Hussain Almohri
Associate Professor of Computer Science, ACM & IEEE Senior Member
2498-5332
Kuwait University
College of Science
Computer Science Department,
P.O. Box 5969
Safat -13060
Education:
Ph.D. in Computer Science
Virginia Tech, USA2009-2013
M.S. in Computer Science
Kansas State University, USA2007-2008
B.S. in Computer Science
Kuwait University, Kuwait2001-2005
Interests and Research:
  • Systems Security
  • Network Security Analysis
Publications:

[1]  Hussain M. J. Almohri, Layne T. Watson, and David Evans. Predictability of IP address allocations for cloud computing platforms. IEEE Trans. Information Forensics and Security, 15:500–511, 2020.

[2]  William Blanc, Lina G. Hashem, Karim O. Elish, and Hussain M. J. Almohri. Identifying android malware families using android-oriented metrics. In 2019 IEEE International Conference on Big Data (Big Data), Los Angeles, CA, USA, December 9-12, 2019, pages 4708–4713. IEEE, 2019.

[3]  Hussain M. J. Almohri, Layne T. Watson, and David Evans. Misery digraphs: Delaying intrusion attacks in obscure clouds. IEEE Trans. Information Forensics and Security, 13(6):1361–1375, 2018.

[4]  Hussain M. J. Almohri and David Evans. Fidelius charm: Isolating unsafe rust code. In Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018, pages 248–255. ACM, 2018.

[5]  Hussain M. J. Almohri, Long Cheng, Danfeng Yao, and Homa Alemzadeh. On threat modeling and mitigation of medical cyber-physical systems. In Proceedings of the Second IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies, CHASE 2017, Philadelphia, PA, USA, July 17-19, 2017, pages 114–119. IEEE Computer Society / ACM, 2017.

[6]  Hussain M. J. Almohri and Sayed A. Almohri. Security evaluation by arrogance: Saving time and money. In 1st IEEE/ACM International Workshop on Software Engineeting for Startups, SoftStart@ICSE 2017, Buenos Aires, Argentina, May 21, 2017, pages 12–16. IEEE, 2017.

[7]  Hussain M. J. Almohri, Layne T. Watson, Danfeng Yao, and Xinming Ou. Security optimization of dynamic networks with probabilistic graph modeling and linear programming. IEEE Trans. Dependable Secur. Comput., 13(4):474–487, 2016.

[8]  Hussain M. J. Almohri, Danfeng Yao, and Dennis G. Kafura. Process authentication for high system assurance. IEEE Trans. Dependable Secur. Comput., 11(2):168–180, 2014.

[9]  Hussain M. J. Almohri, Danfeng (Daphne) Yao, and Dennis G. Kafura. Droidbarrier: know what is executing on your android. In Fourth ACM Conference on Data and Application Security and Privacy, CODASPY’14, San Antonio, TX, USA - March 03 - 05, 2014, pages 257–264. ACM, 2014.

[10]  Hussain M. J. Almohri, Danfeng (Daphne) Yao, and Dennis G. Kafura. Identifying native applications with high assurance. In Second ACM Conference on Data and Application Security and Privacy, CODASPY 2012, San Antonio, TX, USA, February 7-9, 2012, pages 275–282. ACM, 2012.

[11]  Hussain M. J. Almohri and Osman Balci. A simulation-based software design framework for network-centric and parallel systems. In SPLASH Workshop on Programming Support Innovations for Emerging Distributed Applications, October 17, 2010, Reno/Tahoe, Nevada, USA, page 5. ACM, 2010.