Projects
Publications
2025
2024
  • Chang, T.H., Watson, L.T., Leyffer, S., Lux, T.C., & Almohri, H.M. (2024). Remark on Algorithm 1012: Computing Projections with Large Datasets. ACM Transactions on Mathematical Software, 50(2). doi:10.1145/3656581 menu_book
2023
  • Almohri, H.M., & Watson, L.T. (2023). Model-Agnostic Federated Learning for Privacy-Preserving Systems. 2023 IEEE Secure Development Conference (SecDev), 99–105. doi:10.1109/SecDev56634.2023.00024 record_voice_over
2022
  • Elish, K.O., Elish, M.O., & Almohri, H.M. (2022). Lightweight, Effective Detection and Characterization of Mobile Malware Families. IEEE Transactions on Computers, 71(11), 2982–2995. doi:10.1109/TC.2022.3143439 menu_book
  • Almohri, H.M., Watson, L., Evans, D., & Billups, S.C. (2022). Dynamic System Diversification for Securing Cloud-based IoT Subnetworks. ACM Transactions on Autonomous and Adaptive Systems (TAAS), 17(1–2). doi:10.1145/3547350 menu_book
2021
  • Almohri, H.M., Watson, L.T., Alemzadeh, H., & AlMutawa, M. (2021). On Parallel Real-Time Security Improvement Using Mixed-Integer Programming. IEEE Access, 9, 58824–58837. doi:10.1109/ACCESS.2021.3073089 menu_book
2020
  • Almohri, H.M., AlMutawa, M., Alawadh, M., & Elish, K.O. (2020). A Client Bootstrapping Protocol for DoS Attack Mitigation on Entry Point Services in the Cloud. Secur. Commun. Networks, 2020, 8873258:1-8873258:12. menu_book
  • Almohri, H.M., Watson, L.T., & Evans, D.E. (2020a). An Attack-Resilient Architecture for the Internet of Things. IEEE Transactions on Information Forensics and Security, 15, 3940–3954. doi:10.1109/TIFS.2020.2994777 menu_book
  • Almohri, H.M., Watson, L.T., & Evans, D. (2020b). Predictability of IP Address Allocations for Cloud Computing Platforms. IEEE Transactions on Information Forensics and Security, 15, 500–511. doi:10.1109/TIFS.2019.2924555 menu_book
2019
  • Blanc, W., Hashem, L.G., Elish, K.O., & Almohri, H.M. (2019). Identifying Android Malware Families Using Android-Oriented Metrics. 2019 IEEE International Conference on Big Data (Big Data), 4708-4713. record_voice_over
  • Vinatzer BA, Heath LS, Almohri HMJ, Stulberg MJ, Lowe C and Li S (2019) Cyberbiosecurity Challenges of Pathogen Genome Databases. Front. Bioeng. Biotechnol. 7:106. doi: 10.3389/fbioe.2019.00106 menu_book
2018
  • Almohri, H.M., Watson, L.T., & Evans, D. (2018). Misery Digraphs: Delaying Intrusion Attacks in Obscure Clouds. IEEE Transactions on Information Forensics and Security, 13(6), 1361–1375. doi:10.1109/TIFS.2017.2779436 menu_book
  • Fidelius Charm: Isolating Unsafe Rust Code. Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 248–255. Presented at the Tempe, AZ, USA. record_voice_over
2017
  • Almohri, H.M., Cheng, L., Yao, D.D., & Alemzadeh, H. (2017). On Threat Modeling and Mitigation of Medical Cyber-Physical Systems. 2017 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE), 114–119. doi:10.1109/CHASE.2017.69 campaign
  • Almohri, H.M., & Almohri, S.A. (2017). Security Evaluation by Arrogance: Saving Time and Money. 2017 IEEE/ACM 1st International Workshop on Software Engineering for Startups (SoftStart), 12–16. doi:10.1109/SoftStart.2017.1 campaign
2016
  • Almohri, H. M. J., Watson, L. T., Yao, D., & Ou, X. (2016). Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming. IEEE Transactions on Dependable and Secure Computing, 13(4), 474–487. doi:10.1109/TDSC.2015.2411264. menu_book
2014
  • Almohri, H. M. J., Yao, D. (daphne), & Kafura, D. (2014a). DroidBarrier: know what is executing on your android. Proceedings of the 4th ACM Conference on Data and Application Security and Privacy, 257–264. Presented at the San Antonio, Texas, USA. doi:10.1145/2557547.2557571 record_voice_over
  • Almohri, H.M., Yao, D.D., & Kafura, D.G. (2014b). Process Authentication for High System Assurance. IEEE Transactions on Dependable and Secure Computing, 11(2), 168–180. doi:10.1109/TDSC.2013.29 menu_book
2013
2012
  • Almohri, H. M. J., Yao, D. (daphne), & Kafura, D. (2012). Identifying native applications with high assurance. Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 275–282. Presented at the San Antonio, Texas, USA. doi:10.1145/2133601.2133635 record_voice_over
2010
  • Almohri, H. M. J., & Balci, O. (2010). A simulation-based software design framework for network-centric and parallel systems. Programming Support Innovations for Emerging Distributed Applications. Presented at the Reno, Nevada. doi:10.1145/1940747.1940752 campaign
2008
  • Almohri, H.M. (2008). Security risk prioritization for logical attack graphs. school