scispace - formally typeset
I

Issa Khalil

Researcher at Qatar Computing Research Institute

Publications -  124
Citations -  4945

Issa Khalil is an academic researcher from Qatar Computing Research Institute. The author has contributed to research in topics: Wireless sensor network & Network packet. The author has an hindex of 29, co-authored 116 publications receiving 3868 citations. Previous affiliations of Issa Khalil include College of Information Technology & Qatar University.

Papers
More filters
Book

Unmanned Aerial Vehicles: A Survey on Civil Applications and Key Research Challenges

TL;DR: The use of unmanned aerial vehicles (UAVs) is growing rapidly across many civil application domains, including real-time monitoring, providing wireless coverage, remote sensing, search and rescue, delivery of goods, security and surveillance, precision agriculture, and civil infrastructure inspection.
Journal ArticleDOI

Smart Cities: A Survey on Data Management, Security, and Enabling Technologies

TL;DR: The fundamental data management techniques employed to ensure consistency, interoperability, granularity, and reusability of the data generated by the underlying IoT for smart cities are described.
Proceedings ArticleDOI

LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks

TL;DR: This paper presents a lightweight countermeasure for the wormhole attack, called LITEWORP, which does not require specialized hardware and is particularly suitable for resource-constrained multihop wireless networks, such as sensor networks.
Proceedings ArticleDOI

Heavy Hitter Estimation over Set-Valued Data with Local Differential Privacy

TL;DR: The main idea is to first gather a candidate set of heavy hitters using a portion of the privacy budget, and focus the remaining budget on refining the candidate set in a second phase, which is much more efficient budget-wise than obtaining the heavy hitters directly from the whole dataset.
Journal ArticleDOI

Cloud Computing Security: A Survey

TL;DR: This work identifies cloud vulnerabilities, classify known security threats and attacks, and presents the state-of-the-art practices to control the vulnerabilities, neutralize the threats, and calibrate the attacks.