Journal Publications
  1. Almohri, H. M. J., and Layne T. Watson. “FedQP: Large-Scale Private and Flexible Federated Query Processing.” IEEE Access, accepted, 2025.
  2. Chang, Tyler H., Layne T. Watson, Sven Leyffer, Thomas C. H. Lux, and Almohri, H. M. j.. “Remark on Algorithm 1012: Computing Projections with Large Data Sets.” ACM Transactions on Mathematical Software, vol. 50, no. 2, 2024, Article 2, pp. 1–8.
  3. Almohri, H. M. J., Layne T. Watson, David Evans, and Stephen Billups. “Dynamic System Diversification for Securing Cloud-Based IoT Subnetworks.” ACM Transactions on Autonomous and Adaptive Systems, vol. 17, nos. 1–2, 2022, Article 2, pp. 1–23.
  4. Elish, Karim, M. Elish, and Almohri, H. M. j.. “Lightweight, Effective Detection and Characterization of Mobile Malware Families.” IEEE Transactions on Computers, vol. 71, no. 11, 2022, pp. 2982–2995.
  5. Almohri, H. M. J., Layne T. Watson, Homa Alemzadeh, and Mohammed Almutawa. “On Parallel Real-Time Security Improvement Using Mixed-Integer Programming.” IEEE Access, vol. 9, 2021, pp. 58824–58837.
  6. Almohri, H. M. J., Mohammed Almutawa, Mohammed Alawadh, and Karim Elish. “A Client Bootstrapping Protocol for DoS Attack Mitigation on Entry Point Services in the Cloud.” Security and Communication Networks, 2020.
  7. Almohri, H. M. J., Layne T. Watson, and David Evans. “An Attack-Resilient Architecture for the Internet of Things.” IEEE Transactions on Information Forensics and Security, vol. 15, 2020, pp. 3940–3954.
  8. Qasem, Mohammed, and Almohri, H. M. j.. “An Efficient Deception Architecture for Cloud-Based Virtual Networks.” Kuwait Journal of Science, vol. 46, no. 3, 2019.
  9. Almohri, H. M. J., Layne T. Watson, and David Evans. “Predictability of IP Address Allocations for Cloud Computing Platforms.” IEEE Transactions on Information Forensics and Security, vol. 15, 2019, pp. 500–511.
  10. Vinatzer, Boris A., Lenwood S. Heath, Almohri, H. M. j., Michael J. Stulberg, Carl Lowe, and Song Li. “Cyberbiosecurity Challenges of Pathogen Genome Databases.” Frontiers in Bioengineering and Biotechnology, vol. 7, 2019, Article 106.
  11. Almohri, H. M. J., Layne T. Watson, and David Evans. “Misery Digraphs: Delaying Intrusion Attacks in Obscure Clouds.” IEEE Transactions on Information Forensics and Security, vol. 13, no. 6, 2017, pp. 1361–1375.
  12. Almohri, H. M. J., Layne T. Watson, Danfeng Yao, and Xinming Ou. “Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming.” IEEE Transactions on Dependable and Secure Computing, vol. 13, no. 4, 2015, pp. 474–487.
  13. Almohri, H. M. J., Danfeng Yao, and Dennis Kafura. “Process Authentication for High System Assurance.” IEEE Transactions on Dependable and Secure Computing, vol. 11, no. 2, 2013, pp. 168–180.
Conference Publications
  1. Almohri, H. M. J., and Watson, L. T. “Model-Agnostic Federated Learning for Privacy-Preserving Systems.” IEEE Secure Development Conference (SecDev), Oct. 2023, pp. 99–105.
  2. Blanc, W., Hashem, L. G., Elish, K. O., and Almohri, H. M. J. “Identifying Android Malware Families Using Android-Oriented Metrics.” IEEE International Conference on Big Data (Big Data), Dec. 2019, pp. 4708–4713.
  3. Almohri, H. M. J., and Evans, D. “Fidelius Charm: Isolating Unsafe Rust Code.” ACM Conference on Data and Application Security and Privacy, Mar. 2018, pp. 248–255.
  4. Almohri, H. M. J., Cheng, L., Yao, D., and Alemzadeh, H. “On Threat Modeling and Mitigation of Medical Cyber-Physical Systems.” IEEE/ACM CHASE, Jul. 2017, pp. 114–119.
  5. Almohri, H. M. J., and Almohri, S. A. “Security Evaluation by Arrogance: Saving Time and Money.” IEEE/ACM Workshop on Software Engineering for Startups (SoftStart), May 2017, pp. 12–16.
  6. Almohri, H. M. J., Yao, D., and Kafura, D. “DroidBarrier: Know What Is Executing on Your Android.” ACM Conference on Data and Application Security and Privacy, Mar. 2014, pp. 257–264.
  7. Almohri, H. M. J., Yao, D., and Kafura, D. “Identifying Native Applications with High Assurance.” ACM Conference on Data and Application Security and Privacy, Feb. 2012, pp. 275–282.
  8. Almohri, H. M. J., and Balci, O. “A Simulation-Based Software Design Framework for Network-Centric and Parallel Systems.” Programming Support Innovations for Emerging Distributed Applications, 2010, pp. 1–5.