Security - Privacy - Intelligence - Edge Computing

SPINE Research Group at RMIT

SPINE (Security, Privacy, Intelligence, and Edge) Research Group at RMIT is a dynamic research lab dedicated to advancing the frontiers of digital exploration. Specializing in security, privacy, and intelligence, the group pioneers cutting-edge research at the intersection of technology and innovation.

Publications

2026 10 publications +
1.

Leveraging Large Language Models for Multi-Objective and Adaptive SFC Deployment: Techniques, Case Study, and Promising Directions. Longlong Zhu, Jiashuo Yu, Xiang Chen, Zhifan Jiang, Xuan Liu, Jianshan Zhang, Xu Yang, Ruichen Zhang, Dusit Niyato, Xun Yi, Ibrahim Khalil, Dong Zhang, Chunming Wu.

2.

SSFU: Selective Semantic Feature Unlearning for Federated Learning in 6G Internet of Things Systems. Wathsara Daluwatta, Ibrahim Khalil, Shehan Edirimannage, Charitha Elvitigala, Jer Shyuan Ng, Dusit Niyato.

3.

Toward Personalized Federated Meta-Learning With Constrained Hypernetwork on Non-IID Data. Lizhao Wu, Xiaoding Wang, Hui Lin, Xu Yang, Jiwu Shu, Xun Yi, Ibrahim Khalil, Albert Y. Zomaya.

4.

KGEES: An Energy Saving System With Location Privacy Preservation in Multi-Access Edge Computing. Ziqi Wang, Xiaoyu Xia, Ibrahim Khalil, Minghui Liwang, Xiaolong Xu, Xun Yi, Yan Li, Minhui Xue.

5.

Data Flipping Attack and Defense in Web Edge Caching Systems. Mengsha Kou, Xiaoyu Xia, Ibrahim Khalil, Ziqi Wang, Xiuzhen Zhang, Lin Yao, Minhui Xue.

6.

SecHeto-FL: A Secure and Resilient Federated Learning Framework for Heterogeneous IoT Networks. Shehan Edirimannage, Ibrahim Khalil, Xun Yi, Kwok-Yan Lam.

7.

Energy-Efficient UAV Deployment and Computation Offloading in Space-Air-Ground Integrated Networks. Jianshan Zhang, Xu Yang, Xing Chen, Xiang Chen, Xun Yi, Ibrahim Khalil, Dusit Niyato.

8.

Federated Unlearning in Edge Networks: A Survey of Fundamentals, Challenges, Practical Applications and Future Directions. Jer Shyuan Ng, Wathsara Daluwatta, Shehan Edirimannage, Charitha Elvitigala, Asitha Kottahachchi Kankanamge Don, Ibrahim Khalil, Heng Zhang, Dusit Niyato.

9.

WinFLoRA: Incentivizing Client-Adaptive Aggregation in Federated LoRA under Privacy Heterogeneity. Mengsha Kou, Xiaoyu Xia, Ziqi Wang, Ibrahim Khalil, Runkun Luo, Jingwen Zhou, Minhui Xue.

10.

Mind the Gap: Evaluating LLMs for High-Level Malicious Package Detection vs. Fine-Grained Indicator Identification. Ahmed Ryan, Ibrahim Khalil, Abdullah Al Jahid, Md Erfan, Sungbin Park, Akond Ashfaque Ur Rahman, Md. Rayhanur Rahman.

2025 19 publications +
1.

DT-FU: Digital Twin-Driven Federated Unlearning for Resilient Vehicular Networks in the 6G Era. Wathsara Daluwatta, Shehan Edirimannage, Charitha Elvitigala, Ibrahim Khalil, Mohammed Atiquzzaman.

2.

Remote sensing revolutionizing agriculture: Toward a new frontier. Xiaoding Wang, Haitao Zeng, Xu Yang, Jiwu Shu, Qibin Wu, Youxiong Que, Xuechao Yang, Xun Yi, Ibrahim Khalil, Albert Y. Zomaya.

3.

Edge Association Strategies for Synthetic Data Empowered Hierarchical Federated Learning With Non-IID Data. Jer Shyuan Ng, Aditya Pribadi Kalapaaking, Xiaoyu Xia, Dusit Niyato, Ibrahim Khalil, Iqbal Gondal.

4.

ZeTFRi - A Zero Trust-Based Free Rider Detection Framework for Next Generation Federated Learning Networks. Shehan Edirimannage, Ibrahim Khalil, Charitha Elvitigala, Wathsara Daluwatta, Primal Wijesekera, Albert Y. Zomaya.

5.

Toward LLM-Driven Adaptive Policy Orchestration for Host-Based Intrusion Detection Systems in IoT Environments. Binod Karunanayake, Ibrahim Khalil, Xun Yi, Kwok-Yan Lam.

6.

QRLaXAI: quantum representation learning and explainable AI. Asitha Kottahachchi Kankanamge Don, Ibrahim Khalil.

7.

Exploiting Gaussian Noise Variance for Dynamic Differential Poisoning in Federated Learning. Md Tamjid Hossain, Shahriar Badsha, Hung Manh La, Shafkat Islam, Ibrahim Khalil.

8.

HFedLMR: Personalized and Hierarchical Federated Learning for Consumer Healthcare IoT With Non-IID Data. Charitha Elvitigala, Ibrahim Khalil, Mohammed Atiquzzaman.

9.

Lightweight Privacy-Friendly Aggregation Scheme Against Internal Attacks for Smart Grids. Fei Zhu, Wei Wu, Alsharif Abuadbba, Saru Kumari, Xu Yang, Ibrahim Khalil, Xun Yi.

10.

Auditable and Verifiable Federated Learning Based on Blockchain-Enabled Decentralization. Aditya Pribadi Kalapaaking, Ibrahim Khalil, Xun Yi, Kwok-Yan Lam, Guang-Bin Huang, Ning Wang.

11.

UaaS-SFL: Unlearning as a Service for Safeguarding Federated Learning. Wathsara Daluwatta, Ibrahim Khalil, Shehan Edirimannage, Mohammed Atiquzzaman.

12.

Q-SupCon: Quantum-Enhanced Supervised Contrastive Learning Architecture within the Representation Learning Framework. Asitha Kottahachchi Kankanamge Don, Ibrahim Khalil.

13.

TurboCache: Empowering Switch-Accelerated Key-Value Caches with Accurate and Fast Cache Updates. Xiang Chen, Longlong Zhu, Linying Zheng, Lingfei Cheng, Jianshan Zhang, Xu Yang, Dong Zhang, Xuan Liu, Xiaoming Lu, Xun Yi, Ibrahim Khalil, Albert Y. Zomaya, Haifeng Zhou, Chunming Wu.

14.

Optimizing Energy Efficiency with QoE-Awareness in Multi-Access Edge Computing. Zongchao Xie, Xiaoyu Xia, Boyun Hu, Ibrahim Khalil, Ziqi Wang, Guangming Cui, Gang Xie, Minhui Xue.

15.

Edge Unlearning is Not "on Edge"! an Adaptive Exact Unlearning System on Resource-Constrained Devices. Xiaoyu Xia, Ziqi Wang, Ruoxi Sun, Bowen Liu, Ibrahim Khalil, Minhui Xue.

16.

Deep Contrastive Unlearning for Language Models. Estrid He, Tabinda Sarwar, Ibrahim Khalil, Xun Yi, Ke Wang.

17.

Edge Association Strategies for Synthetic Data Empowered Hierarchical Federated Learning with Non-IID Data. Jer Shyuan Ng, Aditya Pribadi Kalapaaking, Xiaoyu Xia, Dusit Niyato, Ibrahim Khalil, Iqbal Gondal.

18.

From Detection to Correction: Backdoor-Resilient Face Recognition via Vision-Language Trigger Detection and Noise-Based Neutralization. Farah Wahida, M. A. P. Chamikara, Yashothara Shanmugarasa, Mohan Baruwal Chhetri, Thilina Ranbaduge, Ibrahim Khalil.

19.

On numerical resolution of shape optimization bi-Laplacian eigenvalue problems. Abdelkrim Chakib, Ibrahim Khalil, Azeddine Sadik.

2024 11 publications +
1.

On some geometrical eigenvalue inverse problems involving the p-Laplacian operator. Abdelkrim Chakib, Ibrahim Khalil.

2.

An Adversarial Machine Learning Based Approach for Privacy Preserving Face Recognition in Distributed Smart City Surveillance. Farah Wahida, M. A. P. Chamikara, Ibrahim Khalil, Mohammed Atiquzzaman.

3.

On a numerical approach for solving some geometrical shape optimization problems in fluid mechanics. Abdelkrim Chakib, Ibrahim Khalil, Hamid Ouaissa, Azeddine Sadik.

4.

QARMA-FL: Quality-Aware Robust Model Aggregation for Mobile Crowdsourcing. Shehan Edirimannage, Charitha Elvitigala, Ibrahim Khalil, Primal Wijesekera, Xun Yi.

5.

An improved numerical approach for solving shape optimization problems on convex domains. Abdelkrim Chakib, Ibrahim Khalil, Azeddine Sadik.

6.

A Fusion of Supervised Contrastive Learning and Variational Quantum Classifiers. Asitha Kottahachchi Kankanamge Don, Ibrahim Khalil, Mohammed Atiquzzaman.

7.

DSFL: A Decentralized SplitFed Learning Approach for Healthcare Consumers in the Metaverse. Veronika Stephanie, Ibrahim Khalil, Mohammed Atiquzzaman.

8.

Automated Disaster Monitoring From Social Media Posts Using AI-Based Location Intelligence and Sentiment Analysis. Fahim K. Sufi, Ibrahim Khalil.

9.

Blockchain-Based Federated Learning With SMPC Model Verification Against Poisoning Attack for Healthcare Systems. Aditya Pribadi Kalapaaking, Ibrahim Khalil, Xun Yi.

10.

Towards Sustainable Trust: A Practical SGX Aided Anonymous Reputation System. Xu Yang, Xuechao Yang, Junwei Luo, Xun Yi, Ibrahim Khalil, Shangqi Lai, Wei Wu, Albert Y. Zomaya.

11.

GEES: Enabling Location Privacy-Preserving Energy Saving in Multi-Access Edge Computing. Ziqi Wang, Xiaoyu Xia, Minhui Xue, Ibrahim Khalil, Minghui Liwang, Xun Yi.

2023 19 publications +
1.

Intrusion Detection-Based Ensemble Learning and Microservices for Zero Touch Networks. Neda Bugshan, Ibrahim Khalil, Aditya Pribadi Kalapaaking, Mohammed Atiquzzaman.

2.

A new numerical approach for solving shape optimization fourth-order spectral problems among convex domains. Abdelkrim Chakib, Ibrahim Khalil.

3.

ECG compression technique using fast fractals in the Internet of medical things. Ayman Ibaida, Sharif Abuadbba, Dhiah Al-Shammary, Ibrahim Khalil.

4.

Privacy-Preserving Microservices in Industrial Internet-of-Things-Driven Smart Applications. Neda Bugshan, Ibrahim Khalil, Nour Moustafa, Mohammad Saidur Rahman.

5.

Privacy-Preserving Ensemble Infused Enhanced Deep Neural Network Framework for Edge Cloud Convergence. Veronika Stephanie, Ibrahim Khalil, Mohammad Saidur Rahman, Mohammed Atiquzzaman.

6.

A Triggerless Backdoor Attack and Defense Mechanism for Intelligent Task Offloading in Multi-UAV Systems. Shafkat Islam, Shahriar Badsha, Ibrahim Khalil, Mohammed Atiquzzaman, Charalambos Konstantinou.

7.

Blockchain-Based AI-Enabled Industry 4.0 CPS Protection Against Advanced Persistent Threat. Ziaur Rahman, Xun Yi, Ibrahim Khalil.

8.

Blockchain-Enabled and Multisignature-Powered Verifiable Model for Securing Federated Learning Systems. Aditya Pribadi Kalapaaking, Ibrahim Khalil, Mohammed Atiquzzaman.

9.

Digital Twin Enabled Asynchronous SplitFed Learning in E-Healthcare Systems. Veronika Stephanie, Ibrahim Khalil, Mohammed Atiquzzaman.

10.

On an effective approach in shape optimization problem for Stokes equation. Abdelkrim Chakib, Ibrahim Khalil, Hamid Ouaissa, Azeddine Sadik.

11.

An Intelligent Privacy Preservation Scheme for EV Charging Infrastructure. Shafkat Islam, Shahriar Badsha, Shamik Sengupta, Ibrahim Khalil, Mohammed Atiquzzaman.

12.

Toward Trustworthy and Privacy-Preserving Federated Deep Learning Service Framework for Industrial Internet of Things. Neda Bugshan, Ibrahim Khalil, Mohammad Saidur Rahman, Mohammed Atiquzzaman, Xun Yi, Shahriar Badsha.

13.

Blockchain-Based Federated Learning With Secure Aggregation in Trusted Execution Environment for Internet-of-Things. Aditya Pribadi Kalapaaking, Ibrahim Khalil, Mohammad Saidur Rahman, Mohammed Atiquzzaman, Xun Yi, Mahathir Almashor.

14.

Trustworthy Privacy-Preserving Hierarchical Ensemble and Federated Learning in Healthcare 4.0 With Blockchain. Veronika Stephanie, Ibrahim Khalil, Mohammed Atiquzzaman, Xun Yi.

15.

A Security-Enhanced Certificateless Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks. Fei Zhu, Xun Yi, Alsharif Abuadbba, Ibrahim Khalil, Xinyi Huang, Feihong Xu.

16.

Smart Policy Control for Securing Federated Learning Management System. Aditya Pribadi Kalapaaking, Ibrahim Khalil, Mohammed Atiquzzaman.

17.

AI-Enabled Secure Microservices in Edge Computing: Opportunities and Challenges. Firas Al-Doghman, Nour Moustafa, Ibrahim Khalil, Nasrin Sohrabi, Zahir Tari, Albert Y. Zomaya.

18.

Authenticated Data Sharing With Privacy Protection and Batch Verification for Healthcare IoT. Fei Zhu, Xun Yi, Alsharif Abuadbba, Ibrahim Khalil, Surya Nepal, Xinyi Huang.

19.

Blockchain-Based and Fuzzy Logic-Enabled False Data Discovery for the Intelligent Autonomous Vehicular System. Ziaur Rahman, Xun Yi, Ibrahim Khalil, Adnan Anwar, Shantanu Pal.

2022 15 publications +
1.

Forward-Secure Edge Authentication for Graphs. Fei Zhu, Xun Yi, Alsharif Abuadbba, Ibrahim Khalil, Surya Nepal, Xinyi Huang.

2.

Privacy Aware Internet of Medical Things Data Certification Framework on Healthcare Blockchain of 5G Edge. Mohammad Saidur Rahman, Abdulatif Alabdulatif, Ibrahim Khalil.

3.

Social Media Identity Deception Detection: A Survey. Ahmed Alharbi, Hai Dong, Xun Yi, Zahir Tari, Ibrahim Khalil.

4.

Radial Basis Function Network with Differential Privacy. Neda Bugshan, Ibrahim Khalil, Nour Moustafa, Mahathir Almashor, Alsharif Abuadbba.

5.

Blockchain-Based Secure and Lightweight Authentication for Internet of Things. Xu Yang, Xuechao Yang, Xun Yi, Ibrahim Khalil, Xiaotong Zhou, Debiao He, Xinyi Huang, Surya Nepal.

6.

Certificate-Based Anonymous Authentication With Efficient Aggregation for Wireless Medical Sensor Networks. Fei Zhu, Xun Yi, Alsharif Abuadbba, Ibrahim Khalil, Surya Nepal, Xinyi Huang, Xingfu Yan.

7.

Secure and Lightweight Authentication for Mobile-Edge Computing-Enabled WBANs. Xu Yang, Xun Yi, Ibrahim Khalil, Junwei Luo, Elisa Bertino, Surya Nepal, Xinyi Huang.

8.

Privacy-preserving location data stream clustering on mobile edge computing and cloud. Veronika Stephanie, M. A. P. Chamikara, Ibrahim Khalil, Mohammed Atiquzzaman.

9.

Blockchain-of-blockchains: An interoperable blockchain platform for ensuring IoT data integrity in smart city. Mohammad Saidur Rahman, M. A. P. Chamikara, Ibrahim Khalil, Abdelaziz Bouras.

10.

SMPC-Based Federated Learning for 6G-Enabled Internet of Medical Things. Aditya Pribadi Kalapaaking, Veronika Stephanie, Ibrahim Khalil, Mohammed Atiquzzaman, Xun Yi, Mahathir Almashor.

11.

A Blockchain-Enabled Privacy-Preserving Verifiable Query Framework for Securing Cloud-Assisted Industrial Internet of Things Systems. Mohammad Saidur Rahman, Ibrahim Khalil, Nour Moustafa, Aditya Pribadi Kalapaaking, Abdelaziz Bouras.

12.

A Lossless Data-Hiding based IoT Data Authenticity Model in Edge-AI for Connected Living. Mohammad Saidur Rahman, Ibrahim Khalil, Xun Yi, Mohammed Atiquzzaman, Elisa Bertino.

13.

Efficient and Anonymous Authentication for Healthcare Service With Cloud Based WBANs. Xu Yang, Xun Yi, Surya Nepal, Ibrahim Khalil, Xinyi Huang, Jian Shen.

14.

Local Differential Privacy for Federated Learning. Mahawaga Arachchige Pathum Chamikara, Dongxi Liu, Seyit Camtepe, Surya Nepal, Marthie Grobler, Peter Bert�k, Ibrahim Khalil.

15.

Blockchain-Based Access Control for Secure Smart Industry Management Systems. Aditya Pribadi Kalapaaking, Ibrahim Khalil, Mohammad Saidur Rahman, Abdelaziz Bouras.

2021 21 publications +
1.

Reputation-Based Miner Node Selection in Blockchain-Based Vehicular Edge Computing. Shirshak Raja Maskey, Shahriar Badsha, Shamik Sengupta, Ibrahim Khalil.

2.

Blockchain-Based Security Framework for a Critical Industry 4.0 Cyber-Physical System. Ziaur Rahman, Ibrahim Khalil, Xun Yi, Mohammed Atiquzzaman.

3.

Privacy preserving distributed machine learning with federated learning. Mahawaga Arachchige Pathum Chamikara, Peter Bert�k, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe.

4.

EdgeSOM: Distributed Hierarchical Edge-driven IoT Data Analytics Framework. Kassem Bagher, Ibrahim Khalil, Abdulatif Alabdulatif, Mohammed Atiquzzaman.

5.

PPaaS: Privacy Preservation as a Service. Mahawaga Arachchige Pathum Chamikara, Peter Bert�k, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe.

6.

Cost-Effective Authenticated Data Redaction With Privacy Protection in IoT. Fei Zhu, Xun Yi, Alsharif Abuadbba, Ibrahim Khalil, Surya Nepal, Xinyi Huang.

7.

ALICIA: Applied Intelligence in blockchain based VANET: Accident Validation as a Case Study. Shirshak Raja Maskey, Shahriar Badsha, Shamik Sengupta, Ibrahim Khalil.

8.

Towards secure and practical consensus for blockchain based VANET. Sowmya Kudva, Shahriar Badsha, Shamik Sengupta, Ibrahim Khalil, Albert Y. Zomaya.

9.

A scalable blockchain based trust management in VANET routing protocol. Sowmya Kudva, Shahriar Badsha, Shamik Sengupta, Hung Manh La, Ibrahim Khalil, Mohammed Atiquzzaman.

10.

Blockchain-Powered Policy Enforcement for Ensuring Flight Compliance in Drone-Based Service Systems. Mohammad Saidur Rahman, Ibrahim Khalil, Mohammed Atiquzzaman.

11.

Blockchain-Enabled Intelligent Vehicular Edge Computing. Shafkat Islam, Shahriar Badsha, Shamik Sengupta, Hung M. La, Ibrahim Khalil, Mohammed Atiquzzaman.

12.

Blockchain-Enabled SLA Compliance for Crowdsourced Edge-Based Network Function Virtualization. Mohammad Saidur Rahman, Ibrahim Khalil, Mohammed Atiquzzaman.

13.

Reversible Biosignal Steganography Approach for Authenticating Biosignals Using Extended Binary Golay Code. Mohammad Saidur Rahman, Ibrahim Khalil, Xun Yi.

14.

Privacy Preserving Location-Aware Personalized Web Service Recommendations. Shahriar Badsha, Xun Yi, Ibrahim Khalil, Dongxi Liu, Surya Nepal, Elisa Bertino, Kwok-Yan Lam.

15.

An Integrated Framework for Privacy-Preserving Based Anomaly Detection for Cyber-Physical Systems. Marwa Keshk, Elena Sitnikova, Nour Moustafa, Jiankun Hu, Ibrahim Khalil.

16.

A Framework for Modelling Blockchain based Supply Chain Management System to ensure soundness of Smart Contract Workflow. Mohammad Saidur Rahman, Ibrahim Khalil, Abdelaziz Bouras.

17.

Blockchain-Based Manufacturing Supply Chain Management Using HyperLedger Fabric. Houssem Gasmi, Abdelhak Belhi, Assam Hammi, Abdelaziz Bouras, Bela�d Aouni, Ibrahim Khalil.

18.

A Broker-Based Manufacturing Supply Chain Integration with Blockchain: Managing Odoo Workflows Using Hyperledger Fabric Smart Contracts. Abdelhak Belhi, Houssem Gasmi, Assam Hammi, Abdelaziz Bouras, Bela�d Aouni, Ibrahim Khalil.

19.

Blockchain for IoT: A Critical Analysis Concerning Performance and Scalability. Ziaur Rahman, Xun Yi, Ibrahim Khalil, Andrei Kelarev.

20.

Chaos and Logistic Map Based Key Generation Technique for AES-Driven IoT Security. Ziaur Rahman, Xun Yi, Ibrahim Khalil, Mousumi Akter Sumi.

21.

Efficient and Anonymous Authentication for Healthcare Service With Cloud Based WBANs. Xu Yang, Xun Yi, Surya Nepal, Ibrahim Khalil, Xinyi Huang, Jian Shen.

2020 14 publications +
1.

An intelligent healthcare system with data priority based on multi vital biosignals. Rongjun Xie, Ibrahim Khalil, Shahriar Badsha, Mohammed Atiquzzaman.

2.

Patient clustering using dynamic partitioning on correlated and uncertain biomedical data. Abdur Rahim Mohammad Forkan, Ibrahim Khalil, Heshan Kumarage.

3.

Privacy Preserving Face Recognition Utilizing Differential Privacy. Mahawaga Arachchige Pathum Chamikara, Peter Bert�k, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe.

4.

Towards privacy preserving AI based composition framework in edge networks using fully homomorphic encryption. Mohammad Saidur Rahman, Ibrahim Khalil, Mohammed Atiquzzaman, Xun Yi.

5.

Local Differential Privacy for Deep Learning. Mahawaga Arachchige Pathum Chamikara, Peter Bert�k, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe, Mohammed Atiquzzaman.

6.

Efficient privacy preservation of big data for accurate data mining. Mahawaga Arachchige Pathum Chamikara, Peter Bert�k, Dongxi Liu, Seyit Ahmet �amtepe, Ibrahim Khalil.

7.

Lightweight privacy preservation for secondary users in cognitive radio networks. Yali Zeng, Li Xu, Xu Yang, Xun Yi, Ibrahim Khalil.

8.

Towards secure big data analytic for cloud-enabled applications with fully homomorphic encryption. Abdulatif Alabdulatif, Ibrahim Khalil, Xun Yi.

9.

A Trustworthy Privacy Preserving Framework for Machine Learning in Industrial IoT Systems. Mahawaga Arachchige Pathum Chamikara, Peter Bert�k, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe, Mohammed Atiquzzaman.

10.

Fully Homomorphic based Privacy-Preserving Distributed Expectation Maximization on Cloud. Abdulatif Alabdulatif, Ibrahim Khalil, Albert Y. Zomaya, Zahir Tari, Xun Yi.

11.

BACC: Blockchain-Based Access Control For Cloud Data. Nasrin Sohrabi, Xun Yi, Zahir Tari, Ibrahim Khalil.

12.

BITS: Blockchain based Intelligent Transportation System with Outlier Detection for Smart City. Shirshak Raja Maskey, Shahriar Badsha, Shamik Sengupta, Ibrahim Khalil.

13.

Privacy-Preserving Authentication for Tree-Structured Data with Designated Verification in Outsourced Environments. Fei Zhu, Xun Yi, Sharif Abuadbba, Ibrahim Khalil, Xu Yang, Surya Nepal, Xinyi Huang.

14.

Formalizing Dynamic Behaviors of Smart Contract Workflow in Smart Healthcare Supply Chain. Mohammad Saidur Rahman, Ibrahim Khalil, Abdelaziz Bouras.

2010 – 2019 119 publications +
1.

Secure Edge of Things for Smart Healthcare Surveillance Framework. Abdulatif Alabdulatif, Ibrahim Khalil, Xun Yi, Mohsen Guizani.

2.

Real-time Secure Health Surveillance for Smarter Health Communities. Abdulatif Alabdulatif, Ibrahim Khalil, Abdur Rahim Mohammad Forkan, Mohammed Atiquzzaman.

3.

Collaborative extreme learning machine with a confidence interval for P2P learning in healthcare. Rongjun Xie, Ibrahim Khalil, Shahriar Badsha, Mohammed Atiquzzaman.

4.

An efficient and scalable privacy preserving algorithm for big data and data streams. Mahawaga Arachchige Pathum Chamikara, Peter Bert�k, Dongxi Liu, Seyit Ahmet �amtepe, Ibrahim Khalil.

5.

A new privacy-preserving authentication protocol for anonymous web browsing. Xu Yang, Xun Yi, Ibrahim Khalil, Hui Cui, Xuechao Yang, Surya Nepal, Xinyi Huang, Yali Zeng.

6.

A lossless DNA data hiding approach for data authenticity in mobile cloud based healthcare systems. Mohammad Saidur Rahman, Ibrahim Khalil, Xun Yi.

7.

Privacy-preserving aggregation for cooperative spectrum sensing. Yali Zeng, Li Xu, Xu Yang, Xun Yi, Ibrahim Khalil.

8.

Privacy-preserving anomaly detection in the cloud for quality assured decision-making in smart cities. Abdulatif Alabdulatif, Ibrahim Khalil, Heshan Kumarage, Albert Y. Zomaya, Xun Yi.

9.

Efficient threshold password-authenticated secret sharing protocols for cloud computing. Xun Yi, Zahir Tari, Feng Hao, Liqun Chen, Joseph K. Liu, Xuechao Yang, Kwok-Yan Lam, Ibrahim Khalil, Albert Y. Zomaya.

10.

Privacy preserving service selection using fully homomorphic encryption scheme on untrusted cloud service platform. Mohammad Saidur Rahman, Ibrahim Khalil, Abdulatif Alabdulatif, Xun Yi.

11.

A lightweight authentication scheme for vehicular ad hoc networks based on MSR. Xu Yang, Xun Yi, Ibrahim Khalil, Yali Zeng, Xinyi Huang, Surya Nepal, Xuechao Yang, Hui Cui.

12.

A Novel Architecture for Tamper Proof Electronic Health Record Management System using Blockchain Wrapper. Mohammad Saidur Rahman, Ibrahim Khalil, Mahawaga Arachchige Pathum Chamikara, Abdelaziz Bouras, Xun Yi.

13.

A Novel Privacy Preserving Search Technique for Stego Data in Untrusted Cloud. Mohammad Saidur Rahman, Ibrahim Khalil, Xun Yi, Tao Gu.

14.

ADS4all: Democratizing Authenticated Data Structures. Nasser Alzahrani, Ibrahim Khalil, Xun Yi.

15.

Designing Privacy-Preserving Protocols for Content Sharing and Aggregation in Content Centric Networking. Shahriar Badsha, Ibrahim Khalil, Xun Yi, Mohammed Atiquzzaman.

16.

Privacy Preserving User Based Web Service Recommendations. Shahriar Badsha, Xun Yi, Ibrahim Khalil, Dongxi Liu, Surya Nepal, Kwok-Yan Lam.

17.

Determining Anxiety in Obsessive Compulsive Disorder through Behavioural Clustering and Variations in Repetition Intensity. Conor Cameron, Ibrahim Khalil, David Castle.

18.

Fast and peer-to-peer vital signal learning system for cloud-based healthcare. Rongjun Xie, Ibrahim Khalil, Shahriar Badsha, Mohammed Atiquzzaman.

19.

Efficient data perturbation for privacy preserving and accurate data stream mining. Mahawaga Arachchige Pathum Chamikara, Peter Bert�k, Dongxi Liu, Seyit Camtepe, Ibrahim Khalil.

20.

Gaussian Approximation-Based Lossless Compression of Smart Meter Readings. Alsharif Abuadbba, Ibrahim Khalil, Xinghuo Yu.

21.

GazeRevealer: Inferring Password Using Smartphone Front Camera. Yao Wang, Wan-Dong Cai, Tao Gu, Wei Shao, Ibrahim Khalil, Xianghua Xu.

22.

An Improved Lightweight RFID Authentication Protocol for Internet of Things. Xu Yang, Xun Yi, Yali Zeng, Ibrahim Khalil, Xinyi Huang, Surya Nepal.

23.

Reliable delay-sensitive spectrum handoff management for re-entrant secondary users. Uthpala Subodhani Premarathne, Ibrahim Khalil, Mohammed Atiquzzaman.

24.

A clinical decision-making mechanism for context-aware and patient-specific remote monitoring systems using the correlations of multiple vital signs. Abdur Rahim Mohammad Forkan, Ibrahim Khalil.

25.

ViSiBiD: A learning model for early discovery and real-time prediction of severe clinical events using vital signs as big data. Abdur Rahim Mohammad Forkan, Ibrahim Khalil, Mohammed Atiquzzaman.

26.

Design and implementation of a secure cloud-based billing model for smart meters as an Internet of things using homomorphic cryptography. Vu Mai, Ibrahim Khalil.

27.

Privacy-preserving cloud-based billing with lightweight homomorphic encryption for sensor-enabled smart grid infrastructure. Abdulatif Alabdulatif, Heshan Kumarage, Ibrahim Khalil, Mohammed Atiquzzaman, Xun Yi.

28.

Privacy-preserving anomaly detection in cloud with lightweight homomorphic encryption. Abdulatif Alabdulatif, Heshan Kumarage, Ibrahim Khalil, Xun Yi.

29.

PEACE-Home: Probabilistic estimation of abnormal clinical events using vital sign correlations for reliable home-based monitoring. Abdur Rahim Mohammad Forkan, Ibrahim Khalil.

30.

Walsh-Hadamard-Based 3-D Steganography for Protecting Sensitive Information in Point-of-Care. Alsharif Abuadbba, Ibrahim Khalil.

31.

Cloud-Based Utility Service Framework for Trust Negotiations Using Federated Identity Management. Uthpala Subodhani Premarathne, Ibrahim Khalil, Zahir Tari, Albert Y. Zomaya.

32.

BDCaM: Big Data for Context-Aware Monitoring - A Personalized Knowledge Discovery Framework for Assisted Healthcare. Abdur Rahim Mohammad Forkan, Ibrahim Khalil, Ayman Ibaida, Zahir Tari.

33.

Privacy Preserving User-Based Recommender System. Shahriar Badsha, Xun Yi, Ibrahim Khalil, Elisa Bertino.

34.

Private Recommendations Generation for Vertically Partitioned Datasets. Shahriar Badsha, Xun Yi, Ibrahim Khalil, Andrei Kelarev.

35.

Highly Imperceptible and Reversible Text Steganography Using Invisible Character based Codeword. Mohammad Saidur Rahman, Ibrahim Khalil, Xun Yi, Hai Dong.

36.

Privacy-preserving Data clustering in Cloud Computing based on Fully Homomorphic Encryption. Abdulatif Alabdulatif, Ibrahim Khalil, Mark C. Reynolds, Heshan Kumarage, Xun Yi.

37.

Privacy Preserving Location Recommendations. Shahriar Badsha, Xun Yi, Ibrahim Khalil, Dongxi Liu, Surya Nepal, Elisa Bertino.

38.

Trust based reliable transmissions strategies for smart home energy consumption management in cognitive radio based smart grid. Uthpala Subodhani Premarathne, Ibrahim Khalil, Mohammed Atiquzzaman.

39.

Resilient to shared spectrum noise scheme for protecting cognitive radio smart grid readings - BCH based steganographic approach. Alsharif Abuadbba, Ibrahim Khalil, Ayman Ibaida, Mohammed Atiquzzaman.

40.

Secure Data Analytics for Cloud-Integrated Internet of Things Applications. Heshan Kumarage, Ibrahim Khalil, Abdulatif Alabdulatif, Zahir Tari, Xun Yi.

41.

Hybrid Cryptographic Access Control for Cloud-Based EHR Systems. Uthpala Subodhani Premarathne, Alsharif Abuadbba, Abdulatif Alabdulatif, Ibrahim Khalil, Zahir Tari, Albert Y. Zomaya, Rajkumar Buyya.

42.

A Practical Privacy-Preserving Recommender System. Shahriar Badsha, Xun Yi, Ibrahim Khalil.

43.

ID2S Password-Authenticated Key Exchange Protocols. Xun Yi, Fang-Yu Rao, Zahir Tari, Feng Hao, Elisa Bertino, Ibrahim Khalil, Albert Y. Zomaya.

44.

A Novel Congestion Avoidance Technique for Simultaneous Real-Time Medical Data Transmission. Naimah Yaakob, Ibrahim Khalil.

45.

kNNVWC: An Efficient k-Nearest Neighbors Approach Based on Various-Widths Clustering. Abdul Mohsen Almalawi, Adil Fahad, Zahir Tari, Muhammad Aamir Cheema, Ibrahim Khalil.

46.

Distributed collision control with the integration of packet size for congestion control in wireless sensor networks. Naimah Yaakob, Ibrahim Khalil, Mohammed Atiquzzaman, Ibrahim Habib, Jiankun Hu.

47.

kNNVWC: An efficient k-nearest neighbours approach based on Various-Widths Clustering. Abdulmohsen Almalawi, Adil Fahad, Zahir Tari, Muhammad Aamir Cheema, Ibrahim Khalil.

48.

Securing Body Sensor Network with ECG. Xuechao Yang, Xun Yi, Ibrahim Khalil, Fengling Han, Zahir Tari.

49.

A probabilistic model for early prediction of abnormal clinical events using vital sign correlations in home-based monitoring. Abdur Rahim Mohammad Forkan, Ibrahim Khalil.

50.

Security and Privacy in Cloud Computing: Vision, Trends, and Challenges. Zahir Tari, Xun Yi, Uthpala Subodhani Premarathne, Peter Bert�k, Ibrahim Khalil.

51.

Location-dependent disclosure risk based decision support framework for persistent authentication in pervasive computing applications. Uthpala Subodhani Premarathne, Ibrahim Khalil, Mohammed Atiquzzaman.

52.

Multi-Binomial mixes: A proposal for secure and efficient anonymous communication. Shaahin Madani, Ibrahim Khalil.

53.

Multi-objective optimisation for selective packet discarding in wireless sensor network. Naimah Yaakob, Ibrahim Khalil, Mohammed Atiquzzaman.

54.

Wavelet based steganographic technique to protect household confidential information and seal the transmitted smart grid readings. Alsharif Abuadbba, Ibrahim Khalil.

55.

Secure and reliable surveillance over cognitive radio sensor networks in smart grid. Uthpala Subodhani Premarathne, Ibrahim Khalil, Mohammed Atiquzzaman.

56.

Robust privacy preservation and authenticity of the collected data in cognitive radio network - Walsh-Hadamard based steganographic approach. Alsharif Abuadbba, Ibrahim Khalil, Mohammed Atiquzzaman.

57.

A context-aware approach for long-term behavioural change detection and abnormality prediction in ambient assisted living. Abdur Rahim Mohammad Forkan, Ibrahim Khalil, Zahir Tari, Sebti Foufou, Abdelaziz Bouras.

58.

By-Passing Infected Areas in Wireless Sensor Networks Using BPR. Naimah Yaakob, Ibrahim Khalil, Heshan Kumarage, Mohammed Atiquzzaman, Zahir Tari.

59.

Granular Evaluation of Anomalies in Wireless Sensor Networks Using Dynamic Data Partitioning with an Entropy Criteria. Heshan Kumarage, Ibrahim Khalil, Zahir Tari.

60.

Enhancing Availability in Content Delivery Networks for Mobile Platforms. Mahathir Almashor, Ibrahim Khalil, Zahir Tari, Albert Y. Zomaya, Sartaj Sahni.

61.

Cooperative Web Caching Using Dynamic Interest-Tagged Filtered Bloom Filters. Holly Alexander, Ibrahim Khalil, Conor Cameron, Zahir Tari, Albert Y. Zomaya.

62.

Securing Big Data Applications in the Cloud [Guest editors' introduction]. Bharat K. Bhargava, Ibrahim Khalil, Ravi S. Sandhu.

63.

Load-sensitive dynamic workflow re-orchestration and optimisation for faster patient healthcare. Christopher L. Meli, Ibrahim Khalil, Zahir Tari.

64.

An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems. Abdulmohsen Almalawi, Xinghuo Yu, Zahir Tari, Adil Fahad, Ibrahim Khalil.

65.

Cloud enabled fractal based ECG compression in wireless body sensor networks. Ayman Ibaida, Dhiah Al-Shammary, Ibrahim Khalil.

66.

CoCaMAAL: A cloud-oriented context-aware middleware in ambient assisted living. Abdur Forkan, Ibrahim Khalil, Zahir Tari.

67.

An optimal and stable feature selection approach for traffic classification based on multi-criterion fusion. Adil Fahad, Zahir Tari, Ibrahim Khalil, Abdulmohsen Almalawi, Albert Y. Zomaya.

68.

PPFSCADA: Privacy preserving framework for SCADA data publishing. Adil Fahad, Zahir Tari, Abdulmohsen Almalawi, Andrzej Goscinski, Ibrahim Khalil, Abdun Naser Mahmood.

69.

Data summarization for network traffic monitoring. Demetris Hoplaros, Zahir Tari, Ibrahim Khalil.

70.

An ID-based approach to the caching and distribution of peer-to-peer, proxy-based video content. Conor Cameron, Ibrahim Khalil, Zahir Tari.

71.

PileCast: Multiple bit rate live video streaming over BitTorrent. Aukrit Chadagorn, Ibrahim Khalil, Conor Cameron, Zahir Tari.

72.

A distributed aggregation and fast fractal clustering approach for SOAP traffic. Dhiah Al-Shammary, Ibrahim Khalil, Zahir Tari.

73.

Accurate positioning using long range active RFID technology to assist visually impaired people. Saleh Alghamdi, Ron G. van Schyndel, Ibrahim Khalil.

74.

Data mining in mobile ECG based biometric identification. Khairul Azami Sidek, Vu Mai, Ibrahim Khalil.

75.

Garbled Routing (GR): A generic framework towards unification of anonymous communication systems. Shaahin Madani, Ibrahim Khalil.

76.

A Survey of Clustering Algorithms for Big Data: Taxonomy and Empirical Analysis. Adil Fahad, Najlaa Alshatri, Zahir Tari, Abdullah Alamri, Ibrahim Khalil, Albert Y. Zomaya, Sebti Foufou, Abdelaziz Bouras.

77.

ECG Biometric with Abnormal Cardiac Conditions in Remote Monitoring System. Khairul Azami Sidek, Ibrahim Khalil, Herbert F. Jelinek.

78.

CluClas: Hybrid clustering-classification approach for accurate and efficient network classification. Adil Fahad, Kurayman Alharthi, Zahir Tari, Abdulmohsen Almalawi, Ibrahim Khalil.

79.

Multiplicative Attributes Graph Approach for Persistent Authentication in Single-Sign-On Mobile Systems. Uthpala Subodhani Premarathne, Ibrahim Khalil.

80.

Enhancement of low sampling frequency recordings for ECG biometric matching using interpolation. Khairul Azami Sidek, Ibrahim Khalil.

81.

Toward an efficient and scalable feature selection approach for internet traffic classification. Adil Fahad, Zahir Tari, Ibrahim Khalil, Ibrahim Habib, Hussein M. Alnuweiri.

82.

Fractal self-similarity measurements based clustering technique for SOAP Web messages. Dhiah Al-Shammary, Ibrahim Khalil, Zahir Tari, Albert Y. Zomaya.

83.

Distributed anomaly detection for industrial wireless sensor networks based on fuzzy data modelling. Heshan Kumarage, Ibrahim Khalil, Zahir Tari, Albert Y. Zomaya.

84.

Automatic and Autonomous Load Management in Peer-to-Peer Virtual Environments. Mahathir Almashor, Ibrahim Khalil, Zahir Tari, Albert Y. Zomaya.

85.

Wavelet-Based ECG Steganography for Protecting Patient Confidential Information in Point-of-Care Systems. Ayman Ibaida, Ibrahim Khalil.

86.

Context-aware Cardiac Monitoring for Early Detection of Heart Diseases. Abdur Rahim Mohammad Forkan, Ibrahim Khalil, Zahir Tari.

87.

Preference based load balancing as an outpatient appointment scheduling aid. Uthpala Subodhani Premarathne, Fengling Han, Ibrahim Khalil, Zahir Tari.

88.

Steganography-based access control to medical data hidden in electrocardiogram. Vu Mai, Ibrahim Khalil, Ayman Ibaida.

89.

Protection of electronic health records (EHRs) in cloud. Abdulatif Alabdulatif, Ibrahim Khalil, Vu Mai.

90.

SCADAVT-A framework for SCADA security testbed based on virtualization technology. Abdulmohsen Almalawi, Zahir Tari, Ibrahim Khalil, Adil Fahad.

91.

Turbo-coded HARQ scheme in multi-hop cooperative wireless networks. Ibrahim Khalil, Adnan Ahmed Khan.

92.

Garbled Routing (GR): Towards Unification of Anonymous Networks. Shaahin Madani, Ibrahim Khalil.

93.

A Framework for Improving the Accuracy of Unsupervised Intrusion Detection for SCADA Systems. Abdulmohsen Almalawi, Zahir Tari, Adil Fahad, Ibrahim Khalil.

94.

Fully peer-to-peer virtual environments with 3D Voronoi diagrams. Mahathir Almashor, Ibrahim Khalil.

95.

Redundancy-aware SOAP messages compression and aggregation for enhanced performance. Dhiah Al-Shammary, Ibrahim Khalil.

96.

Biometric sample extraction using Mahalanobis distance in Cardioid based graph using electrocardiogram signals. Khairul Azami Sidek, Ibrahim Khalil.

97.

Safe trajectory estimation at a pedestrian crossing to assist visually impaired people. Saleh Alghamdi, Ron G. van Schyndel, Ibrahim Khalil.

98.

A clustering based system for instant detection of cardiac abnormalities from compressed ECG. Fahim K. Sufi, Ibrahim Khalil, Abdun Naser Mahmood.

99.

Compressed ECG Biometric: A Fast, Secured and Efficient Method for Identification of CVD Patient. Fahim K. Sufi, Ibrahim Khalil, Abdun Naser Mahmood.

100.

Faster person identification using compressed ECG in time critical wireless telecardiology applications. Fahim K. Sufi, Ibrahim Khalil.

101.

Seamless integration of dependability and security concepts in SOA: A feedback control system based framework and taxonomy. Jiankun Hu, Ibrahim Khalil, Song Han, Abdun Naser Mahmood.

102.

A chaos-based encryption technique to protect ECG packets for time critical telecardiology applications. Fahim K. Sufi, Fengling Han, Ibrahim Khalil, Jiankun Hu.

103.

An embedded DSP hardware encryption module for secure e-commerce transactions. Jiankun Hu, Xuan Dau Hoang, Ibrahim Khalil.

104.

Cardioids-based faster authentication and diagnosis of remote cardiovascular patients. Fahim K. Sufi, Ibrahim Khalil, Ibrahim Habib.

105.

Diagnosis of Cardiovascular Abnormalities From Compressed ECG: A Data Mining-Based Approach. Fahim K. Sufi, Ibrahim Khalil.

106.

Dynamic Fractal Clustering Technique for SOAP Web Messages. Dhiah Al-Shammary, Ibrahim Khalil.

107.

ECG biometric using multilayer perceptron and radial basis function neural networks. Vu Mai, Ibrahim Khalil, Christopher L. Meli.

108.

Person identification in irregular cardiac conditions using electrocardiogram signals. Khairul Azami Sidek, Ibrahim Khalil.

109.

Real-time wearable telecardiology from representative signals. Christopher L. Meli, George Fernandez, Ibrahim Khalil.

110.

Turbo-Coded HARQ with Switchable Relaying Mechanism in Single Hop Cooperative Wireless System. Ibrahim Khalil, Adnan Ahmed Khan, Zohaib-Ur-Rehman.

111.

On the Effectiveness of Relaxation Theory for Controlling High Traffic Volumes in Body Sensor Networks. Naimah Yaakob, Ibrahim Khalil, Jiankun Hu.

112.

Timely Arbitrator Selection in P2P Virtual Environments with 3D Voronoi Diagrams. Mahathir Almashor, Ibrahim Khalil.

113.

Clustering SOAP Web Services on Internet Computing Using Fast Fractals. Dhiah Al-Shammary, Ibrahim Khalil, Loay Edwar George.

114.

Polynomial distance measurement for ECG based biometric authentication. Fahim K. Sufi, Ibrahim Khalil, Ibrahim Habib.

115.

Reducing network load in large-scale, Peer-to-Peer Virtual Environments with 3D Voronoi Diagrams. Mahathir Almashor, Ibrahim Khalil.

116.

Load-Balancing Properties of 3D Voronoi Diagrams in Peer-to-Peer Virtual Environments. Mahathir Almashor, Ibrahim Khalil.

117.

SOAP Web Services Compression Using Variable and Fixed Length Coding. Dhiah Al-Shammary, Ibrahim Khalil.

118.

Performance Analysis of Optimal Packet Size for Congestion Control in Wireless Sensor Networks. Naimah Yaakob, Ibrahim Khalil, Jiankun Hu.

119.

Dynamic Game-Play Arbitrators with 3D Voronoi Diagrams. Mahathir Almashor, Ibrahim Khalil, Geoff Leach.

< 2010 25 publications +
1.

A New Feature Detection Mechanism and Its Application in Secured ECG Transmission with Noise Masking. Fahim K. Sufi, Ibrahim Khalil.

2.

Cooperative Remote Video Consultation on Demand for e-Patients. Ibrahim Khalil, Fahim K. Sufi.

3.

Novel methods of faster cardiovascular diagnosis in wireless telecardiology. Fahim K. Sufi, Qiang Fang, Ibrahim Khalil, Seedahmed S. Mahmoud.

4.

A novel wavelet packet-based anti-spoofing technique to secure ECG data. Fahim K. Sufi, Seedahmed S. Mahmoud, Ibrahim Khalil.

5.

Enforcing secured ECG transmission for realtime telemonitoring: A joint encoding, compression, encryption mechanism. Fahim K. Sufi, Ibrahim Khalil.

6.

QoS-aware Application Layer Multicast. Bin Rong, Ibrahim Khalil, Zahir Tari.

7.

An End-Systems Supported Highly Distributed Content Delivery Network. Jaison Paul Mulerikkal, Ibrahim Khalil.

8.

An Architecture for Distributed Content Delivery Network. Jaison Paul Mulerikkal, Ibrahim Khalil.

9.

Efficient Proxy Selection in Cooperative Web Caching. Ibrahim Khalil, Ge PeiQi.

10.

Probabilistic QoS Routing inWiFi P2P Networks. Sathish Rajasekhar, Ibrahim Khalil, Zahir Tari.

11.

Load Sharing in Peer-to-Peer Networks using Dynamic Replication. Sathish Rajasekhar, Bin Rong, Kwong Yuen Lai, Ibrahim Khalil, Zahir Tari.

12.

Reliability Enhanced Large-Scale Application Layer Multicast. Bin Rong, Ibrahim Khalil, Zahir Tari.

13.

An Adaptive Membership Algorithm for Application Layer Multicast. Bin Rong, Ibrahim Khalil, Zahir Tari.

14.

Making Application Layer Multicast Reliableis Feasible. Bin Rong, Ibrahim Khalil, Zahir Tari.

15.

A Gossip-based Membership Management Algorithm for Large-Scale Peer-to-Peer Media Streaming. Bin Rong, Ibrahim Khalil, Zahir Tari.

16.

A Scalable and Roboust QoS Architecture for WiFi P2P Networks. Sathish Rajasekhar, Ibrahim Khalil, Zahir Tari.

17.

Edge Provisioning and Fairness in VPN-DiffServ Networks. Ibrahim Khalil, Torsten Braun.

18.

Automated service provisioning in heterogeneous large-scale environment. Ibrahim Khalil, Torsten Braun.

19.

Management of quality of service enabled VPNs. Torsten Braun, Manuel G�nter, Ibrahim Khalil.

20.

A Range-Based SLA and Edge Driven Virtual Core Provisioning in DiffServ-VPNs. Ibrahim Khalil, Torsten Braun.

21.

Implementation of a Bandwidth Broker for Dynamic End-to-End Capacity Reservation over Multiple Diffserv Domains. Ibrahim Khalil, Torsten Braun.

22.

Edge provisioning and fairness in VPN-Diffserv networks. Ibrahim Khalil, Torsten Braun.

23.

Implementation of a Bandwidth Broker for Dynamic End-to-End Resource Reservation in Outsourced Virtual Private Networks. Ibrahim Khalil, Torsten Braun.

24.

An Architecture for Managing QoS-Enabled VPNs over the Internet. Manuel G�nter, Torsten Braun, Ibrahim Khalil.

25.

Differentiated Internet Services. Florian Baumgartner, Torsten Braun, Hans Joachim Einsiedler, Ibrahim Khalil.

Contact

Email

Get in touch with the lab at
ibrahim.khalil[at]rmit.edu.au

Join Us

We welcome applications from motivated PhD students and postdoctoral researchers. Send your CV and a brief research statement to our email.

Location

School of Computing Technologies
RMIT University
Melbourne VIC 3000, Australia