Publications

2015
  • I.M. Khalil, A. Khreishah, and M. Azeem, "Cloud Computing Security: A Survey." Computers (an MDPI Journal), Vol. 3, 2014, pp. 1-35. Available online: http://10.3390/computers3010001.
  • Khreishah, I. Khalil, and J. Wu, "Universal Network Coding-based Opportunistic Routing for Unicast." IEEE Transactions on Parallel and Distributed Systems, Vol. 24, 2014, pp. 2014 - 2015
  • Gharaibeh, A. Khreishah, I. Khalil, and J. Wu, "Asymptotically-Optimal Incentive-Based En-Route Caching Scheme." In Proceedings of 11th IEEE International Conference on Mobile Ad hoc and Sensor System (MASS’14), Philadelphia, Pennsylvania, USA, October 27-30, 2014, pp. 318-326.
  • Khreishah, I. Khalil, A. Gharaibeh, H. B. Salameh, and R. Alasem, "Joint Caching and Routing for Greening Computer Networks with Renewable Energy Sources." In Proceedings of International Conference on Future Internet of Things and Cloud (FiCloud), Barcelona, Spain, August 27-29, 2014, pp. 101-106.
  • M. T. Khan, D. Serpanos, and H. Shrobe, “On the Behavioral Formalization of the Cognitive Middleware AWDRAT.” In Proceedings of 26th Nordic Workshop on Programming Theory (NWPT'14), Halmstad, Sweden, October 2014, pp. 37-39.
  • A. Mohaisen and O. Alrawi, “AMAL: High-fidelity, Behavior-based Automated Malware Analysis and Classification.” In Proceedings of the 15th International Workshop on Information Security Applications (WISA’2014), Korea, August 25-27, 2014.
  • C. Fletcher, L. Ren, A. Kwon, M. van Dijk, E. Stefanov, D. Serpanos and S. Devadas, “Tiny ORAM: A Low-Latency, Low-Area Hardware ORAM Controller.” In Proceedings of the 23rd IEEE International Symposium on Field-Programmable Custom Computing Machines, Vancouver, Canada, May 3-5, 2015.
  • Z. Jorgensen, T. Yu, and G. Cormode, "Conservative or Liberal? Personalized Differential Privacy." In Proceedings of IEEE Conference on Data Engineering (ICDE), Seoul, Korea, April 13-17, 2015.
  • A. Khreishah, J. Chakareski, A. Gharaibeh, I. Khalil, and Y. Jararweh, "Joint Data Placement and Flow Control for Cost-Efficient Data Center Networks." In Proceedings of 6th International Conference on Information and Communication Systems (ICICS‘15), Amman, Jordan, April 7-9, 2015.
  • A. Mohaisen and O. Alrawi, "AMAL: High-Fidelity, Behavior-Based Automated Malware Analysis and Classification." Information Security Applications, K.-H. Rhee and J. H. Yi (Eds.), Springer International Publishing, 2015, pp. 107-121.
  • M. T. Khan, D. Serpanos, and H. Shrobe, “On the Formal Semantics of the Cognitive Middleware AWDRAT.” MIT CSAIL Technical Report, Report No. MIT-CSAIL-TR-2015-007, March 3, 2015, pp. 1-62. Available online: http://hdl.handle.net/1721.1/95774.
  • C. S. Gates, J. Chen, Z. Jorgensen, N. Li, R. W. Proctor, and T. Yu, "Understanding and Communicating Risk for Mobile Applications." In Proceedings of ACM Conference on Data and Application Security and Privacy (CODASPY’15), San Antonio, TX, USA, March 2-4, 2015, pp. 49-60.
  • P-A Vervier, O. Thonnard, M. Dacier, “Mind your blocks: on the stealthiness of malicious BGP hijacks.” In Proceedings of Network and Distributed System Security Symposium (NDSS’15), ISBN 1-891562-38-X, San Diego, California, February 8-11, 2015. Available online: http:/dx.doi.org/10.14722/ndss.2015.23035.
  • I. Hababeh, I. Khalil, and A. Khreishah, "Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System." IEEE Transactions on Services Computing, 8(1), Jan.-Feb. 2015, pp.47-64. Available online: http://10.1109/TSC.2014.2300499.
2014
  • F. Kargl, R. W. van der Heijden, H. König, A. Valdes, M. Dacier, “Insights on the Security and Dependability of Industrial Control Systems.” IEEE Security & Privacy,  12(6), 2014, pp. 75-78
  • A. Mohaisen, A. G. West, A. Mankin, and O. Alrawi, "Chatter: Classifying malware families using system event ordering." In Proceedings of IEEE Conference on Communications and Network Security (CNS’14), San Francisco, California, USA, October 29-31, 2014, pp. 283-291.
  • A. Mohaisen and O. Alrawi, "AV-Meter: An Evaluation of Antivirus Scans and Labels." Detection of Intrusions and Malware, and Vulnerability Assessment, vol. 8550, S. Dietrich (Ed.), Springer International Publishing, 2014, pp. 112-131.
  • A. Mohaisen, O. Alrawi, M. Larson, and D. McPherson, "Towards a Methodical Evaluation of Antivirus Scans and Labels." Information Security Applications, Y. Kim, H. Lee, and A. Perrig, (Eds.), Springer International Publishing, 2014, pp. 231-241.
  • I. Khalil, Z. Dou, and A. Khreishah, "TPM-based Authentication Mechanism for Apache Hadoop." In Proceedings of 10th International Conference on Security and Privacy in Communication Networks, (SecureComm 2014), Beijing, China, September 2014, pp. 24–26.
  • I. Khalil, A. Khreishah, and M. Azeem, "Consolidated Identity Management System for secure mobile cloud computing." Computer Networks, Vol. 65, 2014, pp. 99-110. Available online: http://10.3390/computers3010001.
  • A. Papalambrou, K. Stefanidis, J. Gialelis, and D. Serpanos, "Detection, traceback and filtering of denial of service attacks in networked embedded systems." In Proceedings of 9th Workshop on Embedded Systems Security, (WESS 2014), New Delhi, India, October 17, 2014.
  • Z. Jorgensen and T. Yu, "A Privacy-Preserving Framework for Personalized, Social Recommendations." In Proceedings of 17th International Conference on Extending Database Technology (EDBT), Athens, Greece, March 24-28, 2014, pp. 571-582.
  • T. Yu, "Data Anonymization: The Challenges from Theory to Practice." In Proceedings of EDBT/ICDT 2014 Joint Conference (EDBT/ICDT 2014), Athens, Greece, March 28, 2014, pp. 415.
  • W. Wei and T. Yu, "Integrity Assurance for Outsourced Databases without DBMS Modification." Data and Applications Security and Privacy XXVIII, Vol. 8566, V. Atluri and G. Pernul, (Eds.), Springer Berlin Heidelberg, 2014, pp. 1-16.
  • E. Choo, T. Yu, M. Chi, and Y. Sun, "Revealing and incorporating implicit communities to improve recommender systems." In Proceedings of 15th ACM conference on Economics and Computation, (EC 2014), Palo Alto, California, USA, June 8-12, 2014, pp. 489-506
  • E. Choo, J. Jiang, and T. Yu, "COMPARS: toward an empirical approach for comparing the resilience of reputation systems." In Proceedings of 4th ACM conference on Data and application security and privacy (CODASPY '14), San Antonio, Texas, USA, March 3-5, 2014, pp. 87-98.
2013
  • A. Mohaisen, O. Alrawi, A. G. West, and A. Mankin, "Babble: Identifying malware by its dialects." In Proceedings of IEEE Conference on Communications and Network Security (CNS), National Harbor, MD, October 14-16, 2013, pp. 407-408.
  • A. Mohaisen and O. Alrawi, "Unveiling Zeus:  automated classification of malware samples." In Proceedings of 22nd International Conference on World Wide Web Companion, Rio de Janeiro, Brazil, May 13-17, 2013, pp 829-932.
  • I. Hababeh, I. Khalil, A. Khreishah, and S. Bataineh, "Performance evaluation of wormhole security approaches for ad-hoc networks." Journal of Computer Science, vol. 9, 2013, available online: http://10.3844/jcssp.2013.1626.1637 pp. 1626-1637
  • I. M. Khalil, A. Khreishah, S. Bouktif, and A. Ahmad, "Security Concerns in Cloud Computing." In Proceedings of 10th International Conference on Information Technology: New Generations (ITNG), Las Vegas, Nevada, USA, April 15-17, 2013, pp. 411-416.
  • A. Khreishah, I. Khalil, and W. Jie, "Low Complexity and Provably Efficient Algorithm for Joint Inter and Intersession Network Coding in Wireless Networks." IEEE Transactions on Parallel and Distributed Systems, Vol. 24, 2013, pp. 2015-2024.
  • N. L. Farnan, A. J. Lee, P. K. Chrysanthis, and T. Yu, "PAQO: a preference-aware query optimizer for PostgreSQL." In Proceedings of VLDB Endowment, Vol. 6, 2013, pp. 1334-1337.

Research Director

Ting Yu

Dr. Ting Yu

QCRI offers a unique opportunity to conduct high-quality impactful research.
Read more

Principal Scientist

Issa khalil

Dr. Issa Khalil

QCRI is a wonderful place to work in the Middle East as it both satisfies my career goals and my family needs.
Read more

Follow Us

  • YouTube
  • Twitter
  • Facebook
  • RSS Feed
  • Linkedin
  • github-web.png
Back to Top

In the Media

CSAIl image october 2017 story.JPG

CSAIL hosts annual meeting highlighting innovative collaboration with QCRI

10/10/2017

This year CSAIL celebrates five years of collaboration with the Qatar Computing Research Institute (QCRI), an esteemed research institute that’s part of Hamad Bin Khalifa University in Doha. This ...

Read More

Poynter fact-checking story.JPG

Study: On Twitter, you're better off fact-checking your crazy uncle than a complete stranger

12/09/2017

A new study has found what many of us have always thought to be true: We are more likely to accept correction from people we know than strangers. The  study , conducted by researchers at Cornell, ...

Read More

ingredients CSAIL.jpg

Artificial intelligence suggests recipes based on food photos

25/07/2017

There are few things social media users love more than flooding their feeds with photos of food. Yet we seldom use these images for much more than a quick scroll on our cellphones. Researchers from ...

Read More

Events

2017

after school pic.JPG

QCRI's Creative Space launches free after-school computing courses for teenagers

Download ICS File 01/11/2017  - 20/12/2018 ,

We offer an App Inventor Course in Arabic for students aged 13-15 and an Arduino Programming Course in English for students aged 14-18. Courses are free. Please register quickly as places are limited.

Read More

Past Events

Summer Camp 2.jpg

QCRI conducts first summer computing camps for kids

Download ICS File 16/07/2017  - 27/07/2017 ,

Children and teenagers have been given a rare chance to develop their computing skills with world-class computing scientists at the first summer computing camp conducted by the Qatar Computing ...

Read More

CS 1.jpg

QCRI’s Creative Space holds Open House event for kids

Download ICS File 20/05/2017 ,

The Qatar Computing Research Institute’s new Creative Space, which conducts fun activities to teach children computing skills, has successfully held its first Open House event. About 100 children ...

Read More

News

Dr. Mokbel.jpg

QCRI’s Mohamed Mokbel named Distinguished Scientist by world’s largest computing society ACM

21/11/2017

Chief scientist among only 43 scientists globally - and the only one from the Middle East - to be selected for the honor in 2017.

Read More

Ingmar for award story.JPG

QCRI's Ingmar Weber wins UN award for joint gender equality research

21/09/2017

Joint research undertaken by Dr. Ingmar Weber of Qatar Computing Research Institute, part of Hamad Bin Khalifa University, along with scientists from Oxford and Princeton universities, has won a ...

Read More

Food serving - boys (2).jpg

Qatar girls embrace technology to tackle obesity

11/09/2017

Mothers are also more likely to use social media to learn about a healthy lifestyle than fathers, new study finds.

Read More