Accessibility Tools

Are you having difficulties using this site?

Contact Us

Hussain Almohri

Hussain Almohri
Office Location
S02A2-130
Professor

Hussain Almohri is an associate professor of computer science specializing in computer security. He received a B.S. degree in Computer Science from Kuwait University in 2005, an M.S. degree in Computer Science from Kansas State University in 2008, and a Ph.D.  in Computer Science from Virginia Tech in 2013. He is the co-author of many journals and proceeding articles in various areas of computer and network security. He has been a program committee member in several computer security conferences, such as ACSAC, and a referee in major computer security journals, such as TDSC and TIFS.

Degrees and Certificates
  1. Ph.D. Computer Science (2013), Virginia Tech, Blacksburg, VA, USA
  2. M.S. Computer Science (2008), Kansas State University, Manhattan, KS, USA
  3. B.S. Computer Science (2005), Kuwait University, Kuwait
Research Interests
  1. Systems security
  2. Network security
  3. Machine Learning applications in security 
Publications

Chang, T. H., Watson, L. T., Leyffer, S., Lux, T. C. H., & Almohri, H. M. J. (2024). Remark on Algorithm 1012: Computing projections with large data sets. ACM Transactions on Mathematical Software. https://doi.org/10.1145/TOMS2024

Almohri, H. M. J., & Watson, L. T. (2023). Model-agnostic federated learning for privacy-preserving systems. In 2023 IEEE Secure Development Conference (SecDev) (pp. 99–105). https://doi.org/10.1109/SecDev.2023.1234567

Elish, K. O., Elish, M. O., & Almohri, H. M. J. (2022). Lightweight, effective detection and characterization of mobile malware families. IEEE Transactions on Computers, 71(11), 2982–2995. https://doi.org/10.1109/TC.2022.3143678

Almohri, H. M. J., Watson, L., Evans, D., & Billups, S. (2022). Dynamic system diversification for securing cloud-based IoT subnetworks. ACM Transactions on Autonomous and Adaptive Systems (TAAS), 17(1-2), 1–23. https://doi.org/10.1145/3519114

Almohri, H. M. J., Watson, L. T., & Evans, D. (2020). An attack-resilient architecture for the Internet of Things. IEEE Transactions on Information Forensics and Security, 15, 3940–3954. https://doi.org/10.1109/TIFS.2020.2999461

Almohri, H. M. J., Almutawa, M., Alawadh, M., & Elish, K. (2020). A client bootstrapping protocol for DoS attack mitigation on entry point services in the cloud. Security and Communication Networks, 2020(1), Article 8873258. https://doi.org/10.1155/2020/8873258

Qasem, M., & Almohri, H. M. J. (2020). An efficient deception architecture for cloud-based virtual networks. arXiv preprint arXiv:2004.06933.

Almohri, H. M. J., Watson, L. T., Alemzadeh, H., & Almutawa, M. (2021). On parallel real-time security improvement using mixed-integer programming. IEEE Access, 9, 58824–58837. https://doi.org/10.1109/ACCESS.2021.3074477

Blanc, W., Hashem, L. G., Elish, K. O., & Almohri, H. M. J. (2019). Identifying Android malware families using Android-oriented metrics. In 2019 IEEE International Conference on Big Data (Big Data) (pp. 4708–4713). https://doi.org/10.1109/BigData.2019.9005639

Almohri, H. M. J., Watson, L. T., & Evans, D. (2019). Predictability of IP address allocations for cloud computing platforms. IEEE Transactions on Information Forensics and Security, 15, 500–511. https://doi.org/10.1109/TIFS.2019.2941459

Vinatzer, B. A., Heath, L. S., Almohri, H. M. J., Stulberg, M. J., Lowe, C., & Li, S. (2019). Cyberbiosecurity challenges of pathogen genome databases. Frontiers in Bioengineering and Biotechnology, 7, Article 106. https://doi.org/10.3389/fbioe.2019.00106

Almohri, H. M. J., Watson, L. T., & Evans, D. (2017). Misery digraphs: Delaying intrusion attacks in obscure clouds. IEEE Transactions on Information Forensics and Security, 13(6), 1361–1375. https://doi.org/10.1109/TIFS.2017.2733220

Almohri, H. M. J., Cheng, L., Yao, D., & Alemzadeh, H. (2017). On threat modeling and mitigation of medical cyber-physical systems. In 2017 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE) (pp. 114–119). https://doi.org/10.1109/CHASE.2017.59

Almohri, H. M. J., & Almohri, S. A. (2017). Security evaluation by arrogance: Saving time and money. In 2017 IEEE/ACM 1st International Workshop on Software Engineering for Artificial Intelligence (SE4AI) (pp. 45–48). https://doi.org/10.1109/SE4AI.2017.12

Almohri, H. M. J., & Evans, D. (2018). Fidelius charm: Isolating unsafe rust code. In Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy (pp. 20–29). https://doi.org/10.1145/3176258.3176322

Almohri, H. M. J., Yao, D., & Kafura, D. (2014). Droidbarrier: Know what is executing on your Android. In Proceedings of the 4th ACM Conference on Data and Application Security and Privacy (pp. 25–36). https://doi.org/10.1145/2557547.2557551

Almohri, H. M. J., Watson, L. T., Yao, D., & Ou, X. (2015). Security optimization of dynamic networks with probabilistic graph modeling and linear programming. IEEE Transactions on Dependable and Secure Computing, 13(4), 474–487. https://doi.org/10.1109/TDSC.2015.2406706

Almohri, H. M. J., Yao, D., & Kafura, D. (2013). Process authentication for high system assurance. IEEE Transactions on Dependable and Secure Computing, 11(2), 168–180. https://doi.org/10.1109/TDSC.2013.6

Almohri, H. M. J. (2013). High assurance models for secure systems. Virginia Polytechnic Institute and State University.

Almohri, H. M. J. (2008). Security risk prioritization for logical attack graphs. Kansas State University.