I
Issa Khalil
Researcher at Qatar Computing Research Institute
Publications - 124
Citations - 4945
Issa Khalil is an academic researcher from Qatar Computing Research Institute. The author has contributed to research in topics: Wireless sensor network & Network packet. The author has an hindex of 29, co-authored 116 publications receiving 3868 citations. Previous affiliations of Issa Khalil include College of Information Technology & Qatar University.
Papers
More filters
Book
Unmanned Aerial Vehicles: A Survey on Civil Applications and Key Research Challenges
Hazim Shakhatreh,Ahmad Sawalmeh,Ahmad Sawalmeh,Ala Al-Fuqaha,Ala Al-Fuqaha,Zuochao Dou,Eyad Almaita,Issa Khalil,Noor Shamsiah Othman,Abdallah Khreishah,Mohsen Guizani +10 more
TL;DR: The use of unmanned aerial vehicles (UAVs) is growing rapidly across many civil application domains, including real-time monitoring, providing wireless coverage, remote sensing, search and rescue, delivery of goods, security and surveillance, precision agriculture, and civil infrastructure inspection.
Journal ArticleDOI
Smart Cities: A Survey on Data Management, Security, and Enabling Technologies
Ammar Gharaibeh,Mohammad A. Salahuddin,Sayed Jahed Hussini,Abdallah Khreishah,Issa Khalil,Mohsen Guizani,Ala Al-Fuqaha +6 more
TL;DR: The fundamental data management techniques employed to ensure consistency, interoperability, granularity, and reusability of the data generated by the underlying IoT for smart cities are described.
Proceedings ArticleDOI
LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks
TL;DR: This paper presents a lightweight countermeasure for the wormhole attack, called LITEWORP, which does not require specialized hardware and is particularly suitable for resource-constrained multihop wireless networks, such as sensor networks.
Proceedings ArticleDOI
Heavy Hitter Estimation over Set-Valued Data with Local Differential Privacy
TL;DR: The main idea is to first gather a candidate set of heavy hitters using a portion of the privacy budget, and focus the remaining budget on refining the candidate set in a second phase, which is much more efficient budget-wise than obtaining the heavy hitters directly from the whole dataset.
Journal ArticleDOI
Cloud Computing Security: A Survey
TL;DR: This work identifies cloud vulnerabilities, classify known security threats and attacks, and presents the state-of-the-art practices to control the vulnerabilities, neutralize the threats, and calibrate the attacks.