


default search action
Khalil El-Khatib
Person information
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j32]Yasamin Fayyaz
, Abdulaziz Almehmadi
, Khalil El-Khatib
:
A hybrid artificial intelligence framework for enhancing digital forensic investigations of infotainment systems. Forensic Sci. Int. Digit. Investig. 49: 301751 (2024) - [j31]Ulya Sabeel
, Shahram Shah-Heydari
, Khalil El-Khatib
, Khalid Elgazzar:
Unknown, Atypical and Polymorphic Network Intrusion Detection: A Systematic Survey. IEEE Trans. Netw. Serv. Manag. 21(1): 1190-1212 (2024) - [c71]Sara Taghavi Motlagh, Amin Ibrahim, Shahram Shah-Heydari, Khalil El-Khatib:
Multi-Objective Optimization for Managing Disruption Risk in SDN. DRCN 2024: 1-8 - 2023
- [j30]Mauricio Bertanha, Richard W. Pazzi
, Khalil El-Khatib
:
ECKN: An Integrated Approach for Position Estimation, Packet Routing, and Sleep Scheduling in Wireless Sensor Networks. Sensors 23(13): 6133 (2023) - [j29]Nur Zincir-Heywood
, Robert Birke, Elias Bou-Harb, Giuliano Casale, Khalil El-Khatib, Takeru Inoue, Neeraj Kumar, Hanan Lutfiyya, Deepak Puthal, Abdallah Shami, Natalia Stakhanova, Farhana H. Zulkernine:
Guest Editorial: Special Section on Machine Learning and Artificial Intelligence for Managing Networks, Systems, and Services - Part II. IEEE Trans. Netw. Serv. Manag. 20(2): 882-889 (2023) - [c70]Ulya Sabeel, Shahram Shah-Heydari, Khalil El-Khatib, Khalid Elgazzar:
Analyzing the Quality of Synthetic Adversarial Cyberattacks. CNSM 2023: 1-5 - [c69]Fateme Mazloomi
, Shahram Shah-Heydari
, Khalil El-Khatib
:
Trust-based Knowledge Sharing Among Federated Learning Servers in Vehicular Edge Computing. DIVANet 2023: 9-15 - [c68]Gerald Vailoces
, Alexander Keith
, Abdulaziz Almehmadi
, Khalil El-Khatib
:
Securing the Electric Vehicle Charging Infrastructure: An In-Depth Analysis of Vulnerabilities and Countermeasures. DIVANet 2023: 31-38 - 2022
- [j28]Jason Whelan
, Abdulaziz Almehmadi
, Khalil El-Khatib
:
Artificial intelligence for intrusion detection systems in Unmanned Aerial Vehicles. Comput. Electr. Eng. 99: 107784 (2022) - [j27]Nur Zincir-Heywood
, Robert Birke, Elias Bou-Harb, Giuliano Casale, Khalil El-Khatib
, Takeru Inoue, Neeraj Kumar, Hanan Lutfiyya, Deepak Puthal, Abdallah Shami
, Natalia Stakhanova, Farhana H. Zulkernine:
Guest Editorial: Special Issue on Machine Learning and Artificial Intelligence for Managing Networks, Systems, and Services - Part I. IEEE Trans. Netw. Serv. Manag. 19(4): 3988-3994 (2022) - 2021
- [j26]Ulya Sabeel
, Shahram Shah-Heydari
, Khalid Elgazzar
, Khalil El-Khatib
:
Building an Intrusion Detection System to Detect Atypical Cyberattack Flows. IEEE Access 9: 94352-94370 (2021) - [j25]James Curzon, Tracy Ann Kosa
, Rajen Akalu, Khalil El-Khatib
:
Privacy and Artificial Intelligence. IEEE Trans. Artif. Intell. 2(2): 96-108 (2021) - [c67]Ulya Sabeel
, Shahram Shah-Heydari, Khalid Elgazzar, Khalil El-Khatib
:
CVAE-AN: Atypical Attack Flow Detection Using Incremental Adversarial Learning. GLOBECOM 2021: 1-6 - [d1]Jason Whelan, Thanigajan Sangarapillai, Omar Minawi, Abdulaziz Almehmadi, Khalil El-Khatib:
UAV Attack Dataset. IEEE DataPort, 2021 - 2020
- [j24]Thiago S. Rocha
, Eduardo Souto, Khalil El-Khatib
:
Functionality-based mobile application recommendation system with security and privacy awareness. Comput. Secur. 97: 101972 (2020) - [j23]Brandon Laughlin, Karthik Sankaranarayanan
, Khalil El-Khatib
:
A Service Architecture Using Machine Learning to Contextualize Anomaly Detection. J. Database Manag. 31(1): 64-84 (2020) - [c66]Bamdad Vafaie, Mahboubeh Shamsi, Morteza Sargolzaei Javan, Khalil El-Khatib
:
A New Statistical Method for Anomaly Detection in Distributed Systems. CCECE 2020: 1-4 - [c65]David F. Arppe, Loutfouz Zaman, Richard W. Pazzi, Khalil El-Khatib:
UniNet: A Mixed Reality Driving Simulator. Graphics Interface 2020: 37-55 - [c64]Jason Whelan, Thanigajan Sangarapillai, Omar Minawi, Abdulaziz Almehmadi, Khalil El-Khatib:
Novelty-based Intrusion Detection of Sensor Attacks on Unmanned Aerial Vehicles. Q2SWinet 2020: 23-28 - [c63]Omar Minawi, Jason Whelan, Abdulaziz Almehmadi, Khalil El-Khatib:
Machine Learning-Based Intrusion Detection System for Controller Area Networks. DIVANet 2020: 41-47 - [c62]Oksana Kilik, Abdulaziz Almehmadi, Khalil El-Khatib:
Eye Gaze-Based Human Error Prevention System: Experts vs. Non-Experts. SIN 2020: 27:1-27:7
2010 – 2019
- 2019
- [j22]Thiago S. Rocha, Eduardo Souto, Khalil El-Khatib:
Techniques to detect data leakage in mobile applications. Int. J. Secur. Networks 14(3): 146-157 (2019) - [j21]James Curzon, Abdulaziz Almehmadi
, Khalil El-Khatib
:
A survey of privacy enhancing technologies for smart cities. Pervasive Mob. Comput. 55: 76-95 (2019) - [j20]Wesllen Sousa Lima
, Eduardo Souto, Khalil El-Khatib
, Roozbeh Jalali, João Gama
:
Human Activity Recognition Using Inertial Sensors in a Smartphone: An Overview. Sensors 19(14): 3213 (2019) - [j19]Felipe Leite Lobo
, Danilo Carvalho Grael, Horacio A. B. F. de Oliveira, Leandro Villas
, Abdulaziz Almehmadi
, Khalil El-Khatib
:
Cooperative Localization Improvement Using Distance Information in Vehicular Ad Hoc Networks. Sensors 19(23): 5231 (2019) - [c61]Safwan Alam, Roozbeh Jalali, Chirag Surti, Daniel Hoornweg, Khalil El-Khatib:
Ridesharing Architecture for Patterned Commute Traffic. DIVANet 2019: 17-22 - [c60]Felipe Leite Lobo
, Danilo Carvalho Grael, Horacio A. B. F. de Oliveira, Leandro Aparecido Villas, Abdulaziz Almehmadi, Khalil El-Khatib
:
A Distance-based Data Fusion Technique for Minimizing GPS Positioning Error in Vehicular Ad Hoc Networks. Q2SWinet 2019: 101-108 - [c59]Ulya Sabeel
, Shahram Shah-Heydari, Harsh Mohanka, Yasmine Bendhaou, Khalid Elgazzar, Khalil El-Khatib:
Evaluation of Deep Learning in Detecting Unknown Network Attacks. SmartNets 2019: 1-6 - [c58]Brandon Laughlin, Christopher Collins, Karthik Sankaranarayanan
, Khalil El-Khatib
:
A Visual Analytics Framework for Adversarial Text Generation. VizSEC 2019: 1-10 - [c57]Kevin Yardy, Abdulaziz Almehmadi, Khalil El-Khatib:
Detecting Malicious Driving with Machine Learning. WCNC 2019: 1-6 - [i6]Brandon Laughlin, Christopher Collins, Karthik Sankaranarayanan, Khalil El-Khatib:
A Visual Analytics Framework for Adversarial Text Generation. CoRR abs/1909.11202 (2019) - 2018
- [c56]Zachary Hills, David F. Arppe, Amin Ibrahim, Khalil El-Khatib
:
Compound Password System for Mobile. CyberSA 2018: 1-4 - [c55]Ahmed Dauda, Scott Mclean, Abdulaziz Almehmadi, Khalil El-Khatib
:
Big Data Analytics Architecture for Security Intelligence. SIN 2018: 19:1-19:4 - 2017
- [j18]Abdulaziz Almehmadi, Khalil El-Khatib
:
On the Possibility of Insider Threat Prevention Using Intent-Based Access Control (IBAC). IEEE Syst. J. 11(2): 373-384 (2017) - [j17]Eduardo Luengo, Shahram Shah-Heydari
, Khalil El-Khatib
:
SDN-based wireless user management system. Telecommun. Syst. 65(4): 755-769 (2017) - [j16]Sanaz Khakpour, Richard W. Pazzi
, Khalil El-Khatib
:
Using clustering for target tracking in vehicular ad hoc networks. Veh. Commun. 9: 83-96 (2017) - [c54]Orane Cole, Khalil El-Khatib
:
A Privacy Enhanced Facial Recognition Access Control System Using Biometric Encryption. DCOSS 2017: 199-206 - [c53]Joshua Harrington, Jesse Lacroix, Khalil El-Khatib, Felipe Leite Lobo
, Horácio A. B. F. Oliveira:
Proactive Certificate Distribution for PKI in VANET. Q2SWinet@MSWiM 2017: 9-13 - [c52]Felipe Leite Lobo
, Moyses M. Lima, Horacio A. B. F. de Oliveira, Khalil El-Khatib, Joshua Harrington:
SoLVE: A Localization System Framework for VANets using the Cloud and Fog Computing. DIVANet@MSWiM 2017: 17-22 - [c51]Wesllen Sousa, Eduardo Souto, Jonatas Rodrigres, Pedro Sadarc, Roozbeh Jalali, Khalil El-Khatib:
A Comparative Analysis of the Impact of Features on Human Activity Recognition with Smartphone Sensors. WebMedia 2017: 397-404 - 2016
- [c50]Roozbeh Jalali, Ahmed Dauda, Khalil El-Khatib
, Carolyn McGregor
, Chirag Surti:
An architecture for health data collection using off-the-shelf health sensors. MeMeA 2016: 1-6 - [c49]Kushal Jaisingh, Khalil El-Khatib, Rajen Akalu:
Paving the way for Intelligent Transport Systems (ITS): Privacy Implications of Vehicle Infotainment and Telematics Systems. DIVANet@MSWiM 2016: 25-31 - [c48]Jesse Lacroix, Khalil El-Khatib, Rajen Akalu:
Vehicular Digital Forensics: What Does My Vehicle Know About Me? DIVANet@MSWiM 2016: 59-66 - [c47]Abdulaziz Almehmadi, Khalil El-Khatib:
Intention-based Trust Re-evaluation. PST 2016: 437-444 - [c46]Safwan Alam, Khalil El-Khatib:
Phishing Susceptibility Detection through Social Media Analytics. SIN 2016: 61-64 - 2015
- [c45]Kaio R. S. Barbosa, Eduardo Souto, Eduardo Feitosa
, Khalil El-Khatib
:
Identifying and Classifying Suspicious Network Behavior Using Passive DNS Analysis. CIT/IUCC/DASC/PICom 2015: 160-167 - [c44]Roozbeh Jalali, Khalil El-Khatib, Carolyn McGregor
:
Smart city architecture for community level services through the internet of things. ICIN 2015: 108-113 - [c43]Eduardo Luengo, Christopher Weber, Shahram Shah-Heydari, Khalil El-Khatib:
Design and Implementation of a Software-Defined Integrated Wired-Wireless Network Testbed. MobiWac 2015: 47-52 - [c42]James Conway-Beaulieu, Austin Athaide, Roozbeh Jalali, Khalil El-Khatib:
Smartphone-based Architecture for Smart Cities. DIVANet@MSWiM 2015: 79-83 - [c41]Husain Subedar, Khalil El-Khatib:
Privacy and security concerns for health data collected using off-the-shelf health monitoring devices. WiMob 2015: 341-348 - [i5]Youssef Gahi, Mouhcine Guennoun, Zouhair Guennoun, Khalil El-Khatib:
On the use of homomorphic encryption to secure cloud computing, services, and routing protocols. CoRR abs/1508.05411 (2015) - [i4]Youssef Gahi, Mouhcine Guennoun, Zouhair Guennoun, Khalil El-Khatib:
An Encrypted Trust-Based Routing Protocol. CoRR abs/1512.03280 (2015) - [i3]Youssef Gahi, Mouhcine Guennoun, Khalil El-Khatib:
A Secure Database System using Homomorphic Encryption Schemes. CoRR abs/1512.03498 (2015) - 2014
- [c40]Sanaz Khakpour, Richard W. Pazzi
, Khalil El-Khatib:
A prediction based clustering algorithm for target tracking in vehicular ad-hoc networks. DIVANet@MSWiM 2014: 39-46 - [c39]Hamzeh Khazaei
, Carolyn McGregor
, J. Mikael Eklund, Khalil El-Khatib
, Anirudh Thommandram:
Toward a Big Data Healthcare Analytics System: A Mathematical Modeling Perspective. SERVICES 2014: 208-215 - [c38]Abdulaziz Almehmadi, Khalil El-Khatib:
On the Possibility of Insider Threat Detection Using Physiological Signal Monitoring. SIN 2014: 223 - 2013
- [c37]Garrett Hayes, Khalil El-Khatib, Carolyn McGregor
:
Supporting Health Informatics with Platform-as-a-Service Cloud Computing. EMC/HumanCom 2013: 1149-1158 - [c36]Abdulaziz Almehmadi, Khalil El-Khatib:
The state of the art in electroencephalogram and access control. ICCIT 2013: 49-54 - [c35]Garrett Hayes, Khalil El-Khatib:
Securing modbus transactions using hash-based message authentication codes and stream transmission control protocol. ICCIT 2013: 179-184 - [c34]Tracy Ann Kosa, Stephen Marsh, Khalil El-Khatib:
Privacy representation in VANET. DIVANet@MSWiM 2013: 39-44 - [c33]Sanaz Khakpour, Richard Werner Nelem Pazzi
, Khalil El-Khatib:
A distributed clustering algorithm for target tracking in vehicular ad-hoc networks. DIVANet@MSWiM 2013: 145-152 - [c32]Tim Storer, Stephen Marsh, Sylvie Noël, Babak Esfandiari, Khalil El-Khatib
, Pamela Briggs
, Karen Renaud, Mehmet Vefa Bicakci:
Encouraging second thoughts: Obstructive user interfaces for raising security awareness. PST 2013: 366-368 - [c31]Abdulaziz Almehmadi, Khalil El-Khatib:
Authorized! access denied, unauthorized! access granted. SIN 2013: 363-367 - [c30]Abdulaziz Almehmadi, Michael Bourque, Khalil El-Khatib
:
A Tweet of the Mind: Automated Emotion Detection for Social Media Using Brain Wave Pattern Analysis. SocialCom 2013: 987-991 - [i2]Youssef Gahi, Meryem Lamrani, Mouhcine Guennoun, Khalil El-Khatib:
Infrastructure Logicielle d un Environnement Hospitalier Intelligent. CoRR abs/1311.3231 (2013) - 2012
- [j15]Youssef Gahi, Mouhcine Guennoun, Zouhair Guennoun, Khalil El-Khatib:
Privacy Preserving Scheme for Location-Based Services. J. Information Security 3(2): 105-112 (2012) - [c29]Youssef Gahi
, Mouhcine Guennoun, Zouhair Guennoun
, Khalil El-Khatib:
A fully private video on-Demand service. CCECE 2012: 1-4 - [c28]Jamal Abu Rrub, Jamil Al-Jabi, Khalil El-Khatib:
Security model for real time tracking system (RTLS) in the healthcare sector. ICCIT 2012: 369-373 - [c27]Daniel Da Silva, Tracy Ann Kosa, Stephen Marsh, Khalil El-Khatib:
Examining privacy in vehicular ad-hoc networks. DIVANet@MSWiM 2012: 105-110 - 2011
- [j14]Stephen Marsh, Pamela Briggs, Khalil El-Khatib, Babak Esfandiari, John A. Stewart:
Defining and Investigating Device Comfort. Inf. Media Technol. 6(3): 914-935 (2011) - [j13]Stephen Marsh, Pamela Briggs
, Khalil El-Khatib, Babak Esfandiari, John A. Stewart:
Defining and Investigating Device Comfort. J. Inf. Process. 19: 231-252 (2011) - [j12]Tracy Ann Kosa, Khalil El-Khatib, Stephen Marsh:
Measuring Privacy. J. Internet Serv. Inf. Secur. 1(4): 60-73 (2011) - [c26]Shahram Heydari, Walid Rjaibi, Khalil El-Khatib, Julie Thorpe:
Privacy and security of smart grid communication. CASCON 2011: 345-346 - [c25]Youssef Gahi, Mouhcine Guennoun, Zouhair Guennoun, Khalil El-Khatib:
Encrypted processes for oblivious data retrieval. ICITST 2011: 514-518 - [c24]Mukhtaj S. Barhm, Nidal Qwasmi, Faisal Z. Qureshi, Khalil El-Khatib:
Negotiating Privacy Preferences in Video Surveillance Systems. IEA/AIE (2) 2011: 511-521 - [c23]Sk. Md. Mizanur Rahman
, Md. Mehedi Masud
, Carlisle Adams, Khalil El-Khatib
, Hussein T. Mouftah, Eiji Okamoto:
Cryptographic security models for eHealth P2P database management systems network. PST 2011: 164-173 - [c22]Stephen Marsh, Sylvie Noël, Tim Storer, Yao Wang, Pamela Briggs
, Lewis Robart, John A. Stewart, Babak Esfandiari, Khalil El-Khatib, Mehmet Vefa Bicakci, Manh Cuong Dao, Michael Cohen, Daniel Da Silva:
Non-standards for Trust: Foreground Trust and Second Thoughts for Mobile Security. STM 2011: 28-39 - 2010
- [j11]Sk. Md. Mizanur Rahman
, Khalil El-Khatib
:
Private key agreement and secure communication for heterogeneous sensor networks. J. Parallel Distributed Comput. 70(8): 858-870 (2010) - [j10]Sk. Md. Mizanur Rahman
, Khalil El-Khatib
:
Corrigendum to "Private key agreement and secure communication for heterogeneous sensor networks" [J. Parallel Distrib. Comput 70 (2010) 858-870]. J. Parallel Distributed Comput. 70(11): 1174 (2010) - [j9]Khalil El-Khatib
:
Impact of Feature Reduction on the Efficiency of Wireless Intrusion Detection Systems. IEEE Trans. Parallel Distributed Syst. 21(8): 1143-1149 (2010) - [c21]Khalil El-Khatib, Patrick Hung, Julie Thorpe
, Walid Rjaibi:
Cybersecurity issues for businesses. CASCON 2010: 364-365 - [c20]James Lee, Khalil El-Khatib:
A Privacy-Enabled Architecture for an RFID-based Location Monitoring System. SocialCom/PASSAT 2010: 934-937 - [i1]Sk. Md. Mizanur Rahman, Mehedi Masud, Carlisle Adams, Khalil El-Khatib, Hussein T. Mouftah, Eiji Okamoto:
Pair-wise Cryptographic Models for Secure Data Exchange in P2P Database Management Systems. IACR Cryptol. ePrint Arch. 2010: 85 (2010)
2000 – 2009
- 2009
- [j8]Sk. Md. Mizanur Rahman, Khalil El-Khatib
:
Secure Anonymous Communication for Wireless Sensor Networks Based on Pairing over Elliptic Curves. J. Interconnect. Networks 10(4): 459-479 (2009) - [c19]Khalil El-Khatib, Walid Rjaibi, Shahram Heydari, Miguel Vargas Martin:
Workshop on cybersecurity: security and privacy in the 21st century. CASCON 2009: 366 - [c18]Ronggong Song, Khalil El-Khatib, Peter C. Mason:
Analysis of Chinese Remainder Theorem Based Group Key Management Protocols. Security and Management 2009: 86-92 - [c17]James Lee, Khalil El-Khatib:
A privacy-enabled architecture for an RFID-based location monitoring system. MOBIWAC 2009: 128-131 - 2008
- [c16]Mike Pattrick, Andrew Hogue, Khalil El-Khatib:
A secure digital asset managment network for game development and education. Future Play 2008: 204-207 - [c15]Khalil El-Khatib:
The cost of protecting privacy in multimedia applications. Q2SWinet 2008: 51-54 - [c14]Youssef Gahi
, Meryem Lamrani, Abdelhak Zoglat, Mouhcine Guennoun, Bill Kapralos, Khalil El-Khatib:
Biometric Identification System Based on Electrocardiogram Data. NTMS 2008: 1-5 - [c13]Mouhcine Guennoun, Aboubakr Lbekkouri, Amine Benamrane
, Mohamed Ben-Tahir, Khalil El-Khatib:
Wireless networks security: Proof of chopchop attack. WOWMOM 2008: 1-4 - 2007
- [j7]Azzedine Boukerche, Li Xu, Khalil El-Khatib
:
Trust-based security for wireless ad hoc and sensor networks. Comput. Commun. 30(11-12): 2413-2427 (2007) - [j6]Azzedine Boukerche, Li Xu, Khalil El-Khatib
:
Corrigendum to "Trust-based security for wireless ad hoc and sensor networks" [Computer Communications 30 (2007) 2413-2427]. Comput. Commun. 30(18): 3905 (2007) - [j5]Azzedine Boukerche, Khalil El-Khatib
, Tingxue Huang:
A performance evaluation of distributed dynamic channel allocation protocols for mobile networks. Wirel. Commun. Mob. Comput. 7(1): 69-80 (2007) - [c12]Khalil El-Khatib
, Gregor von Bochmann, Abdulmotaleb El-Saddik
:
A QoS-based Service Composition for Content Adaptation. ICDE Workshops 2007: 331-338 - 2006
- [j4]Azzedine Boukerche, Khalil El-Khatib
, Li Xu, Larry Korba:
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks. Perform. Evaluation 63(11): 1094-1109 (2006) - [c11]Khalil El-Khatib, Gregor von Bochmann:
Protecting the privacy of user's QoS preferences for multimedia applications. WMuNeP 2006: 35-42 - 2005
- [j3]Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry Korba:
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks. Comput. Commun. 28(10): 1193-1203 (2005) - 2004
- [j2]Khalil El-Khatib, Zhen E. Zhang, N. Hadibi, Gregor von Bochmann:
Personal and service mobility in ubiquitous computing environments. Wirel. Commun. Mob. Comput. 4(6): 595-607 (2004) - [c10]Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry Korba:
SDAR: A Secure Distributed Anonymous Routing Protocol for Wireless and Mobile Ad Hoc Networks. LCN 2004: 618-624 - [c9]Azzedine Boukerche, Khalil El-Khatib, Tingxue Huang:
A performance comparison of dynamic channel and ressource allocation protocols for mobile cellular networks. Mobility Management & Wireless Access Protocols 2004: 27-34 - [c8]Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry Korba:
A novel solution for achieving anonymity in wireless ad hoc networks. PE-WASUN 2004: 30-38 - [c7]Khalil El-Khatib, Gregor von Bochmann, Abdulmotaleb El-Saddik
:
A QoS-Based Framework for Distributed Content Adaptation. QSHINE 2004: 308-312 - [c6]Andrew S. Patrick, Janice Singer, Brian Corrie II, Sylvie Noël, Khalil El-Khatib, Bruno Emond
, Todd Zimmerman, Stephen Marsh:
A QoE Sensitive Architecture for Advanced Collaborative Environments. QSHINE 2004: 319-322 - 2003
- [j1]Khalil El-Khatib, Larry Korba, Yuefei Xu, George Yee:
Privacy and Security in E-Learning. Int. J. Distance Educ. Technol. 1(4): 1-19 (2003) - [c5]Khalil El-Khatib, N. Hadibi, Gregor von Bochmann:
Support for Personal and Service Mobility in Ubiquitous Computing Environments. Euro-Par 2003: 1046-1055 - [c4]Khalil El-Khatib, Larry Korba, Ronggong Song, George Yee:
Secure Dynamic Distributed Routing Algorithm for Ad Hoc Wireless Networks. ICPP Workshops 2003: 359-366 - [c3]Khalil El-Khatib, Gregor von Bochmann:
Agent Support for Context-Aware Services and Personal Mobility. MATA 2003: 89-98 - 2001
- [c2]Khalil El-Khatib, Gregor von Bochmann, Yu Zhong:
Selecting the QoS Parameters for Multicast Applications Based on User Profile and Device Capability. IDMS 2001: 221-232
1990 – 1999
- 1999
- [c1]Carl Tropper, Khalil El-Khatib:
On Metrics for the Dynamic Load Balancing of Optimistic Simulations. HICSS 1999
Coauthor Index
aka: Shahram Heydari

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 21:04 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint