Publications

2015
  • I.M. Khalil, A. Khreishah, and M. Azeem, "Cloud Computing Security: A Survey." Computers (an MDPI Journal), Vol. 3, 2014, pp. 1-35. Available online: http://10.3390/computers3010001.
  • Khreishah, I. Khalil, and J. Wu, "Universal Network Coding-based Opportunistic Routing for Unicast." IEEE Transactions on Parallel and Distributed Systems, Vol. 24, 2014, pp. 2014 - 2015
  • Gharaibeh, A. Khreishah, I. Khalil, and J. Wu, "Asymptotically-Optimal Incentive-Based En-Route Caching Scheme." In Proceedings of 11th IEEE International Conference on Mobile Ad hoc and Sensor System (MASS’14), Philadelphia, Pennsylvania, USA, October 27-30, 2014, pp. 318-326.
  • Khreishah, I. Khalil, A. Gharaibeh, H. B. Salameh, and R. Alasem, "Joint Caching and Routing for Greening Computer Networks with Renewable Energy Sources." In Proceedings of International Conference on Future Internet of Things and Cloud (FiCloud), Barcelona, Spain, August 27-29, 2014, pp. 101-106.
  • M. T. Khan, D. Serpanos, and H. Shrobe, “On the Behavioral Formalization of the Cognitive Middleware AWDRAT.” In Proceedings of 26th Nordic Workshop on Programming Theory (NWPT'14), Halmstad, Sweden, October 2014, pp. 37-39.
  • A. Mohaisen and O. Alrawi, “AMAL: High-fidelity, Behavior-based Automated Malware Analysis and Classification.” In Proceedings of the 15th International Workshop on Information Security Applications (WISA’2014), Korea, August 25-27, 2014.
  • C. Fletcher, L. Ren, A. Kwon, M. van Dijk, E. Stefanov, D. Serpanos and S. Devadas, “Tiny ORAM: A Low-Latency, Low-Area Hardware ORAM Controller.” In Proceedings of the 23rd IEEE International Symposium on Field-Programmable Custom Computing Machines, Vancouver, Canada, May 3-5, 2015.
  • Z. Jorgensen, T. Yu, and G. Cormode, "Conservative or Liberal? Personalized Differential Privacy." In Proceedings of IEEE Conference on Data Engineering (ICDE), Seoul, Korea, April 13-17, 2015.
  • A. Khreishah, J. Chakareski, A. Gharaibeh, I. Khalil, and Y. Jararweh, "Joint Data Placement and Flow Control for Cost-Efficient Data Center Networks." In Proceedings of 6th International Conference on Information and Communication Systems (ICICS‘15), Amman, Jordan, April 7-9, 2015.
  • A. Mohaisen and O. Alrawi, "AMAL: High-Fidelity, Behavior-Based Automated Malware Analysis and Classification." Information Security Applications, K.-H. Rhee and J. H. Yi (Eds.), Springer International Publishing, 2015, pp. 107-121.
  • M. T. Khan, D. Serpanos, and H. Shrobe, “On the Formal Semantics of the Cognitive Middleware AWDRAT.” MIT CSAIL Technical Report, Report No. MIT-CSAIL-TR-2015-007, March 3, 2015, pp. 1-62. Available online: http://hdl.handle.net/1721.1/95774.
  • C. S. Gates, J. Chen, Z. Jorgensen, N. Li, R. W. Proctor, and T. Yu, "Understanding and Communicating Risk for Mobile Applications." In Proceedings of ACM Conference on Data and Application Security and Privacy (CODASPY’15), San Antonio, TX, USA, March 2-4, 2015, pp. 49-60.
  • P-A Vervier, O. Thonnard, M. Dacier, “Mind your blocks: on the stealthiness of malicious BGP hijacks.” In Proceedings of Network and Distributed System Security Symposium (NDSS’15), ISBN 1-891562-38-X, San Diego, California, February 8-11, 2015. Available online: http:/dx.doi.org/10.14722/ndss.2015.23035.
  • I. Hababeh, I. Khalil, and A. Khreishah, "Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System." IEEE Transactions on Services Computing, 8(1), Jan.-Feb. 2015, pp.47-64. Available online: http://10.1109/TSC.2014.2300499.
2014
  • F. Kargl, R. W. van der Heijden, H. König, A. Valdes, M. Dacier, “Insights on the Security and Dependability of Industrial Control Systems.” IEEE Security & Privacy,  12(6), 2014, pp. 75-78
  • A. Mohaisen, A. G. West, A. Mankin, and O. Alrawi, "Chatter: Classifying malware families using system event ordering." In Proceedings of IEEE Conference on Communications and Network Security (CNS’14), San Francisco, California, USA, October 29-31, 2014, pp. 283-291.
  • A. Mohaisen and O. Alrawi, "AV-Meter: An Evaluation of Antivirus Scans and Labels." Detection of Intrusions and Malware, and Vulnerability Assessment, vol. 8550, S. Dietrich (Ed.), Springer International Publishing, 2014, pp. 112-131.
  • A. Mohaisen, O. Alrawi, M. Larson, and D. McPherson, "Towards a Methodical Evaluation of Antivirus Scans and Labels." Information Security Applications, Y. Kim, H. Lee, and A. Perrig, (Eds.), Springer International Publishing, 2014, pp. 231-241.
  • I. Khalil, Z. Dou, and A. Khreishah, "TPM-based Authentication Mechanism for Apache Hadoop." In Proceedings of 10th International Conference on Security and Privacy in Communication Networks, (SecureComm 2014), Beijing, China, September 2014, pp. 24–26.
  • I. Khalil, A. Khreishah, and M. Azeem, "Consolidated Identity Management System for secure mobile cloud computing." Computer Networks, Vol. 65, 2014, pp. 99-110. Available online: http://10.3390/computers3010001.
  • A. Papalambrou, K. Stefanidis, J. Gialelis, and D. Serpanos, "Detection, traceback and filtering of denial of service attacks in networked embedded systems." In Proceedings of 9th Workshop on Embedded Systems Security, (WESS 2014), New Delhi, India, October 17, 2014.
  • Z. Jorgensen and T. Yu, "A Privacy-Preserving Framework for Personalized, Social Recommendations." In Proceedings of 17th International Conference on Extending Database Technology (EDBT), Athens, Greece, March 24-28, 2014, pp. 571-582.
  • T. Yu, "Data Anonymization: The Challenges from Theory to Practice." In Proceedings of EDBT/ICDT 2014 Joint Conference (EDBT/ICDT 2014), Athens, Greece, March 28, 2014, pp. 415.
  • W. Wei and T. Yu, "Integrity Assurance for Outsourced Databases without DBMS Modification." Data and Applications Security and Privacy XXVIII, Vol. 8566, V. Atluri and G. Pernul, (Eds.), Springer Berlin Heidelberg, 2014, pp. 1-16.
  • E. Choo, T. Yu, M. Chi, and Y. Sun, "Revealing and incorporating implicit communities to improve recommender systems." In Proceedings of 15th ACM conference on Economics and Computation, (EC 2014), Palo Alto, California, USA, June 8-12, 2014, pp. 489-506
  • E. Choo, J. Jiang, and T. Yu, "COMPARS: toward an empirical approach for comparing the resilience of reputation systems." In Proceedings of 4th ACM conference on Data and application security and privacy (CODASPY '14), San Antonio, Texas, USA, March 3-5, 2014, pp. 87-98.
2013
  • A. Mohaisen, O. Alrawi, A. G. West, and A. Mankin, "Babble: Identifying malware by its dialects." In Proceedings of IEEE Conference on Communications and Network Security (CNS), National Harbor, MD, October 14-16, 2013, pp. 407-408.
  • A. Mohaisen and O. Alrawi, "Unveiling Zeus:  automated classification of malware samples." In Proceedings of 22nd International Conference on World Wide Web Companion, Rio de Janeiro, Brazil, May 13-17, 2013, pp 829-932.
  • I. Hababeh, I. Khalil, A. Khreishah, and S. Bataineh, "Performance evaluation of wormhole security approaches for ad-hoc networks." Journal of Computer Science, vol. 9, 2013, available online: http://10.3844/jcssp.2013.1626.1637 pp. 1626-1637
  • I. M. Khalil, A. Khreishah, S. Bouktif, and A. Ahmad, "Security Concerns in Cloud Computing." In Proceedings of 10th International Conference on Information Technology: New Generations (ITNG), Las Vegas, Nevada, USA, April 15-17, 2013, pp. 411-416.
  • A. Khreishah, I. Khalil, and W. Jie, "Low Complexity and Provably Efficient Algorithm for Joint Inter and Intersession Network Coding in Wireless Networks." IEEE Transactions on Parallel and Distributed Systems, Vol. 24, 2013, pp. 2015-2024.
  • N. L. Farnan, A. J. Lee, P. K. Chrysanthis, and T. Yu, "PAQO: a preference-aware query optimizer for PostgreSQL." In Proceedings of VLDB Endowment, Vol. 6, 2013, pp. 1334-1337.

Research Director

Dr. Marc Dacier

I’m excited to help build what is going to be one of the best cybersecurity research groups in the world.
Read more

Follow Us

  • YouTube
  • Twitter
  • Facebook
  • RSS Feed
  • Linkedin
  • github-web.png
Back to Top

In the Media

algorithm bridge.jpg

Algorithm can create a bridge between Clinton and Trump supporters

20/02/2017

A growing number of people have expressed their concern about high levels of polarization in society. For instance, the World Economic Forum's report on global risks lists the increasing societal ...

Read More

Yahoo Tech.JPG

The hero big data needs? Data Civilizer helps scientists conquer the clutter

29/01/2017

Big data is a big deal. With these huge data sets, analysts can gain unprecedented insight into the hidden patterns of fields like physics, healthcare, and finance. Collecting and analyzing this data...

Read More

MIT Tamer.JPG

Taming data

22/01/2017

The age of big data has seen a host of new techniques for analyzing large data sets. But before any of those techniques can be applied, the target data has to be aggregated, organized, and cleaned up...

Read More

Events

2017

MLDAS 2017

(MLDAS 2017) Machine Learning and Data Analytics Symposium

Download ICS File 13/03/2017  - 14/03/2017 , Qatar National Convention Centre

Machine Learning and Data Analytics Symposium - MLDAS 2017 Building on the success of the three previous events , Boeing and QCRI will hold the Fourth Machine Learning and Data Analytics Symposium (...

Read More

Past Events

ArabWic for web.jpg

Women in Data Science

Download ICS File 03/02/2017 ,

Here's a great chance to learn about the latest data science-related research in multiple domains, as part of a global project. Qatar's WiDS event will be held here at the HBKU Research Complex on ...

Read More

2016

QCRI IBM New.JPG

QCRI - IBM Data Science Connect 2016

Download ICS File 16/11/2016 ,

QCRI–IBM Data Science Connect 2016  Doha, Qatar 12.30pm –5:30pm, Wednesday, November 16 HBKU Research Complex, Ground Level Multi-Purpose Room Google Map link to location https://goo.gl/maps/...

Read More

News

MLDAS 2016.JPG

Boeing Partners with QCRI for fourth annual Machine Learning and Data Analytics Symposium (MLDAS)

09/02/2017

The Boeing Company has announced that it will once again partner with the Qatar Computing Research Institute (QCRI), part of Hamad bin Khalifa University, to host the fourth annual Machine Learning ...

Read More

Jalees10.jpg

QCRI’s Jalees Reader app launched in more languages

06/12/2016

French and German interfaces added for free app which allows users to upload books and read them offline.

Read More

IBM Watson robot (ex IBM Watson).JPG

IBM Watson scientist visits Qatar to present platform that 'thinks like a human'

16/11/2016

IBM Watson’s chief data scientist Romeo Kienzler has visited the Qatar Computing Research Institute to conduct a workshop on Watson, a question-answering platform that can “think like a human”. Mr ...

Read More