Filters








9 Hits in 1.7 sec

An efficient deception architecture for cloud-based virtual networks [article]

Mohammad Qasem, Hussain M. J. Almohri
2020 arXiv   pre-print
An edge u i → u j means u i can directly access u j via some network protocol.  ...  In both experiments, j = 10 minutes, r = 100 seconds and u = 1.5 seconds.  ... 
arXiv:2004.06933v1 fatcat:4ues34ybzzggpmvyitz3j5pf6q

Cyberbiosecurity Challenges of Pathogen Genome Databases

Boris A. Vinatzer, Lenwood S. Heath, Hussain M. J. Almohri, Michael J. Stulberg, Christopher Lowe, Song Li
2019 Frontiers in Bioengineering and Biotechnology  
IMG/M, MycoCosm, and GOLD are all developed by the Joint Genome Institute (JGI) and are supported by the Department of Energy.  ...  JGI Genome Databases The integrated genome and metagenome comparative data analysis system (IMG/M) ) is a database containing tools to annotate microbial genomes and metagenomes.  ... 
doi:10.3389/fbioe.2019.00106 pmid:31157218 pmcid:PMC6529814 fatcat:d2npjjees5cfbn2cdavc6zkuzi

On Parallel Real-Time Security Improvement Using Mixed-Integer Programming

Hussain M. J. Almohri, Layne T. Watson, Homa Alemzadeh, Mohammad Almutawa
2021 IEEE Access  
J. Watson Research Center.  ...  Suppose that N i h and N j h represent conflicting options, with an identical rule node successor for node u ∈ N i h and node v ∈ N j h .  ... 
doi:10.1109/access.2021.3073089 fatcat:m4dhpdqhinhw5hhpim6vxwgrk4

Misery Digraphs: Delaying Intrusion Attacks in Obscure Clouds

Hussain M. J. Almohri, Layne T. Watson, David Evans
2018 IEEE Transactions on Information Forensics and Security  
For random 1 ≤ i < j ≤ b and 2 ≤ m < k the pair of arcs v (i) m , v (i) m+1 , v ( j ) m , v ( j ) m+1 is replaced by the pair v (i) m , v ( j ) m+1 , v ( j ) m , v (i) m+1 , which randomizes G * .  ...  , L i j ) where L i j = (u i ,v j ,s)∈R {s}.  ...  Hussain M. J. Almohri received the B.S. degree in computer science from Kuwait University and the Ph.D. degree in computer science from Virginia Tech.  ... 
doi:10.1109/tifs.2017.2779436 fatcat:i4vurucdrzhsjfxldhxn6kkmh4

A Client Bootstrapping Protocol for DoS Attack Mitigation on Entry Point Services in the Cloud

Hussain M. J. Almohri, Mohammad Almutawa, Mahmoud Alawadh, Karim Elish
2020 Security and Communication Networks  
In a target network with many client assignments, the attacker can be sure that the next assignment is on P i+j for some j > i.  ...  Consider m proxies that actively serve clients.  ... 
doi:10.1155/2020/8873258 fatcat:lfopwrau55adpm6rhbcxswwqei

A simulation-based software design framework for network-centric and parallel systems

Hussain M. J. Almohri, Osman Balci
2010 Programming Support Innovations for Emerging Distributed Applications on - PSI EtA '10  
In this paper we discuss a software design framework that is capable of realizing network-centricity and the rising multicore technology. Instead of producing static design documents in the form of UML diagrams, we propose automatic generation of a visual simulation model, which represents the target system design. We discuss a design environment that is responsible for the generation and execution of the simulation model.
doi:10.1145/1940747.1940752 dblp:conf/oopsla/AlmohriB10 fatcat:j44l32dmqndfjl4nne5sxrweii

A Study of Sindhi Related and Arabic Script Adapted languages Recognition [article]

Dil Nawaz Hakro, A. Z. Talib, Zeeshan Bhatti, G. N. Moja
2014 arXiv   pre-print
Almohri, H., J. S. Gray, and H.  ...  Journal of Zhejiang University SCIENCE, ISSN 1009-3095, Li et al / J Zhejiang University SCI 5 (11):1392-1397. Abbas, S. H., M. H. Al Muifraje and M. I.  ... 
arXiv:1412.4217v1 fatcat:a5k6co7ilrd3njsc2dnlfh3yx4

Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming

Hussain M.J. Almohri, Layne T. Watson, Danfeng Yao, Xinming Ou
2016 IEEE Transactions on Dependable and Secure Computing  
Note that there is no variable y m+t since y m+t is dependent on y m+1 , y m+2 , . . . , y m+t−1 ; y m+t = 1 only when all other selectors for u are zero.  ...  Let A = N ra and j 1 < j 2 < . . . < j A be the nodes in N ra . Define 0-1 variables t ji for i = 1, . . . , A and let T = (t j1 , . . . , t j A ).  ... 
doi:10.1109/tdsc.2015.2411264 fatcat:qfge7ez6znbbjmgxop6unybsty

Ammi Canada – Cacmid Annual Conference

2014 Canadian Journal of Infectious Diseases and Medical Microbiology  
Abstracts Can J Infect Dis Med Microbiol Vol 25 No 2 March/April 2014 e35 BACK TO TABLE OF CONTENTS P Sheth 1,2 , M Tadros 3 , w Small 4 , z hussain 4 1 department of Microbiology, kingston General  ...  I Luo 1,2 , V Montoya 1,2 , A Olmstead 1,2 , f Lamoury 3 , T Applegate 3 , J Grebely 3 , M krajden 1,2 1 ANd B parapertussis PCR TESTING IN A REGIONAL ChILdREN'S hOSPITAL C Ellis 1 , T karnauchow  ...  ORGANISM IdENTIfICATION ON EARLy SubCuLTuRE COLONIES by VITEkMS MATRIx-ASSISTEd LASER dESORPTION IONIzATION-TIME Of fLIGhT (VITEkMS) ANd ITS IMPACT ON ANTIbIOTIC STEwARdShIP y yu 1 , w McCaffrey 2 , M  ... 
doi:10.1155/2014/152651 fatcat:djt5infp5nbovjyc34ravx7cau