Map Home
Type / to search with text or keywords
/
keyboard shortcut: Type "/" on your keyboard for a quick search
Search button
Loading...
Loading...
Scroll left
Grants
Citations
H-Index
Patents
News
Books
Scroll right
Collapse sidebar
Data issues & feedback
Adjust height of sidebar
KMap
People
Adjust height of sidebar
KMap
Profile
Salim Hariri
Member of the Graduate Faculty | Professor, Electrical and Computer Engineering
Electrical and Computer Engr
Full Page
Overview
Research
More
Collaboration
(53)
Nirav Merchant
Mutual work: 1 Proposal
Collaboration Details
Scott Saleska
Mutual work: 1 Proposal
Collaboration Details
Larry Head
Mutual work: 1 Proposal
Collaboration Details
Xubin Zeng
Mutual work: 4 Proposals
Collaboration Details
Dalal Alharthi
Mutual work: 2 Proposals﹒1 Grant
Collaboration Details
Page 1 of 11
Previous page
Next page
Grants
(37)
Sign in to view all grants
Page 1 of 8
Previous page
Next page
Publications
(326)
Recent
Machine Learning for Intrusion Detection: Stream Classification Guided by Clustering for Sustainable Security in IoT
2023
machine learning,
intrusion detection,
clustering,
security,
iot
A Mobility-Aware Human-Centric Cyber–Physical System for Efficient and Secure Smart Healthcare
2022
cyber-physical systems,
mobility,
security,
efficiency
Energy-efficient and secure mobile fog-based cloud for the Internet of Things
2022
energy-efficient computing,
internet of things,
cloud computing,
mobile computing,
cybersecurity
Avoidance of cybersecurity threats with the deployment of a web-based blockchain-enabled cybersecurity awareness system
2021
cybersecurity,
blockchain,
web-based system,
cybersecurity awareness,
threat avoidance
SoK: Autonomic Cybersecurity Securing Future Disruptive Technologies
2021
cybersecurity,
autonomic systems,
future technologies,
disruptive technologies,
security
An explainable and efficient deelearning framework for video anomaly detection
2021
deep learning,
video analysis,
anomaly detection,
explainable ai,
efficient algorithms
Effective Wireless Communication Architecture for Resisting Jamming Attacks
2020
wireless communication,
jamming attacks,
architecture,
resisting,
effective
Anomaly behavior analysis of IoT protocols
2020
internet of things,
data analysis,
security,
networks,
anomaly detection
Multi-level Bluetooth Intrusion Detection System
2020
wireless communication,
cybersecurity,
intrusion detection,
network security,
iot security
A Value-Oriented Job Scheduling Approach for Power-Constrained and Oversubscribed HPC Systems
2020
job scheduling,
power management,
hpc systems,
value-oriented approach,
oversubscription