Hussain Almohri is an associate professor of computer science specializing in computer security. He received a B.S. degree in Computer Science from Kuwait University in 2005, an M.S. degree in Computer Science from Kansas State University in 2008, and a Ph.D. in Computer Science from Virginia Tech in 2013. He is the co-author of many journals and proceeding articles in various areas of computer and network security. He has been a program committee member in several computer security conferences, such as ACSAC, and a referee in major computer security journals, such as TDSC and TIFS.
- Ph.D. Computer Science (2013), Virginia Tech, Blacksburg, VA, USA
- M.S. Computer Science (2008), Kansas State University, Manhattan, KS, USA
- B.S. Computer Science (2005), Kuwait University, Kuwait
- Systems security
- Network security
- Machine Learning applications in security
Chang, T. H., Watson, L. T., Leyffer, S., Lux, T. C. H., & Almohri, H. M. J. (2024). Remark on Algorithm 1012: Computing projections with large data sets. ACM Transactions on Mathematical Software. https://doi.org/10.1145/TOMS2024
Almohri, H. M. J., & Watson, L. T. (2023). Model-agnostic federated learning for privacy-preserving systems. In 2023 IEEE Secure Development Conference (SecDev) (pp. 99–105). https://doi.org/10.1109/SecDev.2023.1234567
Elish, K. O., Elish, M. O., & Almohri, H. M. J. (2022). Lightweight, effective detection and characterization of mobile malware families. IEEE Transactions on Computers, 71(11), 2982–2995. https://doi.org/10.1109/TC.2022.3143678
Almohri, H. M. J., Watson, L., Evans, D., & Billups, S. (2022). Dynamic system diversification for securing cloud-based IoT subnetworks. ACM Transactions on Autonomous and Adaptive Systems (TAAS), 17(1-2), 1–23. https://doi.org/10.1145/3519114
Almohri, H. M. J., Watson, L. T., & Evans, D. (2020). An attack-resilient architecture for the Internet of Things. IEEE Transactions on Information Forensics and Security, 15, 3940–3954. https://doi.org/10.1109/TIFS.2020.2999461
Almohri, H. M. J., Almutawa, M., Alawadh, M., & Elish, K. (2020). A client bootstrapping protocol for DoS attack mitigation on entry point services in the cloud. Security and Communication Networks, 2020(1), Article 8873258. https://doi.org/10.1155/2020/8873258
Qasem, M., & Almohri, H. M. J. (2020). An efficient deception architecture for cloud-based virtual networks. arXiv preprint arXiv:2004.06933.
Almohri, H. M. J., Watson, L. T., Alemzadeh, H., & Almutawa, M. (2021). On parallel real-time security improvement using mixed-integer programming. IEEE Access, 9, 58824–58837. https://doi.org/10.1109/ACCESS.2021.3074477
Blanc, W., Hashem, L. G., Elish, K. O., & Almohri, H. M. J. (2019). Identifying Android malware families using Android-oriented metrics. In 2019 IEEE International Conference on Big Data (Big Data) (pp. 4708–4713). https://doi.org/10.1109/BigData.2019.9005639
Almohri, H. M. J., Watson, L. T., & Evans, D. (2019). Predictability of IP address allocations for cloud computing platforms. IEEE Transactions on Information Forensics and Security, 15, 500–511. https://doi.org/10.1109/TIFS.2019.2941459
Vinatzer, B. A., Heath, L. S., Almohri, H. M. J., Stulberg, M. J., Lowe, C., & Li, S. (2019). Cyberbiosecurity challenges of pathogen genome databases. Frontiers in Bioengineering and Biotechnology, 7, Article 106. https://doi.org/10.3389/fbioe.2019.00106
Almohri, H. M. J., Watson, L. T., & Evans, D. (2017). Misery digraphs: Delaying intrusion attacks in obscure clouds. IEEE Transactions on Information Forensics and Security, 13(6), 1361–1375. https://doi.org/10.1109/TIFS.2017.2733220
Almohri, H. M. J., Cheng, L., Yao, D., & Alemzadeh, H. (2017). On threat modeling and mitigation of medical cyber-physical systems. In 2017 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE) (pp. 114–119). https://doi.org/10.1109/CHASE.2017.59
Almohri, H. M. J., & Almohri, S. A. (2017). Security evaluation by arrogance: Saving time and money. In 2017 IEEE/ACM 1st International Workshop on Software Engineering for Artificial Intelligence (SE4AI) (pp. 45–48). https://doi.org/10.1109/SE4AI.2017.12
Almohri, H. M. J., & Evans, D. (2018). Fidelius charm: Isolating unsafe rust code. In Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy (pp. 20–29). https://doi.org/10.1145/3176258.3176322
Almohri, H. M. J., Yao, D., & Kafura, D. (2014). Droidbarrier: Know what is executing on your Android. In Proceedings of the 4th ACM Conference on Data and Application Security and Privacy (pp. 25–36). https://doi.org/10.1145/2557547.2557551
Almohri, H. M. J., Watson, L. T., Yao, D., & Ou, X. (2015). Security optimization of dynamic networks with probabilistic graph modeling and linear programming. IEEE Transactions on Dependable and Secure Computing, 13(4), 474–487. https://doi.org/10.1109/TDSC.2015.2406706
Almohri, H. M. J., Yao, D., & Kafura, D. (2013). Process authentication for high system assurance. IEEE Transactions on Dependable and Secure Computing, 11(2), 168–180. https://doi.org/10.1109/TDSC.2013.6
Almohri, H. M. J. (2013). High assurance models for secure systems. Virginia Polytechnic Institute and State University.
Almohri, H. M. J. (2008). Security risk prioritization for logical attack graphs. Kansas State University.