148 | 2007 |
Efficient 3D placement of a UAV using particle swarm optimization H Shakhatreh, A Khreishah, A Alsarhan, I Khalil, A Sawalmeh, ... 2017 8th International Conference on Information and Communication Systems …, 2017 | 130 | 2017 |
Protocol for secure and energy-efficient reprogramming of wireless multi-hop sensor networks S Bagchi, NB Shroff, IMI Khalil, RK Panta, MD Krasniewski, JV Krogmeier US Patent 8,107,397, 2012 | 128 | 2012 |
Liteworp: Detection and isolation of the wormhole attack in static multihop wireless networks I Khalil, S Bagchi, NB Shroff Computer networks 51 (13), 3750-3772, 2007 | 125 | 2007 |
Systematization of knowledge (sok): A systematic review of software-based web phishing detection Z Dou, I Khalil, A Khreishah, A Al-Fuqaha, M Guizani IEEE Communications Surveys & Tutorials 19 (4), 2797-2819, 2017 | 118 | 2017 |
Discovering Malicious Domains through Passive DNS Data Graph Analysis I Khalil, T Yu, B Guan ACM AsiaCCS, 2016 | 116 | 2016 |
Ala Al-Fuqaha, Zuochao Dou, Eyad Almaita, Issa Khalil, Noor Shamsiah Othman, Abdallah Khreishah, and Mohsen Guizani. Unmanned aerial vehicles (uavs): A survey on civil … H Shakhatreh, HS Ahmad Ieee Access 7 (48572-48634), 1-2, 2019 | 105 | 2019 |
WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks MY Su Computers & Security 29 (2), 208-224, 2010 | 103 | 2010 |
ECG biometric with abnormal cardiac conditions in remote monitoring system KA Sidek, I Khalil, HF Jelinek IEEE Transactions on systems, man, and cybernetics: systems 44 (11), 1498-1509, 2014 | 96 | 2014 |
DICAS: detection, diagnosis and isolation of control attacks in sensor networks I Khalil, S Bagchi, C Nina-Rotaru First International Conference on Security and Privacy for Emerging Areas in …, 2005 | 96 | 2005 |
Analyzing subgraph statistics from extended local views with decentralized differential privacy H Sun, X Xiao, I Khalil, Y Yang, Z Qin, H Wang, T Yu Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019 | 88 | 2019 |