Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Ehab Al-Shaer
@article{DBLP:journals/tissec/SajidWADAK23, author = {Md Sajidul Islam Sajid and Jinpeng Wei and Ehab Al{-}Shaer and Qi Duan and Basel Abdeen and Latifur Khan}, title = {symbSODA: Configurable and Verifiable Orchestration Automation for Active Malware Deception}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {4}, pages = {51:1--51:36}, year = {2023}, url = {https://doi.org/10.1145/3624568}, doi = {10.1145/3624568}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/SajidWADAK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AbdeenAS23, author = {Basel Abdeen and Ehab Al{-}Shaer and Waseem G. Shadid}, title = {VeriActor: Dynamic Generation of Challenge-Response Questions for Enhanced Email Sender Verification}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--9}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10289040}, doi = {10.1109/CNS59707.2023.10289040}, timestamp = {Mon, 13 Nov 2023 09:18:17 +0100}, biburl = {https://dblp.org/rec/conf/cns/AbdeenAS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/DuttaACD23, author = {Ashutosh Dutta and Ehab Al{-}Shaer and Samrat Chatterjee and Qi Duan}, title = {Autonomous Cyber Defense Against Dynamic Multi-strategy Infrastructural DDoS Attacks}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2023, Orlando, FL, USA, October 2-5, 2023}, pages = {1--9}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CNS59707.2023.10288937}, doi = {10.1109/CNS59707.2023.10288937}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/DuttaACD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/AbdeenASKH23, author = {Basel Abdeen and Ehab Al{-}Shaer and Anoop Singhal and Latifur Khan and Kevin W. Hamlen}, editor = {Vijayalakshmi Atluri and Anna Lisa Ferrara}, title = {{SMET:} Semantic Mapping of {CVE} to ATT{\&}CK and Its Application to Cybersecurity}, booktitle = {Data and Applications Security and Privacy {XXXVII} - 37th Annual {IFIP} {WG} 11.3 Conference, DBSec 2023, Sophia-Antipolis, France, July 19-21, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13942}, pages = {243--260}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-37586-6\_15}, doi = {10.1007/978-3-031-37586-6\_15}, timestamp = {Fri, 14 Jul 2023 22:01:48 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/AbdeenASKH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-02785, author = {Ehsan Aghaei and Ehab Al{-}Shaer}, title = {CVE-driven Attack Technique Prediction with Semantic Information Extraction and a Domain-specific Language Model}, journal = {CoRR}, volume = {abs/2309.02785}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.02785}, doi = {10.48550/ARXIV.2309.02785}, eprinttype = {arXiv}, eprint = {2309.02785}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-02785.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-03040, author = {Ehsan Aghaei and Ehab Al{-}Shaer and Waseem G. Shadid and Xi Niu}, title = {Automated {CVE} Analysis for Threat Prioritization and Impact Prediction}, journal = {CoRR}, volume = {abs/2309.03040}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.03040}, doi = {10.48550/ARXIV.2309.03040}, eprinttype = {arXiv}, eprint = {2309.03040}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-03040.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/DasHTSPA22, author = {Siddhartha Shankar Das and Mahantesh Halappanavar and Antonino Tumeo and Edoardo Serra and Alex Pothen and Ehab Al{-}Shaer}, editor = {Shusaku Tsumoto and Yukio Ohsawa and Lei Chen and Dirk Van den Poel and Xiaohua Hu and Yoichi Motomura and Takuya Takagi and Lingfei Wu and Ying Xie and Akihiro Abe and Vijay Raghavan}, title = {{VWC-BERT:} Scaling Vulnerability-Weakness-Exploit Mapping on Modern {AI} Accelerators}, booktitle = {{IEEE} International Conference on Big Data, Big Data 2022, Osaka, Japan, December 17-20, 2022}, pages = {1224--1229}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/BigData55660.2022.10020622}, doi = {10.1109/BIGDATA55660.2022.10020622}, timestamp = {Fri, 18 Aug 2023 17:39:03 +0200}, biburl = {https://dblp.org/rec/conf/bigdataconf/DasHTSPA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/AghaeiNSA22, author = {Ehsan Aghaei and Xi Niu and Waseem G. Shadid and Ehab Al{-}Shaer}, editor = {Fengjun Li and Kaitai Liang and Zhiqiang Lin and Sokratis K. Katsikas}, title = {SecureBERT: {A} Domain-Specific Language Model for Cybersecurity}, booktitle = {Security and Privacy in Communication Networks - 18th {EAI} International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {462}, pages = {39--56}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25538-0\_3}, doi = {10.1007/978-3-031-25538-0\_3}, timestamp = {Thu, 06 Jul 2023 17:45:42 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/AghaeiNSA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2204-02685, author = {Ehsan Aghaei and Xi Niu and Waseem G. Shadid and Ehab Al{-}Shaer}, title = {Language Model for Text Analytic in Cybersecurity}, journal = {CoRR}, volume = {abs/2204.02685}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2204.02685}, doi = {10.48550/ARXIV.2204.02685}, eprinttype = {arXiv}, eprint = {2204.02685}, timestamp = {Tue, 12 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2204-02685.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/RahmanDA21, author = {Mohammad Ashiqur Rahman and Amarjit Datta and Ehab Al{-}Shaer}, title = {Automated Configuration Synthesis for Resilient Smart Metering Infrastructure}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {8}, number = {28}, pages = {e4}, year = {2021}, url = {https://doi.org/10.4108/eai.10-9-2021.170948}, doi = {10.4108/EAI.10-9-2021.170948}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/RahmanDA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SajidWAAIDK21, author = {Md Sajidul Islam Sajid and Jinpeng Wei and Basel Abdeen and Ehab Al{-}Shaer and Md. Mazharul Islam and Walter Diong and Latifur Khan}, title = {{SODA:} {A} System for Cyber Deception Orchestration and Automation}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {675--689}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485918}, doi = {10.1145/3485832.3485918}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SajidWAAIDK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/IslamDSAWF21, author = {Md. Mazharul Islam and Ashutosh Dutta and Md Sajidul Islam Sajid and Ehab Al{-}Shaer and Jinpeng Wei and Sadegh Farhang}, title = {{CHIMERA:} Autonomous Planning and Orchestration for Malware Deception}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2021, Tempe, AZ, USA, October 4-6, 2021}, pages = {173--181}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CNS53000.2021.9705030}, doi = {10.1109/CNS53000.2021.9705030}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/IslamDSAWF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsaa/DasSHPA21, author = {Siddhartha Shankar Das and Edoardo Serra and Mahantesh Halappanavar and Alex Pothen and Ehab Al{-}Shaer}, title = {{V2W-BERT:} {A} Framework for Effective Hierarchical Multiclass Classification of Software Vulnerabilities}, booktitle = {8th {IEEE} International Conference on Data Science and Advanced Analytics, {DSAA} 2021, Porto, Portugal, October 6-9, 2021}, pages = {1--12}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSAA53316.2021.9564227}, doi = {10.1109/DSAA53316.2021.9564227}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dsaa/DasSHPA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2102-11498, author = {Siddhartha Shankar Das and Edoardo Serra and Mahantesh Halappanavar and Alex Pothen and Ehab Al{-}Shaer}, title = {{V2W-BERT:} {A} Framework for Effective Hierarchical Multiclass Classification of Software Vulnerabilities}, journal = {CoRR}, volume = {abs/2102.11498}, year = {2021}, url = {https://arxiv.org/abs/2102.11498}, eprinttype = {arXiv}, eprint = {2102.11498}, timestamp = {Wed, 24 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2102-11498.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2104-08994, author = {Ashutosh Dutta and Ehab Al{-}Shaer and Samrat Chatterjee}, title = {Constraints Satisfiability Driven Reinforcement Learning for Autonomous Cyber Defense}, journal = {CoRR}, volume = {abs/2104.08994}, year = {2021}, url = {https://arxiv.org/abs/2104.08994}, eprinttype = {arXiv}, eprint = {2104.08994}, timestamp = {Mon, 26 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2104-08994.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RahmanHMA20, author = {Mohammad Ashiqur Rahman and Md. Golam Moula Mehedi Hasan and Mohammad Hossein Manshaei and Ehab Al{-}Shaer}, title = {A game-theoretic analysis to defend against remote operating system fingerprinting}, journal = {J. Inf. Secur. Appl.}, volume = {52}, pages = {102456}, year = {2020}, url = {https://doi.org/10.1016/j.jisa.2020.102456}, doi = {10.1016/J.JISA.2020.102456}, timestamp = {Wed, 27 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/RahmanHMA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DuanAX20, author = {Qi Duan and Ehab Al{-}Shaer and Jiang Xie}, editor = {Hamed Okhravi and Cliff Wang}, title = {Range and Topology Mutation Based Wireless Agility}, booktitle = {Proceedings of the 7th {ACM} Workshop on Moving Target Defense, MTD@CCS 2020, Virtual Event, USA, November 9, 2020}, pages = {59--67}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3411496.3421228}, doi = {10.1145/3411496.3421228}, timestamp = {Mon, 14 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DuanAX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SajidWAAA20, author = {Md Sajidul Islam Sajid and Jinpeng Wei and Md Rabbi Alam and Ehsan Aghaei and Ehab Al{-}Shaer}, title = {DodgeTron: Towards Autonomous Cyber Deception Using Dynamic Hybrid Analysis of Malware}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162202}, doi = {10.1109/CNS48642.2020.9162202}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/SajidWAAA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/RahimDA20, author = {Muhammad Abdul Basit Ur Rahim and Qi Duan and Ehab Al{-}Shaer}, title = {A Formal Analysis of Moving Target Defense}, booktitle = {44th {IEEE} Annual Computers, Software, and Applications Conference, {COMPSAC} 2020, Madrid, Spain, July 13-17, 2020}, pages = {1802--1807}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/COMPSAC48688.2020.00050}, doi = {10.1109/COMPSAC48688.2020.00050}, timestamp = {Tue, 29 Sep 2020 12:30:55 +0200}, biburl = {https://dblp.org/rec/conf/compsac/RahimDA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/NiakanlahijiJCA20, author = {Amirreza Niakanlahiji and Jafar Haadi Jafarian and Bei{-}Tseng Chu and Ehab Al{-}Shaer}, title = {HoneyBug: Personalized Cyber Deception for Web Applications}, booktitle = {53rd Hawaii International Conference on System Sciences, {HICSS} 2020, Maui, Hawaii, USA, January 7-10, 2020}, pages = {1--10}, publisher = {ScholarSpace}, year = {2020}, url = {https://hdl.handle.net/10125/63972}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hicss/NiakanlahijiJCA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/PurbaCA20, author = {Moumita Das Purba and Bill Chu and Ehab Al{-}Shaer}, title = {From Word Embedding to Cyber-Phrase Embedding: Comparison of Processing Cybersecurity Texts}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2020, Arlington, VA, USA, November 9-10, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ISI49825.2020.9280541}, doi = {10.1109/ISI49825.2020.9280541}, timestamp = {Mon, 14 Dec 2020 11:14:41 +0100}, biburl = {https://dblp.org/rec/conf/isi/PurbaCA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lrec/DaltonAABCCDDHI20, author = {Adam Dalton and Ehsan Aghaei and Ehab Al{-}Shaer and Archna Bhatia and Esteban Castillo and Zhuo Cheng and Sreekar Dhaduvai and Qi Duan and Bryanna Hebenstreit and Md. Mazharul Islam and Younes Karimi and Amir Masoumzadeh and Brodie Mather and Sashank Santhanam and Samira Shaikh and Alan Zemel and Tomek Strzalkowski and Bonnie J. Dorr}, editor = {Archna Bhatia and Samira Shaikh}, title = {Active Defense Against Social Engineering: The Case for Human Language Technology}, booktitle = {Proceedings for the First International Workshop on Social Threats in Online Conversations: Understanding and Management, STOC@LREC 2020, Marseille, France, May 2020}, pages = {1--8}, publisher = {European Language Resources Association}, year = {2020}, url = {https://aclanthology.org/2020.stoc-1.1/}, timestamp = {Fri, 08 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/lrec/DaltonAABCCDDHI20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/IslamA20, author = {Md. Mazharul Islam and Ehab Al{-}Shaer}, title = {Active Deception Framework: An Extensible Development Environment for Adaptive Cyber Deception}, booktitle = {{IEEE} Secure Development, SecDev 2020, Atlanta, GA, USA, September 28-30, 2020}, pages = {41--48}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SecDev45635.2020.00023}, doi = {10.1109/SECDEV45635.2020.00023}, timestamp = {Thu, 27 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/IslamA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/IslamAR20, author = {Md. Mazharul Islam and Ehab Al{-}Shaer and Muhammad Abdul Basit Ur Rahim}, editor = {Noseong Park and Kun Sun and Sara Foresti and Kevin R. B. Butler and Nitesh Saxena}, title = {Email Address Mutation for Proactive Deterrence Against Lateral Spear-Phishing Attacks}, booktitle = {Security and Privacy in Communication Networks - 16th {EAI} International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {335}, pages = {1--22}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-63086-7\_1}, doi = {10.1007/978-3-030-63086-7\_1}, timestamp = {Thu, 27 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/IslamAR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/AghaeiSA20, author = {Ehsan Aghaei and Waseem G. Shadid and Ehab Al{-}Shaer}, editor = {Noseong Park and Kun Sun and Sara Foresti and Kevin R. B. Butler and Nitesh Saxena}, title = {ThreatZoom: Hierarchical Neural Network for CVEs to CWEs Classification}, booktitle = {Security and Privacy in Communication Networks - 16th {EAI} International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {335}, pages = {23--41}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-63086-7\_2}, doi = {10.1007/978-3-030-63086-7\_2}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/AghaeiSA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/RahimAD20, author = {Muhammad Abdul Basit Ur Rahim and Ehab Al{-}Shaer and Qi Duan}, editor = {Noseong Park and Kun Sun and Sara Foresti and Kevin R. B. Butler and Nitesh Saxena}, title = {A Formal Verification of Configuration-Based Mutation Techniques for Moving Target Defense}, booktitle = {Security and Privacy in Communication Networks - 16th {EAI} International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {335}, pages = {61--79}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-63086-7\_5}, doi = {10.1007/978-3-030-63086-7\_5}, timestamp = {Tue, 15 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/RahimAD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/20/AlsalehA20, author = {Mohammed Noraden Alsaleh and Ehab Al{-}Shaer}, editor = {Sushil Jajodia and George Cybenko and V. S. Subrahmanian and Vipin Swarup and Cliff Wang and Michael P. Wellman}, title = {Automated Cyber Risk Mitigation: Making Informed Cost-Effective Decisions}, booktitle = {Adaptive Autonomous Secure Cyber Systems}, pages = {131--157}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-33432-1\_7}, doi = {10.1007/978-3-030-33432-1\_7}, timestamp = {Mon, 03 Jan 2022 21:52:41 +0100}, biburl = {https://dblp.org/rec/books/sp/20/AlsalehA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2004-09662, author = {Adam Dalton and Ehsan Aghaei and Ehab Al{-}Shaer and Archna Bhatia and Esteban Castillo and Zhuo Cheng and Sreekar Dhaduvai and Qi Duan and Md. Mazharul Islam and Younes Karimi and Amir Masoumzadeh and Brodie Mather and Sashank Santhanam and Samira Shaikh and Tomek Strzalkowski and Bonnie J. Dorr}, title = {The Panacea Threat Intelligence and Active Defense Platform}, journal = {CoRR}, volume = {abs/2004.09662}, year = {2020}, url = {https://arxiv.org/abs/2004.09662}, eprinttype = {arXiv}, eprint = {2004.09662}, timestamp = {Fri, 08 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2004-09662.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-11501, author = {Ehsan Aghaei and Waseem G. Shadid and Ehab Al{-}Shaer}, title = {ThreatZoom: {CVE2CWE} using Hierarchical Neural Network}, journal = {CoRR}, volume = {abs/2009.11501}, year = {2020}, url = {https://arxiv.org/abs/2009.11501}, eprinttype = {arXiv}, eprint = {2009.11501}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-11501.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/AWHW2019, author = {Ehab Al{-}Shaer and Jinpeng Wei and Kevin W. Hamlen and Cliff Wang}, title = {Autonomous Cyber Deception - Reasoning, Adaptive Planning, and Evaluation of HoneyThings}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-02110-8}, doi = {10.1007/978-3-030-02110-8}, isbn = {978-3-030-02109-2}, timestamp = {Tue, 19 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/AWHW2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RahmanDA19, author = {Mohammad Ashiqur Rahman and Amarjit Datta and Ehab Al{-}Shaer}, title = {Security design against stealthy attacks on power system state estimation: {A} formal approach}, journal = {Comput. Secur.}, volume = {84}, pages = {301--317}, year = {2019}, url = {https://doi.org/10.1016/j.cose.2019.03.022}, doi = {10.1016/J.COSE.2019.03.022}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RahmanDA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/IslamDA19, author = {Md. Mazharul Islam and Qi Duan and Ehab Al{-}Shaer}, editor = {Zhuo Lu}, title = {Specification-driven Moving Target Defense Synthesis}, booktitle = {Proceedings of the 6th {ACM} Workshop on Moving Target Defense, MTD@CCS 2019, London, UK, November 11, 2019}, pages = {13--24}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338468.3356830}, doi = {10.1145/3338468.3356830}, timestamp = {Thu, 27 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/IslamDA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/DuttaA19, author = {Ashutosh Dutta and Ehab Al{-}Shaer}, title = {"What", "Where", and "Why" Cybersecurity Controls to Enforce for Optimal Risk Mitigation}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {160--168}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802745}, doi = {10.1109/CNS.2019.8802745}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cns/DuttaA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/RahimDA19, author = {Muhammad Abdul Basit Ur Rahim and Qi Duan and Ehab Al{-}Shaer}, editor = {Xenofon D. Koutsoukos and Alvaro A. C{\'{a}}rdenas and Ehab Al{-}Shaer}, title = {A formal verification of mutation-based moving target defense}, booktitle = {Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, HotSoS 2019, Nashville, TN, USA, April 1-3, 2019}, pages = {10:1--10:2}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3314058.3317723}, doi = {10.1145/3314058.3317723}, timestamp = {Sat, 22 Jun 2019 19:13:09 +0200}, biburl = {https://dblp.org/rec/conf/hotsos/RahimDA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/IslamADA19, author = {Md. Mazharul Islam and Ehab Al{-}Shaer and Ashutosh Dutta and Mohammed Noraden Alsaleh}, editor = {Xenofon D. Koutsoukos and Alvaro A. C{\'{a}}rdenas and Ehab Al{-}Shaer}, title = {CLIPS/ActiveSDN for automated and safe cybersecurity course-of-actions orchestration}, booktitle = {Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, HotSoS 2019, Nashville, TN, USA, April 1-3, 2019}, pages = {13:1--13:3}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3314058.3317724}, doi = {10.1145/3314058.3317724}, timestamp = {Thu, 27 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotsos/IslamADA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/DuttaA19, author = {Ashutosh Dutta and Ehab Al{-}Shaer}, editor = {Xenofon D. Koutsoukos and Alvaro A. C{\'{a}}rdenas and Ehab Al{-}Shaer}, title = {Cyber defense matrix: a new model for optimal composition of cybersecurity controls to construct resilient risk mitigation}, booktitle = {Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, HotSoS 2019, Nashville, TN, USA, April 1-3, 2019}, pages = {14:1--14:2}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3314058.3317725}, doi = {10.1145/3314058.3317725}, timestamp = {Sat, 22 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hotsos/DuttaA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/HusariACR19, author = {Ghaith Husari and Ehab Al{-}Shaer and Bill Chu and Ruhani Faiheem Rahman}, editor = {Xenofon D. Koutsoukos and Alvaro A. C{\'{a}}rdenas and Ehab Al{-}Shaer}, title = {Learning {APT} chains from cyber threat intelligence}, booktitle = {Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, HotSoS 2019, Nashville, TN, USA, April 1-3, 2019}, pages = {19:1--19:2}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3314058.3317728}, doi = {10.1145/3314058.3317728}, timestamp = {Sat, 22 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hotsos/HusariACR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/AhmedA19, author = {Mohiuddin Ahmed and Ehab Al{-}Shaer}, editor = {Xenofon D. Koutsoukos and Alvaro A. C{\'{a}}rdenas and Ehab Al{-}Shaer}, title = {Measures and metrics for the enforcement of critical security controls: a case study of boundary defense}, booktitle = {Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, HotSoS 2019, Nashville, TN, USA, April 1-3, 2019}, pages = {21:1--21:3}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3314058.3317730}, doi = {10.1145/3314058.3317730}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hotsos/AhmedA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/AghaeiA19, author = {Ehsan Aghaei and Ehab Al{-}Shaer}, editor = {Xenofon D. Koutsoukos and Alvaro A. C{\'{a}}rdenas and Ehab Al{-}Shaer}, title = {ThreatZoom: neural network for automated vulnerability mitigation}, booktitle = {Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, HotSoS 2019, Nashville, TN, USA, April 1-3, 2019}, pages = {24:1--24:3}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3314058.3318167}, doi = {10.1145/3314058.3318167}, timestamp = {Sat, 22 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hotsos/AghaeiA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/im/FarooqAMK19, author = {Abdullah Al Farooq and Ehab Al{-}Shaer and Thomas Moyer and Krishna Kant}, editor = {Joe Betser and Carol J. Fung and Alex Clemm and J{\'{e}}r{\^{o}}me Fran{\c{c}}ois and Shingo Ata}, title = {IoTC\({}^{\mbox{2}}\): {A} Formal Method Approach for Detecting Conflicts in Large Scale IoT Systems}, booktitle = {{IFIP/IEEE} International Symposium on Integrated Network Management, {IM} 2019, Washington, DC, USA, April 09-11, 2019}, pages = {442--447}, publisher = {{IFIP}}, year = {2019}, url = {https://ieeexplore.ieee.org/document/8717844}, timestamp = {Tue, 10 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/im/FarooqAMK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/hotsos/2019, editor = {Xenofon D. Koutsoukos and Alvaro A. C{\'{a}}rdenas and Ehab Al{-}Shaer}, title = {Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, HotSoS 2019, Nashville, TN, USA, April 1-3, 2019}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3314058}, doi = {10.1145/3314058}, isbn = {978-1-4503-7147-6}, timestamp = {Sat, 22 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hotsos/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-00540, author = {Mohammad Ashiqur Rahman and Md Hasan Shahriar and Ehab Al{-}Shaer and Quanyan Zhu}, title = {A Formal Approach for Efficient Navigation Management of Hybrid Electric Vehicles on Long Trips}, journal = {CoRR}, volume = {abs/1907.00540}, year = {2019}, url = {http://arxiv.org/abs/1907.00540}, eprinttype = {arXiv}, eprint = {1907.00540}, timestamp = {Mon, 08 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-00540.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AlsalehWAA18, author = {Mohammed Noraden Alsaleh and Jinpeng Wei and Ehab Al{-}Shaer and Mohiuddin Ahmed}, editor = {Jeffrey Todd McDonald and S{\'{e}}bastien Bardin and Natalia Stakhanova}, title = {gExtractor: Towards Automated Extraction of Malware Deception Parameters}, booktitle = {Proceedings of the 8th Software Security, Protection, and Reverse Engineering Workshop, San Juan, PR, USA, December 3-4, 2018}, pages = {2:1--2:12}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3289239.3289244}, doi = {10.1145/3289239.3289244}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/AlsalehWAA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GillaniAD18, author = {Fida Gillani and Ehab Al{-}Shaer and Qi Duan}, editor = {Massimiliano Albanese and Dijiang Huang}, title = {In-design Resilient {SDN} Control Plane and Elastic Forwarding Against Aggressive DDoS Attacks}, booktitle = {Proceedings of the 5th {ACM} Workshop on Moving Target Defense, {CCS} 2018, Toronto, ON, Canada, October 15, 2018}, pages = {80--89}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3268966.3268968}, doi = {10.1145/3268966.3268968}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GillaniAD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/DuanAIJ18, author = {Qi Duan and Ehab Al{-}Shaer and Mazharul Islam and Jafar Haadi Jafarian}, title = {{CONCEAL:} {A} Strategy Composition for Resilient Cyber Deception-Framework, Metrics and Deployment}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--9}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433196}, doi = {10.1109/CNS.2018.8433196}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cns/DuanAIJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AhmedWWA18, author = {Mohiuddin Ahmed and Jinpeng Wei and Yongge Wang and Ehab Al{-}Shaer}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Jordi Herrera{-}Joancomart{\'{\i}} and Giovanni Livraga and Ruben Rios}, title = {A Poisoning Attack Against Cryptocurrency Mining Pools}, booktitle = {Data Privacy Management, Cryptocurrencies and Blockchain Technology - {ESORICS} 2018 International Workshops, {DPM} 2018 and {CBT} 2018, Barcelona, Spain, September 6-7, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11025}, pages = {140--154}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00305-0\_11}, doi = {10.1007/978-3-030-00305-0\_11}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/AhmedWWA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/AlsalehAD18, author = {Mohammed Noraden Alsaleh and Ehab Al{-}Shaer and Qi Duan}, editor = {Pierangela Samarati and Mohammad S. Obaidat}, title = {Verifying the Enforcement and Effectiveness of Network Lateral Movement Resistance Techniques}, booktitle = {Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, {ICETE} 2018 - Volume 2: SECRYPT, Porto, Portugal, July 26-28, 2018}, pages = {412--423}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006868904120423}, doi = {10.5220/0006868904120423}, timestamp = {Wed, 29 Aug 2018 15:17:20 +0200}, biburl = {https://dblp.org/rec/conf/icete/AlsalehAD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/HusariNCA18, author = {Ghaith Husari and Xi Niu and Bill Chu and Ehab Al{-}Shaer}, title = {Using Entropy and Mutual Information to Extract Threat Actions from Cyber Threat Intelligence}, booktitle = {2018 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2018, Miami, FL, USA, November 9-11, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ISI.2018.8587343}, doi = {10.1109/ISI.2018.8587343}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isi/HusariNCA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/NiakanlahijiCA18, author = {Amirreza Niakanlahiji and Bei{-}Tseng Chu and Ehab Al{-}Shaer}, title = {PhishMon: {A} Machine Learning Framework for Detecting Phishing Webpages}, booktitle = {2018 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2018, Miami, FL, USA, November 9-11, 2018}, pages = {220--225}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ISI.2018.8587410}, doi = {10.1109/ISI.2018.8587410}, timestamp = {Fri, 04 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/NiakanlahijiCA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1812-03966, author = {Abdullah Al Farooq and Ehab Al{-}Shaer and Thomas Moyer and Krishna Kant}, title = {IoTC2: {A} Formal Method Approach for Detecting Conflicts in Large Scale IoT Systems}, journal = {CoRR}, volume = {abs/1812.03966}, year = {2018}, url = {http://arxiv.org/abs/1812.03966}, eprinttype = {arXiv}, eprint = {1812.03966}, timestamp = {Thu, 13 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1812-03966.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/QamarARAC17, author = {Sara Qamar and Zahid Anwar and Mohammad Ashiqur Rahman and Ehab Al{-}Shaer and Bei{-}tseng Chu}, title = {Data-driven analytics for cyber-threat intelligence and information sharing}, journal = {Comput. Secur.}, volume = {67}, pages = {35--58}, year = {2017}, url = {https://doi.org/10.1016/j.cose.2017.02.005}, doi = {10.1016/J.COSE.2017.02.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/QamarARAC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MohsinAZA17, author = {Mujahid Mohsin and Zahid Anwar and Farhat Zaman and Ehab Al{-}Shaer}, title = {IoTChecker: {A} data-driven framework for security analytics of Internet of Things configurations}, journal = {Comput. Secur.}, volume = {70}, pages = {199--223}, year = {2017}, url = {https://doi.org/10.1016/j.cose.2017.05.012}, doi = {10.1016/J.COSE.2017.05.012}, timestamp = {Thu, 25 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MohsinAZA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnsm/AlsalehAH17, author = {Mohammed Noraden Alsaleh and Ehab Al{-}Shaer and Ghaith Husari}, title = {ROI-Driven Cyber Risk Mitigation Using Host Compliance and Network Configuration}, journal = {J. Netw. Syst. Manag.}, volume = {25}, number = {4}, pages = {759--783}, year = {2017}, url = {https://doi.org/10.1007/s10922-017-9428-x}, doi = {10.1007/S10922-017-9428-X}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnsm/AlsalehAH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/El-AtawyDA17, author = {Adel El{-}Atawy and Qi Duan and Ehab Al{-}Shaer}, title = {A Novel Class of Robust Covert Channels Using Out-of-Order Packets}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {2}, pages = {116--129}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2443779}, doi = {10.1109/TDSC.2015.2443779}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/El-AtawyDA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/RahmanMAS17, author = {Mohammad Ashiqur Rahman and Mohammad Hossein Manshaei and Ehab Al{-}Shaer and Mohamed Shehab}, title = {Secure and Private Data Aggregation for Energy Consumption Scheduling in Smart Grids}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {14}, number = {2}, pages = {221--234}, year = {2017}, url = {https://doi.org/10.1109/TDSC.2015.2446492}, doi = {10.1109/TDSC.2015.2446492}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/RahmanMAS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/RahmanA17, author = {Mohammad Ashiqur Rahman and Ehab Al{-}Shaer}, title = {Automated Synthesis of Distributed Network Access Controls: {A} Formal Framework with Refinement}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {28}, number = {2}, pages = {416--430}, year = {2017}, url = {https://doi.org/10.1109/TPDS.2016.2585108}, doi = {10.1109/TPDS.2016.2585108}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/RahmanA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HusariAACN17, author = {Ghaith Husari and Ehab Al{-}Shaer and Mohiuddin Ahmed and Bill Chu and Xi Niu}, title = {TTPDrill: Automatic and Accurate Extraction of Threat Actions from Unstructured Text of {CTI} Sources}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {103--115}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134646}, doi = {10.1145/3134600.3134646}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/HusariAACN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/BurchamACADGJRK17, author = {Morgan Burcham and Mahran Al{-}Zyoud and Jeffrey C. Carver and Mohammed Noraden Alsaleh and Hongying Du and Fida Gillani and Jun Jiang and Akond Rahman and {\"{O}}zg{\"{u}}r Kafali and Ehab Al{-}Shaer and Laurie A. Williams}, title = {Characterizing Scientific Reporting in Security Literature: An analysis of {ACM} {CCS} and {IEEE} S{\&}P Papers}, booktitle = {Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp, HoTSoS 2017, Hanover, MD, USA, April 4-5, 2017}, pages = {13--23}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3055305.3055307}, doi = {10.1145/3055305.3055307}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hotsos/BurchamACADGJRK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/BhattacharjeeTA17, author = {Sreyasee Das Bhattacharjee and Ashit Talukder and Ehab Al{-}Shaer and Pratik Doshi}, title = {Prioritized active learning for malicious {URL} detection using weighted text-based features}, booktitle = {2017 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2017, Beijing, China, July 22-24, 2017}, pages = {107--112}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISI.2017.8004883}, doi = {10.1109/ISI.2017.8004883}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isi/BhattacharjeeTA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safeconfig/NiakanlahijiPCA17, author = {Amirreza Niakanlahiji and Mir Mehedi A. Pritom and Bei{-}tseng Chu and Ehab Al{-}Shaer}, editor = {Nicholas J. Multari and Anoop Singhal and Erin Miller}, title = {Predicting Zero-day Malicious {IP} Addresses}, booktitle = {Proceedings of the 2017 Workshop on Automated Decision Making for Active Cyber Defense, SafeConfig@CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1--6}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3140368.3140369}, doi = {10.1145/3140368.3140369}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/safeconfig/NiakanlahijiPCA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/Al-ShaerR16, author = {Ehab Al{-}Shaer and Mohammad Ashiqur Rahman}, title = {Security and Resiliency Analytics for Smart Grids - Static and Dynamic Approaches}, series = {Advances in Information Security}, volume = {67}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-32871-3}, doi = {10.1007/978-3-319-32871-3}, isbn = {978-3-319-32870-6}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Al-ShaerR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/GillaniAA16, author = {Fida Gillani and Ehab Al{-}Shaer and Basil AsSadhan}, title = {Economic metric to improve spam detectors}, journal = {J. Netw. Comput. Appl.}, volume = {65}, pages = {131--143}, year = {2016}, url = {https://doi.org/10.1016/j.jnca.2016.02.019}, doi = {10.1016/J.JNCA.2016.02.019}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/GillaniAA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Al-Shaer16, author = {Ehab Al{-}Shaer}, editor = {Peng Liu and Cliff Wang}, title = {A Cyber Mutation: Metrics, Techniques and Future Directions}, booktitle = {Proceedings of the 2016 {ACM} Workshop on Moving Target Defense, MTD@CCS 2016, Vienna, Austria, October 24, 2016}, pages = {1}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2995272.2995285}, doi = {10.1145/2995272.2995285}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Al-Shaer16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JafarianNAD16, author = {Jafar Haadi Jafarian and Amirreza Niakanlahiji and Ehab Al{-}Shaer and Qi Duan}, editor = {Peng Liu and Cliff Wang}, title = {Multi-dimensional Host Identity Anonymization for Defeating Skilled Attackers}, booktitle = {Proceedings of the 2016 {ACM} Workshop on Moving Target Defense, MTD@CCS 2016, Vienna, Austria, October 24, 2016}, pages = {47--58}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2995272.2995278}, doi = {10.1145/2995272.2995278}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JafarianNAD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RaufGAHCO16, author = {Usman Rauf and Fida Gillani and Ehab Al{-}Shaer and Mahantesh Halappanavar and Samrat Chatterjee and Christopher S. Oehmen}, editor = {Peng Liu and Cliff Wang}, title = {Formal Approach for Resilient Reachability based on End-System Route Agility}, booktitle = {Proceedings of the 2016 {ACM} Workshop on Moving Target Defense, MTD@CCS 2016, Vienna, Austria, October 24, 2016}, pages = {117--127}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2995272.2995275}, doi = {10.1145/2995272.2995275}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RaufGAHCO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/MohsinAHAR16, author = {Mujahid Mohsin and Zahid Anwar and Ghaith Husari and Ehab Al{-}Shaer and Mohammad Ashiqur Rahman}, title = {IoTSAT: {A} formal framework for security analysis of the internet of things (IoT)}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {180--188}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860484}, doi = {10.1109/CNS.2016.7860484}, timestamp = {Thu, 25 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/MohsinAHAR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/RahmanFDA16, author = {Mohammad Ashiqur Rahman and Abdullah Al Farooq and Amarjit Datta and Ehab Al{-}Shaer}, title = {Automated synthesis of resiliency configurations for cyber networks}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {243--251}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860491}, doi = {10.1109/CNS.2016.7860491}, timestamp = {Sun, 30 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/RahmanFDA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsm/AlsalehHA16, author = {Mohammed Noraden Alsaleh and Ghaith Husari and Ehab Al{-}Shaer}, title = {Optimizing the RoI of cyber risk mitigation}, booktitle = {12th International Conference on Network and Service Management, {CNSM} 2016, Montreal, QC, Canada, October 31 - Nov. 4, 2016}, pages = {223--227}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNSM.2016.7818421}, doi = {10.1109/CNSM.2016.7818421}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/cnsm/AlsalehHA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/RahmanJA16, author = {Mohammad Ashiqur Rahman and A. H. M. Jakaria and Ehab Al{-}Shaer}, title = {Formal Analysis for Dependable Supervisory Control and Data Acquisition in Smart Grids}, booktitle = {46th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2016, Toulouse, France, June 28 - July 1, 2016}, pages = {263--274}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/DSN.2016.32}, doi = {10.1109/DSN.2016.32}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/RahmanJA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/DogTRCQHYA16, author = {Spike E. Dog and Alex Tweed and LeRoy Rouse and Bill Chu and Duan Qi and Yueqi Hu and Jing Yang and Ehab Al{-}Shaer}, title = {Strategic Cyber Threat Intelligence Sharing: {A} Case Study of {IDS} Logs}, booktitle = {25th International Conference on Computer Communication and Networks, {ICCCN} 2016, Waikoloa, HI, USA, August 1-4, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICCCN.2016.7568578}, doi = {10.1109/ICCCN.2016.7568578}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/icccn/DogTRCQHYA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safeconfig/AlsalehA16, author = {Mohammed Noraden Alsaleh and Ehab Al{-}Shaer}, editor = {Nicholas J. Multari and Anoop Singhal and David O. Manz}, title = {Towards Automated Verification of Active Cyber Defense Strategies on Software Defined Networks}, booktitle = {Proceedings of the 2016 {ACM} Workshop on Automated Decision Making for Active Cyber Defense, SafeConfig@CCS 2016, Vienna, Austria, October 24, 2016}, pages = {23--29}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2994475.2994482}, doi = {10.1145/2994475.2994482}, timestamp = {Tue, 06 Nov 2018 11:07:22 +0100}, biburl = {https://dblp.org/rec/conf/safeconfig/AlsalehA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/16/Al-ShaerG16, author = {Ehab Al{-}Shaer and Syed Fida Gillani}, editor = {Sushil Jajodia and V. S. Subrahmanian and Vipin Swarup and Cliff Wang}, title = {Agile Virtual Infrastructure for Cyber Deception Against Stealthy DDoS Attacks}, booktitle = {Cyber Deception, Building the Scientific Foundation}, pages = {235--259}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-32699-3\_10}, doi = {10.1007/978-3-319-32699-3\_10}, timestamp = {Wed, 25 Sep 2019 17:41:11 +0200}, biburl = {https://dblp.org/rec/books/sp/16/Al-ShaerG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-net/MaityBGA15, author = {Soumya Maity and Padmalochan Bera and S. K. Ghosh and Ehab Al{-}Shaer}, title = {Formal integrated network security analysis tool: formal query-based network security configuration analysis}, journal = {{IET} Networks}, volume = {4}, number = {2}, pages = {137--147}, year = {2015}, url = {https://doi.org/10.1049/iet-net.2013.0090}, doi = {10.1049/IET-NET.2013.0090}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-net/MaityBGA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/MaityGA15, author = {Soumya Maity and Soumya Kanti Ghosh and Ehab Al{-}Shaer}, title = {PoliCon: a policy conciliation framework for heterogeneous mobile ad hoc networks}, journal = {Secur. Commun. Networks}, volume = {8}, number = {3}, pages = {418--430}, year = {2015}, url = {https://doi.org/10.1002/sec.990}, doi = {10.1002/SEC.990}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/MaityGA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JafarianAD15, author = {Jafar Haadi Jafarian and Ehab Al{-}Shaer and Qi Duan}, title = {An Effective Address Mutation Approach for Disrupting Reconnaissance Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {12}, pages = {2562--2577}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2467358}, doi = {10.1109/TIFS.2015.2467358}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/JafarianAD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AliA15, author = {Muhammad Qasim Ali and Ehab Al{-}Shaer}, title = {Randomization-Based Intrusion Detection System for Advanced Metering Infrastructure}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {18}, number = {2}, pages = {7:1--7:30}, year = {2015}, url = {https://doi.org/10.1145/2814936}, doi = {10.1145/2814936}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/AliA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Al-ShaerOR15, author = {Ehab Al{-}Shaer and Christopher S. Oehmen and Mohammad Ashiqur Rahman}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {SafeConfig 2015: Workshop on Automated Decision Making for Active Cyber Defense}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1711--1712}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2812624}, doi = {10.1145/2810103.2812624}, timestamp = {Tue, 10 Nov 2020 19:58:09 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Al-ShaerOR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AliAAD15, author = {Muhammad Qasim Ali and Ayesha Binte Ashfaq and Ehab Al{-}Shaer and Qi Duan}, title = {Towards a science of anomaly detection system evasion}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {460--468}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346858}, doi = {10.1109/CNS.2015.7346858}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cns/AliAAD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/GillaniALDAZ15, author = {Fida Gillani and Ehab Al{-}Shaer and Samantha Lo and Qi Duan and Mostafa H. Ammar and Ellen W. Zegura}, title = {Agile virtualized infrastructure to proactively defend against cyber attacks}, booktitle = {2015 {IEEE} Conference on Computer Communications, {INFOCOM} 2015, Kowloon, Hong Kong, April 26 - May 1, 2015}, pages = {729--737}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/INFOCOM.2015.7218442}, doi = {10.1109/INFOCOM.2015.7218442}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/GillaniALDAZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/JafarianAD15, author = {Jafar Haadi Jafarian and Ehab Al{-}Shaer and Qi Duan}, title = {Adversary-aware {IP} address randomization for proactive agility against sophisticated attackers}, booktitle = {2015 {IEEE} Conference on Computer Communications, {INFOCOM} 2015, Kowloon, Hong Kong, April 26 - May 1, 2015}, pages = {738--746}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/INFOCOM.2015.7218443}, doi = {10.1109/INFOCOM.2015.7218443}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/JafarianAD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safeconfig/KhanAR15, author = {Yasir Imtiaz Khan and Ehab Al{-}Shaer and Usman Rauf}, editor = {Ehab Al{-}Shaer and Christopher S. Oehmen and Mohammad Ashiqur Rahman}, title = {Cyber Resilience-by-Construction: Modeling, Measuring {\&} Verifying}, booktitle = {Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense, SafeConfig 2015, Denver, Colorado, USA, October 12, 2015}, pages = {9--14}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2809826.2809836}, doi = {10.1145/2809826.2809836}, timestamp = {Tue, 06 Nov 2018 11:07:22 +0100}, biburl = {https://dblp.org/rec/conf/safeconfig/KhanAR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safeconfig/OehmenAR15, author = {Christopher S. Oehmen and Ehab Al{-}Shaer and Mohammad Ashiqur Rahman}, editor = {Ehab Al{-}Shaer and Christopher S. Oehmen and Mohammad Ashiqur Rahman}, title = {Automated Decision Making for Active Cyber Defense: Panel Discussion}, booktitle = {Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense, SafeConfig 2015, Denver, Colorado, USA, October 12, 2015}, pages = {59}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2809826.2809828}, doi = {10.1145/2809826.2809828}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/safeconfig/OehmenAR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartgridcomm/RahmanA15, author = {Mohammad Ashiqur Rahman and Ehab Al{-}Shaer}, title = {Formal synthesis of dependable configurations for advanced metering infrastructures}, booktitle = {2015 {IEEE} International Conference on Smart Grid Communications, SmartGridComm 2015, Miami, FL, USA, November 2-5, 2015}, pages = {289--294}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/SmartGridComm.2015.7436315}, doi = {10.1109/SMARTGRIDCOMM.2015.7436315}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/smartgridcomm/RahmanA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Al-ShaerR15, author = {Ehab Al{-}Shaer and Mohammad Ashiqur Rahman}, editor = {Sushil Jajodia and Paulo Shakarian and V. S. Subrahmanian and Vipin Swarup and Cliff Wang}, title = {Attribution, Temptation, and Expectation: {A} Formal Framework for Defense-by-Deception in Cyberwarfare}, booktitle = {Cyber Warfare - Building the Scientific Foundation}, series = {Advances in Information Security}, volume = {56}, pages = {57--80}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-14039-1\_4}, doi = {10.1007/978-3-319-14039-1\_4}, timestamp = {Tue, 16 May 2017 14:24:25 +0200}, biburl = {https://dblp.org/rec/series/ais/Al-ShaerR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/safeconfig/2015, editor = {Ehab Al{-}Shaer and Christopher S. Oehmen and Mohammad Ashiqur Rahman}, title = {Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense, SafeConfig 2015, Denver, Colorado, USA, October 12, 2015}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2809826}, doi = {10.1145/2809826}, isbn = {978-1-4503-3821-9}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/safeconfig/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/Al-Shaer14, author = {Ehab Al{-}Shaer}, title = {Automated Firewall Analytics - Design, Configuration and Optimization}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10371-6}, doi = {10.1007/978-3-319-10371-6}, isbn = {978-3-319-10370-9}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/Al-Shaer14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/AshfaqRJKAA14, author = {Ayesha Binte Ashfaq and Sajjad Rizvi and Mobin Javed and Syed Ali Khayam and Muhammad Qasim Ali and Ehab Al{-}Shaer}, title = {Information theoretic feature space slicing for statistical anomaly detection}, journal = {J. Netw. Comput. Appl.}, volume = {41}, pages = {473--487}, year = {2014}, url = {https://doi.org/10.1016/j.jnca.2014.01.002}, doi = {10.1016/J.JNCA.2014.01.002}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/AshfaqRJKAA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AliAS14, author = {Muhammad Qasim Ali and Ehab Al{-}Shaer and Taghrid Samak}, title = {Firewall Policy Reconnaissance: Techniques and Analysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {9}, number = {2}, pages = {296--308}, year = {2014}, url = {https://doi.org/10.1109/TIFS.2013.2296874}, doi = {10.1109/TIFS.2013.2296874}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AliAS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/GillaniDAA14, author = {Syed Fida Gillani and Mehmet Demirci and Ehab Al{-}Shaer and Mostafa H. Ammar}, title = {Problem Localization and Quantification Using Formal Evidential Reasoning for Virtual Networks}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {11}, number = {3}, pages = {307--320}, year = {2014}, url = {https://doi.org/10.1109/TNSM.2014.2326297}, doi = {10.1109/TNSM.2014.2326297}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnsm/GillaniDAA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RahmanAB14, author = {Mohammad Ashiqur Rahman and Ehab Al{-}Shaer and Rakesh B. Bobba}, editor = {Sushil Jajodia and Kun Sun}, title = {Moving Target Defense for Hardening the Security of the Power System State Estimation}, booktitle = {Proceedings of the First {ACM} Workshop on Moving Target Defense, {MTD} '14, Scottsdale, Arizona, USA, November 7, 2014}, pages = {59--68}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2663474.2663482}, doi = {10.1145/2663474.2663482}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/RahmanAB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JafarianAD14, author = {Jafar Haadi Jafarian and Ehab Al{-}Shaer and Qi Duan}, editor = {Sushil Jajodia and Kun Sun}, title = {Spatio-temporal Address Mutation for Proactive Cyber Agility against Sophisticated Attackers}, booktitle = {Proceedings of the First {ACM} Workshop on Moving Target Defense, {MTD} '14, Scottsdale, Arizona, USA, November 7, 2014}, pages = {69--78}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2663474.2663483}, doi = {10.1145/2663474.2663483}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JafarianAD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Al-ShaerK14, author = {Ehab Al{-}Shaer and Krishna Kant}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Summary Abstract for the 7th {ACM} International Workshop on Cyber Security Analytics, Intelligence and Automation}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1544--1545}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660382}, doi = {10.1145/2660267.2660382}, timestamp = {Tue, 10 Nov 2020 20:00:23 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Al-ShaerK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AlsalehA14, author = {Mohammed Noraden Alsaleh and Ehab Al{-}Shaer}, title = {Security configuration analytics using video games}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {256--264}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997493}, doi = {10.1109/CNS.2014.6997493}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cns/AlsalehA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AliYAKZ14, author = {Muhammad Qasim Ali and Reza Yousefian and Ehab Al{-}Shaer and Sukumar Kamalasadan and Quanyan Zhu}, title = {Two-tier data-driven intrusion detection for automatic generation control in smart grid}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {292--300}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997497}, doi = {10.1109/CNS.2014.6997497}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/AliYAKZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/RahmanAK14, author = {Mohammad Ashiqur Rahman and Ehab Al{-}Shaer and Rajesh G. Kavasseri}, title = {Security Threat Analytics and Countermeasure Synthesis for Power System State Estimation}, booktitle = {44th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2014, Atlanta, GA, USA, June 23-26, 2014}, pages = {156--167}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/DSN.2014.29}, doi = {10.1109/DSN.2014.29}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/RahmanAK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccps/RahmanAK14, author = {Mohammad Ashiqur Rahman and Ehab Al{-}Shaer and Rajesh G. Kavasseri}, title = {A formal model for verifying the impact of stealthy attacks on optimal power flow in power grids}, booktitle = {{ACM/IEEE} International Conference on Cyber-Physical Systems, ICCPS, Berlin, Germany, April 14-17, 2014}, pages = {175--186}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ICCPS.2014.6843721}, doi = {10.1109/ICCPS.2014.6843721}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccps/RahmanAK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/RahmanAK14, author = {Mohammad Ashiqur Rahman and Ehab Al{-}Shaer and Rajesh G. Kavasseri}, title = {Impact Analysis of Topology Poisoning Attacks on Economic Operation of the Smart Power Grid}, booktitle = {{IEEE} 34th International Conference on Distributed Computing Systems, {ICDCS} 2014, Madrid, Spain, June 30 - July 3, 2014}, pages = {649--659}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ICDCS.2014.72}, doi = {10.1109/ICDCS.2014.72}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/RahmanAK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safeconfig/GillaniA14, author = {Fida Gillani and Ehab Al{-}Shaer}, editor = {Ehab Al{-}Shaer and Krishna Kant}, title = {Improving Efficiency of Spam Detection using Economic Model}, booktitle = {Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence and Automation, SafeConfig '14, Scottsdale, Arizona, USA, November 3, 2014}, pages = {11--18}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2665936.2665942}, doi = {10.1145/2665936.2665942}, timestamp = {Thu, 13 Feb 2020 15:16:46 +0100}, biburl = {https://dblp.org/rec/conf/safeconfig/GillaniA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safeconfig/AlsalehA14, author = {Mohammed Noraden Alsaleh and Ehab Al{-}Shaer}, editor = {Ehab Al{-}Shaer and Krishna Kant}, title = {Enterprise Risk Assessment Based on Compliance Reports and Vulnerability Scoring Systems}, booktitle = {Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence and Automation, SafeConfig '14, Scottsdale, Arizona, USA, November 3, 2014}, pages = {25--28}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2665936.2665941}, doi = {10.1145/2665936.2665941}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/safeconfig/AlsalehA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/safeconfig/2014, editor = {Ehab Al{-}Shaer and Krishna Kant}, title = {Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence and Automation, SafeConfig '14, Scottsdale, Arizona, USA, November 3, 2014}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2665936}, doi = {10.1145/2665936}, isbn = {978-1-4503-3147-0}, timestamp = {Thu, 13 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/safeconfig/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/DuanJAX14, author = {Qi Duan and Jafar Haadi Jafarian and Ehab Al{-}Shaer and Jinhui Xu}, title = {On DDoS Attack Related Minimum Cut Problems}, journal = {CoRR}, volume = {abs/1412.3359}, year = {2014}, url = {http://arxiv.org/abs/1412.3359}, eprinttype = {arXiv}, eprint = {1412.3359}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/DuanJAX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/DuanA13, author = {Qi Duan and Ehab Al{-}Shaer}, title = {Traffic-aware dynamic firewall policy management: techniques and applications}, journal = {{IEEE} Commun. Mag.}, volume = {51}, number = {7}, year = {2013}, url = {https://doi.org/10.1109/MCOM.2013.6553681}, doi = {10.1109/MCOM.2013.6553681}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/DuanA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/TozalWASTC13, author = {Mehmet Engin Tozal and Yongge Wang and Ehab Al{-}Shaer and Kamil Sara{\c{c}} and Bhavani Thuraisingham and Bei{-}tseng Chu}, title = {Adaptive Information Coding for Secure and Reliable Wireless Telesurgery Communications}, journal = {Mob. Networks Appl.}, volume = {18}, number = {5}, pages = {697--711}, year = {2013}, url = {https://doi.org/10.1007/s11036-011-0333-3}, doi = {10.1007/S11036-011-0333-3}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/monet/TozalWASTC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AliAKK13, author = {Muhammad Qasim Ali and Ehab Al{-}Shaer and Hassan Khan and Syed Ali Khayam}, title = {Automated Anomaly Detector Adaptation using Adaptive Threshold Tuning}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {15}, number = {4}, pages = {17:1--17:30}, year = {2013}, url = {https://doi.org/10.1145/2445566.2445569}, doi = {10.1145/2445566.2445569}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/AliAKK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsg/RahmanAB13, author = {Mohammad Ashiqur Rahman and Ehab Al{-}Shaer and Padmalochan Bera}, title = {A Noninvasive Threat Analyzer for Advanced Metering Infrastructure in Smart Grid}, journal = {{IEEE} Trans. Smart Grid}, volume = {4}, number = {1}, pages = {273--287}, year = {2013}, url = {https://doi.org/10.1109/TSG.2012.2228283}, doi = {10.1109/TSG.2012.2228283}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsg/RahmanAB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEscc/DuanWMA13, author = {Qi Duan and Yongge Wang and Fadi Mohsen and Ehab Al{-}Shaer}, title = {Private and Anonymous Data Storage and Distribution in Cloud}, booktitle = {2013 {IEEE} International Conference on Services Computing, Santa Clara, CA, USA, June 28 - July 3, 2013}, pages = {264--271}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SCC.2013.53}, doi = {10.1109/SCC.2013.53}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEscc/DuanWMA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEscc/Al-HajAR13, author = {Saeed Al{-}Haj and Ehab Al{-}Shaer and HariGovind V. Ramasamy}, title = {Security-Aware Resource Allocation in Clouds}, booktitle = {2013 {IEEE} International Conference on Services Computing, Santa Clara, CA, USA, June 28 - July 3, 2013}, pages = {400--407}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SCC.2013.36}, doi = {10.1109/SCC.2013.36}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEscc/Al-HajAR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RahmanMA13, author = {Mohammad Ashiqur Rahman and Fadi Mohsen and Ehab Al{-}Shaer}, editor = {Benessa Defend and Klaus Kursawe}, title = {A formal model for sustainable vehicle-to-grid management}, booktitle = {SEGS'13, Proceedings of the 2013 {ACM} Workshop on Smart Energy Grid Security, Co-located with {CCS} 2013, November 8, 2013, Berlin, Germany}, pages = {81--92}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2516930.2516937}, doi = {10.1145/2516930.2516937}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RahmanMA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AliA13, author = {Muhammad Qasim Ali and Ehab Al{-}Shaer}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Configuration-based {IDS} for advanced metering infrastructure}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {451--462}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516745}, doi = {10.1145/2508859.2516745}, timestamp = {Tue, 10 Nov 2020 19:58:06 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AliA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AshfaqAAK13, author = {Ayesha Binte Ashfaq and Muhammad Qasim Ali and Ehab Al{-}Shaer and Syed Ali Khayam}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Revisiting anomaly detection system design philosophy}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1473--1476}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2512529}, doi = {10.1145/2508859.2512529}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AshfaqAAK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/RahmanMA13, author = {Mohammad Ashiqur Rahman and Mohammad Hossein Manshaei and Ehab Al{-}Shaer}, title = {A game-theoretic approach for deceiving Remote Operating System Fingerprinting}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {73--81}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682694}, doi = {10.1109/CNS.2013.6682694}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cns/RahmanMA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/DuanAJ13, author = {Qi Duan and Ehab Al{-}Shaer and Jafar Haadi Jafarian}, title = {Efficient Random Route Mutation considering flow and network constraints}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {260--268}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682715}, doi = {10.1109/CNS.2013.6682715}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/DuanAJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AlsalehAA13, author = {Mohammed Noraden Alsaleh and Saeed Al{-}Haj and Ehab Al{-}Shaer}, title = {Objective metrics for firewall security: {A} holistic view}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {470--477}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682762}, doi = {10.1109/CNS.2013.6682762}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/AlsalehAA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsm/Al-HajA13, author = {Saeed Al{-}Haj and Ehab Al{-}Shaer}, title = {A formal approach for virtual machine migration planning}, booktitle = {Proceedings of the 9th International Conference on Network and Service Management, {CNSM} 2013, Zurich, Switzerland, October 14-18, 2013}, pages = {51--58}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/CNSM.2013.6727809}, doi = {10.1109/CNSM.2013.6727809}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cnsm/Al-HajA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/JafarianAD13, author = {Jafar Haadi Jafarian and Ehab Al{-}Shaer and Qi Duan}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Formal Approach for Route Agility against Persistent Attackers}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {237--254}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_14}, doi = {10.1007/978-3-642-40203-6\_14}, timestamp = {Wed, 25 Sep 2019 18:03:15 +0200}, biburl = {https://dblp.org/rec/conf/esorics/JafarianAD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/DemirciGAA13, author = {Mehmet Demirci and Fida Gillani and Mostafa H. Ammar and Ehab Al{-}Shaer}, title = {Overlay network placement for diagnosability}, booktitle = {2013 {IEEE} Global Communications Conference, {GLOBECOM} 2013, Atlanta, GA, USA, December 9-13, 2013}, pages = {2236--2242}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/GLOCOM.2013.6831407}, doi = {10.1109/GLOCOM.2013.6831407}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globecom/DemirciGAA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccps/RahmanDA13, author = {Mohammad Ashiqur Rahman and Qi Duan and Ehab Al{-}Shaer}, editor = {Chenyang Lu and P. R. Kumar and Radu Stoleru}, title = {Energy efficient navigation management for hybrid electric vehicles on highways}, booktitle = {{ACM/IEEE} 4th International Conference on Cyber-Physical Systems (with {CPS} Week 2013), {ICCPS} '13, Philadelphia, PA, USA, April 8-11, 2013}, pages = {21--30}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2502524.2502528}, doi = {10.1145/2502524.2502528}, timestamp = {Thu, 08 Apr 2021 08:40:46 +0200}, biburl = {https://dblp.org/rec/conf/iccps/RahmanDA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/RahmanA13, author = {Mohammad Ashiqur Rahman and Ehab Al{-}Shaer}, title = {A Formal Framework for Network Security Design Synthesis}, booktitle = {{IEEE} 33rd International Conference on Distributed Computing Systems, {ICDCS} 2013, 8-11 July, 2013, Philadelphia, Pennsylvania, {USA}}, pages = {560--570}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ICDCS.2013.70}, doi = {10.1109/ICDCS.2013.70}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/RahmanA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/im/RahmanA13, author = {Mohammad Ashiqur Rahman and Ehab Al{-}Shaer}, editor = {Filip De Turck and Yixin Diao and Choong Seon Hong and Deep Medhi and Ramin Sadre}, title = {A formal approach for network security management based on qualitative risk analysis}, booktitle = {2013 {IFIP/IEEE} International Symposium on Integrated Network Management {(IM} 2013), Ghent, Belgium, May 27-31, 2013}, pages = {244--251}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/document/6572992/}, timestamp = {Tue, 10 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/im/RahmanA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobicom/Al-ShaerDAY13, author = {Ehab Al{-}Shaer and Qi Duan and Saeed Al{-}Haj and Moustafa Youssef}, editor = {Thomas F. La Porta and Habib M. Ammari}, title = {SensorChecker: reachability verification in mission-oriented sensor networks}, booktitle = {Proceedings of the 2nd {ACM} annual international workshop on Mission-oriented wireless sensor networking, MiSeNet@MobiCom 2013, Miami, Florida, USA, October 4, 2013}, pages = {51--56}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2509338.2509344}, doi = {10.1145/2509338.2509344}, timestamp = {Wed, 24 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobicom/Al-ShaerDAY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/RahmanA13, author = {Mohammad Ashiqur Rahman and Ehab Al{-}Shaer}, title = {Metrics for Automated Network Security Design}, booktitle = {20th Annual Network and Distributed System Security Symposium, {NDSS} 2013, San Diego, California, USA, February 24-27, 2013}, publisher = {The Internet Society}, year = {2013}, url = {https://www.ndss-symposium.org/ndss2013/metrics-automated-network-security-design}, timestamp = {Mon, 01 Feb 2021 08:42:13 +0100}, biburl = {https://dblp.org/rec/conf/ndss/RahmanA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartgridcomm/RahmanAR13, author = {Mohammad Ashiqur Rahman and Ehab Al{-}Shaer and Md. Ashfaqur Rahman}, title = {A formal model for verifying stealthy attacks on state estimation in power grids}, booktitle = {{IEEE} Fourth International Conference on Smart Grid Communications, SmartGridComm 2013, Vancouver, BC, Canada, October 21-24, 2013}, pages = {414--419}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/SmartGridComm.2013.6687993}, doi = {10.1109/SMARTGRIDCOMM.2013.6687993}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/smartgridcomm/RahmanAR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartgridcomm/AliA13, author = {Muhammad Qasim Ali and Ehab Al{-}Shaer}, title = {Probabilistic model checking for {AMI} intrusion detection}, booktitle = {{IEEE} Fourth International Conference on Smart Grid Communications, SmartGridComm 2013, Vancouver, BC, Canada, October 21-24, 2013}, pages = {468--473}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/SmartGridComm.2013.6688002}, doi = {10.1109/SMARTGRIDCOMM.2013.6688002}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/smartgridcomm/AliA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartgridcomm/AliAD13, author = {Muhammad Qasim Ali and Ehab Al{-}Shaer and Qi Duan}, title = {Randomizing {AMI} configuration for proactive defense in smart grid}, booktitle = {{IEEE} Fourth International Conference on Smart Grid Communications, SmartGridComm 2013, Vancouver, BC, Canada, October 21-24, 2013}, pages = {618--623}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/SmartGridComm.2013.6688027}, doi = {10.1109/SMARTGRIDCOMM.2013.6688027}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/smartgridcomm/AliAD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/safeconfig/2012, editor = {Ehab Al{-}Shaer and Xinming Ou and Geoffrey G. Xie}, title = {Automated Security Management [papers from SafeConfig 2012, Baltimore Inner Harbor, MD, {USA]}}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-01433-3}, doi = {10.1007/978-3-319-01433-3}, isbn = {978-3-319-01432-6}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/safeconfig/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/TangAJ12, author = {Yongning Tang and Ehab Al{-}Shaer and Kaustubh R. Joshi}, title = {Reasoning under Uncertainty for Overlay Fault Diagnosis}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {9}, number = {1}, pages = {34--47}, year = {2012}, url = {https://doi.org/10.1109/TNSM.2011.010312.110126}, doi = {10.1109/TNSM.2011.010312.110126}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnsm/TangAJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/SamakA12, author = {Taghrid Samak and Ehab Al{-}Shaer}, title = {Fuzzy Conflict Analysis for QoS Policy Parameters in DiffServ Networks}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {9}, number = {4}, pages = {459--472}, year = {2012}, url = {https://doi.org/10.1109/TNSM.2012.062512.120308}, doi = {10.1109/TNSM.2012.062512.120308}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnsm/SamakA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GillaniAAK12, author = {Syed Fida Gillani and Ehab Al{-}Shaer and Sardar Ali and Syed Ali Khayam}, editor = {Heung Youl Youm and Yoojae Won}, title = {Monetizing spambot activity and understanding its relation with spambot traffic features}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {51--52}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414486}, doi = {10.1145/2414456.2414486}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GillaniAAK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsm/GillaniAAD12, author = {Fida Gillani and Ehab Al{-}Shaer and Mostafa H. Ammar and Mehmet Demirci}, title = {Fine-grain diagnosis of overlay performance anomalies using end-point network experiences}, booktitle = {8th International Conference on Network and Service Management, {CNSM} 2012, Las Vegas, NV, USA, October 22-26, 2012}, pages = {91--99}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6379996/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsm/GillaniAAD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsm/DuanAA12, author = {Qi Duan and Saeed Al{-}Haj and Ehab Al{-}Shaer}, title = {Provable configuration planning for wireless sensor networks}, booktitle = {8th International Conference on Network and Service Management, {CNSM} 2012, Las Vegas, NV, USA, October 22-26, 2012}, pages = {316--321}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6380036/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsm/DuanAA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexa/ShehabABA12, author = {Mohamed Shehab and Saeed Al{-}Haj and Salil Bhagurkar and Ehab Al{-}Shaer}, editor = {Stephen W. Liddle and Klaus{-}Dieter Schewe and A Min Tjoa and Xiaofang Zhou}, title = {Anomaly Discovery and Resolution in MySQL Access Control Policies}, booktitle = {Database and Expert Systems Applications - 23rd International Conference, {DEXA} 2012, Vienna, Austria, September 3-6, 2012. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {7447}, pages = {514--522}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32597-7\_47}, doi = {10.1007/978-3-642-32597-7\_47}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dexa/ShehabABA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/RahmanBA12, author = {Mohammad Ashiqur Rahman and Padmalochan Bera and Ehab Al{-}Shaer}, editor = {Albert G. Greenberg and Kazem Sohraby}, title = {SmartAnalyzer: {A} noninvasive security threat analyzer for {AMI} smart grid}, booktitle = {Proceedings of the {IEEE} {INFOCOM} 2012, Orlando, FL, USA, March 25-30, 2012}, pages = {2255--2263}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/INFCOM.2012.6195611}, doi = {10.1109/INFCOM.2012.6195611}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/RahmanBA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/TranAAB12, author = {Tung Tran and Issam Aib and Ehab Al{-}Shaer and Raouf Boutaba}, editor = {Filip De Turck and Luciano Paschoal Gaspary and Deep Medhi}, title = {An evasive attack on {SNORT} flowbits}, booktitle = {2012 {IEEE} Network Operations and Management Symposium, {NOMS} 2012, Maui, HI, USA, April 16-20, 2012}, pages = {351--358}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/NOMS.2012.6211918}, doi = {10.1109/NOMS.2012.6211918}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/noms/TranAAB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/AmezzianeAA12, author = {Mohamed Amezziane and Ehab Al{-}Shaer and Muhammad Qasim Ali}, editor = {Filip De Turck and Luciano Paschoal Gaspary and Deep Medhi}, title = {On stochastic risk ordering of network services for proactive security management}, booktitle = {2012 {IEEE} Network Operations and Management Symposium, {NOMS} 2012, Maui, HI, USA, April 16-20, 2012}, pages = {994--1000}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/NOMS.2012.6212020}, doi = {10.1109/NOMS.2012.6212020}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/noms/AmezzianeAA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safeconfig/AlsalehAE12, author = {Mohammed Noraden Alsaleh and Ehab Al{-}Shaer and Adel El{-}Atawy}, editor = {Ehab Al{-}Shaer and Xinming Ou and Geoffrey G. Xie}, title = {Towards a Unified Modeling and Verification of Network and System Security Configurations}, booktitle = {Automated Security Management [papers from SafeConfig 2012, Baltimore Inner Harbor, MD, {USA]}}, pages = {3--19}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-319-01433-3\_1}, doi = {10.1007/978-3-319-01433-3\_1}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/safeconfig/AlsalehAE12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safeconfig/RahmanA12, author = {Mohammad Ashiqur Rahman and Ehab Al{-}Shaer}, editor = {Ehab Al{-}Shaer and Xinming Ou and Geoffrey G. Xie}, title = {A Declarative Logic-Based Approach for Threat Analysis of Advanced Metering Infrastructure}, booktitle = {Automated Security Management [papers from SafeConfig 2012, Baltimore Inner Harbor, MD, {USA]}}, pages = {59--77}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-319-01433-3\_4}, doi = {10.1007/978-3-319-01433-3\_4}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/safeconfig/RahmanA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/Al-ShaerDJ12, author = {Ehab Al{-}Shaer and Qi Duan and Jafar Haadi Jafarian}, editor = {Angelos D. Keromytis and Roberto Di Pietro}, title = {Random Host Mutation for Moving Target Defense}, booktitle = {Security and Privacy in Communication Networks - 8th International {ICST} Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {106}, pages = {310--327}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-36883-7\_19}, doi = {10.1007/978-3-642-36883-7\_19}, timestamp = {Tue, 23 May 2017 01:12:12 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/Al-ShaerDJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/JafarianAD12, author = {Jafar Haadi Jafarian and Ehab Al{-}Shaer and Qi Duan}, editor = {Nick Feamster and Jennifer Rexford}, title = {Openflow random host mutation: transparent moving target defense using software defined networking}, booktitle = {Proceedings of the first workshop on Hot topics in software defined networks, HotSDN@SIGCOMM 2012, Helsinki, Finland, August 13, 2012}, pages = {127--132}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2342441.2342467}, doi = {10.1145/2342441.2342467}, timestamp = {Mon, 26 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigcomm/JafarianAD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/RahmanBSA12, author = {Mohammad Ashiqur Rahman and Libin Bai and Mohamed Shehab and Ehab Al{-}Shaer}, editor = {Geyong Min and Yulei Wu and Lei (Chris) Liu and Xiaolong Jin and Stephen A. Jarvis and Ahmed Yassin Al{-}Dubai}, title = {Secure Distributed Solution for Optimal Energy Consumption Scheduling in Smart Grid}, booktitle = {11th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, Liverpool, United Kingdom, June 25-27, 2012}, pages = {279--286}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/TrustCom.2012.252}, doi = {10.1109/TRUSTCOM.2012.252}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/RahmanBSA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnsm/AhmedATK11, author = {Mohammad Salim Ahmed and Ehab Al{-}Shaer and Mohamed Mahmoud Taibah and Latifur Khan}, title = {Objective Risk Evaluation for Automated Security Management}, journal = {J. Netw. Syst. Manag.}, volume = {19}, number = {3}, pages = {343--366}, year = {2011}, url = {https://doi.org/10.1007/s10922-010-9177-6}, doi = {10.1007/S10922-010-9177-6}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnsm/AhmedATK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SalahSSA11, author = {Khaled Salah and Karim Sattar and Mohammed H. Sqalli and Ehab Al{-}Shaer}, title = {A potential low-rate DoS attack against network firewalls}, journal = {Secur. Commun. Networks}, volume = {4}, number = {2}, pages = {136--146}, year = {2011}, url = {https://doi.org/10.1002/sec.118}, doi = {10.1002/SEC.118}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SalahSSA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cnsm/0007A11, author = {Bin Zhang and Ehab Al{-}Shaer}, title = {On synthesizing distributed firewall configurations considering risk, usability and cost constraints}, booktitle = {7th International Conference on Network and Service Management, {CNSM} 2011, Paris, France, October 24-28, 2011}, pages = {1--8}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6103995/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cnsm/0007A11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/im/RahmanA11, author = {Mohammad Ashiqur Rahman and Ehab Al{-}Shaer}, editor = {Nazim Agoulmine and Claudio Bartolini and Tom Pfeifer and Declan O'Sullivan}, title = {A declarative approach for global network security configuration verification and evaluation}, booktitle = {Proceedings of the 12th {IFIP/IEEE} International Symposium on Integrated Network Management, {IM} 2011, Dublin, Ireland, 23-27 May 2011}, pages = {531--538}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/INM.2011.5990556}, doi = {10.1109/INM.2011.5990556}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/im/RahmanA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwqos/SamakEA11, author = {Taghrid Samak and Adel El{-}Atawy and Ehab Al{-}Shaer}, title = {QoS policy verification for DiffServ networks}, booktitle = {19th International Workshop on Quality of Service, IWQoS 2011, San Jose, California, USA, 6-7 June 2011}, pages = {1--3}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/IWQOS.2011.5931332}, doi = {10.1109/IWQOS.2011.5931332}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/iwqos/SamakEA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safeconfig/Al-HajA11, author = {Saeed Al{-}Haj and Ehab Al{-}Shaer}, editor = {John Banghart and Ehab Al{-}Shaer and Tony Sager and HariGovind V. Ramasamy}, title = {CloudChecker: An imperative framework for cloud configuration management}, booktitle = {4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31 - November 1, 2011}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/SafeConfig.2011.6111666}, doi = {10.1109/SAFECONFIG.2011.6111666}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/safeconfig/Al-HajA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safeconfig/Al-HajA11a, author = {Saeed Al{-}Haj and Ehab Al{-}Shaer}, editor = {John Banghart and Ehab Al{-}Shaer and Tony Sager and HariGovind V. Ramasamy}, title = {Measuring Firewall Security}, booktitle = {4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31 - November 1, 2011}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/SafeConfig.2011.6111669}, doi = {10.1109/SAFECONFIG.2011.6111669}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/safeconfig/Al-HajA11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safeconfig/Al-ShaerA11, author = {Ehab Al{-}Shaer and Mohammed Noraden Alsaleh}, editor = {John Banghart and Ehab Al{-}Shaer and Tony Sager and HariGovind V. Ramasamy}, title = {ConfigChecker: {A} tool for comprehensive security configuration analytics}, booktitle = {4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31 - November 1, 2011}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/SafeConfig.2011.6111667}, doi = {10.1109/SAFECONFIG.2011.6111667}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/safeconfig/Al-ShaerA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safeconfig/AlsalehA11, author = {Mohammed Noraden Alsaleh and Ehab Al{-}Shaer}, editor = {John Banghart and Ehab Al{-}Shaer and Tony Sager and HariGovind V. Ramasamy}, title = {{SCAP} Based Configuration Analytics for Comprehensive Compliance Checking}, booktitle = {4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31 - November 1, 2011}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/SafeConfig.2011.6111674}, doi = {10.1109/SAFECONFIG.2011.6111674}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/safeconfig/AlsalehA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safeconfig/NarainMA11, author = {Sanjai Narain and Sharad Malik and Ehab Al{-}Shaer}, editor = {John Banghart and Ehab Al{-}Shaer and Tony Sager and HariGovind V. Ramasamy}, title = {Towards Eliminating Configuration Errors in Cyber Infrastructure}, booktitle = {4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31 - November 1, 2011}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/SafeConfig.2011.6111678}, doi = {10.1109/SAFECONFIG.2011.6111678}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/safeconfig/NarainMA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safeconfig/RahmanA11, author = {Mohammad Ashiqur Rahman and Ehab Al{-}Shaer}, editor = {John Banghart and Ehab Al{-}Shaer and Tony Sager and HariGovind V. Ramasamy}, title = {AMIAnalyzer: Security analysis of {AMI} configurations}, booktitle = {4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31 - November 1, 2011}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/SafeConfig.2011.6111662}, doi = {10.1109/SAFECONFIG.2011.6111662}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/safeconfig/RahmanA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/Al-HajBA11, author = {Saeed Al{-}Haj and Padmalochan Bera and Ehab Al{-}Shaer}, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {Build and Test Your Own Network Configuration}, booktitle = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, pages = {522--532}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31909-9\_33}, doi = {10.1007/978-3-642-31909-9\_33}, timestamp = {Tue, 23 May 2017 01:12:12 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/Al-HajBA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Al-Shaer11, author = {Ehab Al{-}Shaer}, editor = {Sushil Jajodia and Anup K. Ghosh and Vipin Swarup and Cliff Wang and Xiaoyang Sean Wang}, title = {Toward Network Configuration Randomization for Moving Target Defense}, booktitle = {Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats}, series = {Advances in Information Security}, volume = {54}, pages = {153--159}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4614-0977-9\_9}, doi = {10.1007/978-1-4614-0977-9\_9}, timestamp = {Tue, 16 May 2017 14:24:25 +0200}, biburl = {https://dblp.org/rec/series/ais/Al-Shaer11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/safeconfig/2011, editor = {John Banghart and Ehab Al{-}Shaer and Tony Sager and HariGovind V. Ramasamy}, title = {4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31 - November 1, 2011}, publisher = {{IEEE}}, year = {2011}, timestamp = {Wed, 16 Jan 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/safeconfig/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Al-Shaer11, author = {Ehab Al{-}Shaer}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Firewalls}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {474--482}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_911}, doi = {10.1007/978-1-4419-5906-5\_911}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Al-Shaer11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijaras/RoychoudhuriA10, author = {Lopamudra Roychoudhuri and Ehab S. Al{-}Shaer}, title = {Autonomic QoS Optimization of Real-Time Internet Audio Using Loss Prediction and Stochastic Control}, journal = {Int. J. Adapt. Resilient Auton. Syst.}, volume = {1}, number = {3}, pages = {81--107}, year = {2010}, url = {https://doi.org/10.4018/jaras.2010070105}, doi = {10.4018/JARAS.2010070105}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijaras/RoychoudhuriA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/AbedinNKAA10, author = {Muhammad Abedin and Syeda Nessa and Latifur Khan and Ehab Al{-}Shaer and Mamoun Awad}, title = {Analysis of firewall policy rules using traffic mining techniques}, journal = {Int. J. Internet Protoc. Technol.}, volume = {5}, number = {1/2}, pages = {3--22}, year = {2010}, url = {https://doi.org/10.1504/IJIPT.2010.032611}, doi = {10.1504/IJIPT.2010.032611}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/AbedinNKAA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SamakA10, author = {Taghrid Samak and Ehab Al{-}Shaer}, editor = {Rachel Greenstadt}, title = {Synthetic security policy generation via network traffic clustering}, booktitle = {Proceedings of the 3rd {ACM} Workshop on Security and Artificial Intelligence, AISec 2010, Chicago, Illinois, USA, October 8, 2010}, pages = {45--53}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866423.1866433}, doi = {10.1145/1866423.1866433}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SamakA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ZhangA10, author = {Bin Zhang and Ehab Al{-}Shaer}, title = {Towards Automatic Creation of Usable Security Configuration}, booktitle = {{INFOCOM} 2010. 29th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 15-19 March 2010, San Diego, CA, {USA}}, pages = {341--345}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/INFCOM.2010.5462215}, doi = {10.1109/INFCOM.2010.5462215}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/ZhangA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/Al-Shaer10, author = {Ehab Al{-}Shaer}, editor = {James B. D. Joshi and Barbara Carminati}, title = {Automated management of network access control from design to enforcement}, booktitle = {15th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings}, pages = {77}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1809842.1809844}, doi = {10.1145/1809842.1809844}, timestamp = {Tue, 06 Nov 2018 16:57:59 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/Al-Shaer10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safeconfig/Al-ShaerA10, author = {Ehab Al{-}Shaer and Saeed Al{-}Haj}, editor = {Tony Sager and Gail{-}Joon Ahn and Krishna Kant and Heather Richter Lipford}, title = {FlowChecker: configuration analysis and verification of federated openflow infrastructures}, booktitle = {3rd {ACM} Workshop on Assurable and Usable Security Configuration, SafeConfig 2010, Chicago, IL, USA, October 4, 2010}, pages = {37--44}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866898.1866905}, doi = {10.1145/1866898.1866905}, timestamp = {Thu, 13 Feb 2020 15:16:46 +0100}, biburl = {https://dblp.org/rec/conf/safeconfig/Al-ShaerA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2010, editor = {Ehab Al{-}Shaer and Angelos D. Keromytis and Vitaly Shmatikov}, title = {Proceedings of the 17th {ACM} Conference on Computer and Communications Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010}, publisher = {{ACM}}, year = {2010}, isbn = {978-1-4503-0245-6}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2010insider-threats, editor = {Ehab Al{-}Shaer and Brent Lagesse and Craig A. Shue}, title = {Proceedings of the 2010 {ACM} workshop on Insider threats, Insider Threats '10, Chicago, Illinois, USA, October 8, 2010}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866886}, doi = {10.1145/1866886}, isbn = {978-1-4503-0092-6}, timestamp = {Thu, 17 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2010insider-threats.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/drm/2010, editor = {Ehab Al{-}Shaer and Hongxia Jin and Marc Joye}, title = {Proceedings of the 10th {ACM} Workshop on Digital Rights Management, Chicago, Illinois, USA, October 4, 2010}, publisher = {{ACM}}, year = {2010}, url = {http://dl.acm.org/citation.cfm?id=1866870}, isbn = {978-1-4503-0091-9}, timestamp = {Wed, 28 Mar 2012 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/drm/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wpes/2010, editor = {Ehab Al{-}Shaer and Keith B. Frikken}, title = {Proceedings of the 2010 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2010, Chicago, Illinois, USA, October 4, 2010}, publisher = {{ACM}}, year = {2010}, isbn = {978-1-4503-0096-4}, timestamp = {Fri, 04 Feb 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccr/Al-ShaerGKMNX09, author = {Ehab Al{-}Shaer and Albert G. Greenberg and Charles R. Kalmanek and David A. Maltz and T. S. Eugene Ng and Geoffrey G. Xie}, title = {New frontiers in internet network management}, journal = {Comput. Commun. Rev.}, volume = {39}, number = {5}, pages = {37--39}, year = {2009}, url = {https://doi.org/10.1145/1629607.1629615}, doi = {10.1145/1629607.1629615}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccr/Al-ShaerGKMNX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/Al-ShaerES09, author = {Ehab Al{-}Shaer and Adel El{-}Atawy and Taghrid Samak}, title = {Automated pseudo-live testing of firewall configuration enforcement}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {27}, number = {3}, pages = {302--314}, year = {2009}, url = {https://doi.org/10.1109/JSAC.2009.090406}, doi = {10.1109/JSAC.2009.090406}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/Al-ShaerES09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ElbadawiA09, author = {Khalid Elbadawi and Ehab Al{-}Shaer}, editor = {Wanqing Li and Willy Susilo and Udaya Kiran Tupakula and Reihaneh Safavi{-}Naini and Vijay Varadharajan}, title = {TimeVM: a framework for online intrusion mitigation and fast recovery using multi-time-lag traffic replay}, booktitle = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2009, Sydney, Australia, March 10-12, 2009}, pages = {135--145}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1533057.1533077}, doi = {10.1145/1533057.1533077}, timestamp = {Fri, 18 Mar 2022 11:47:58 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ElbadawiA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/TangA09, author = {Yongning Tang and Ehab Al{-}Shaer}, title = {Sharing end-user negative symptoms for improving overlay network dependability}, booktitle = {Proceedings of the 2009 {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2009, Estoril, Lisbon, Portugal, June 29 - July 2, 2009}, pages = {275--284}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/DSN.2009.5270328}, doi = {10.1109/DSN.2009.5270328}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/TangA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/SmithAE09, author = {Kyle Smith and Ehab Al{-}Shaer and Khalid Elbadawi}, title = {Information Theoretic Approach for Characterizing Spam Botnets Based on Traffic Properties}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2009, Dresden, Germany, 14-18 June 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICC.2009.5199083}, doi = {10.1109/ICC.2009.5199083}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/SmithAE09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/Al-ShaerMEE09, author = {Ehab Al{-}Shaer and Wilfredo Marrero and Adel El{-}Atawy and Khalid Elbadawi}, editor = {Henning Schulzrinne and K. K. Ramakrishnan and Timothy G. Griffin and Srikanth V. Krishnamurthy}, title = {Network Configuration in {A} Box: Towards End-to-End Verification of Network Reachability and Security}, booktitle = {Proceedings of the 17th annual {IEEE} International Conference on Network Protocols, 2009. {ICNP} 2009, Princeton, NJ, USA, 13-16 October 2009}, pages = {123--132}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ICNP.2009.5339690}, doi = {10.1109/ICNP.2009.5339690}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/Al-ShaerMEE09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/im/ZhangA09, author = {Bin Zhang and Ehab Al{-}Shaer}, title = {Optimizing correlation structure of event services considering time and capacity constraints}, booktitle = {Integrated Network Management, {IM} 2009. 11th {IFIP/IEEE} International Symposium on Integrated Network Management, Hofstra University, Long Island, NY, USA, June 1-5, 2009}, pages = {203--210}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/INM.2009.5188811}, doi = {10.1109/INM.2009.5188811}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/im/ZhangA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/El-AtawyA09, author = {Adel El{-}Atawy and Ehab Al{-}Shaer}, title = {Building Covert Channels over the Packet Reordering Phenomenon}, booktitle = {{INFOCOM} 2009. 28th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 19-25 April 2009, Rio de Janeiro, Brazil}, pages = {2186--2194}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/INFCOM.2009.5062143}, doi = {10.1109/INFCOM.2009.5062143}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/El-AtawyA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/El-AtawyATB09, author = {Adel El{-}Atawy and Ehab Al{-}Shaer and Tung Tran and Raouf Boutaba}, title = {Adaptive Early Packet Filtering for Defending Firewalls Against DoS Attacks}, booktitle = {{INFOCOM} 2009. 28th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 19-25 April 2009, Rio de Janeiro, Brazil}, pages = {2437--2445}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/INFCOM.2009.5062171}, doi = {10.1109/INFCOM.2009.5062171}, timestamp = {Wed, 28 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/El-AtawyATB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/TangA09, author = {Yongning Tang and Ehab Al{-}Shaer}, title = {Overlay Fault Diagnosis Based on Evidential Reasoning}, booktitle = {{INFOCOM} 2009. 28th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 19-25 April 2009, Rio de Janeiro, Brazil}, pages = {2596--2600}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/INFCOM.2009.5062194}, doi = {10.1109/INFCOM.2009.5062194}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/TangA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nas/TangCXA09, author = {Yongning Tang and Guang Cheng and Zhiwei Xu and Ehab Al{-}Shaer}, title = {Community-base Fault Diagnosis Using Incremental Belief Revision}, booktitle = {International Conference on Networking, Architecture, and Storage, {NAS} 2009, 9-11 July 2009, Zhang Jia Jie, Hunan, China}, pages = {121--128}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/NAS.2009.24}, doi = {10.1109/NAS.2009.24}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nas/TangCXA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safeconfig/SamakEA09, author = {Taghrid Samak and Adel El{-}Atawy and Ehab Al{-}Shaer}, editor = {Ehab Al{-}Shaer and Mohamed G. Gouda and Jorge Lobo and Sanjai Narain and Felix Wu}, title = {Towards network security policy generation for configuration analysis and testing}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Assurable and Usable Security Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009}, pages = {45--52}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655062.1655072}, doi = {10.1145/1655062.1655072}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/safeconfig/SamakEA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2009, editor = {Ehab Al{-}Shaer and Somesh Jha and Angelos D. Keromytis}, title = {Proceedings of the 2009 {ACM} Conference on Computer and Communications Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009}, publisher = {{ACM}}, year = {2009}, isbn = {978-1-60558-894-0}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/drm/2009, editor = {Ehab Al{-}Shaer and Hongxia Jin and Gregory L. Heileman}, title = {Proceedings of the 9th {ACM} Workshop on Digital Rights Management, Chicago, Illinois, USA, November 9, 2009}, publisher = {{ACM}}, year = {2009}, isbn = {978-1-60558-779-0}, timestamp = {Wed, 25 Nov 2009 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/safeconfig/2009, editor = {Ehab Al{-}Shaer and Mohamed G. Gouda and Jorge Lobo and Sanjai Narain and Felix Wu}, title = {Proceedings of the 2nd {ACM} Workshop on Assurable and Usable Security Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009}, publisher = {{ACM}}, year = {2009}, url = {http://dl.acm.org/citation.cfm?id=1655062}, isbn = {978-1-60558-778-3}, timestamp = {Thu, 21 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/safeconfig/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wpes/2009, editor = {Ehab Al{-}Shaer and Stefano Paraboschi}, title = {Proceedings of the 2009 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2009, Chicago, Illinois, USA, November 9, 2009}, publisher = {{ACM}}, year = {2009}, isbn = {978-1-60558-783-7}, timestamp = {Fri, 04 Feb 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnm/YanEA08, author = {Yonghe Yan and Adel El{-}Atawy and Ehab Al{-}Shaer}, title = {A game-theoretic model for capacity-constrained fair bandwidth allocation}, journal = {Int. J. Netw. Manag.}, volume = {18}, number = {6}, pages = {485--504}, year = {2008}, url = {https://doi.org/10.1002/nem.709}, doi = {10.1002/NEM.709}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnm/YanEA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnsm/Al-ShaerKW08, author = {Ehab Al{-}Shaer and Charles R. Kalmanek and Felix Wu}, title = {Automated Security Configuration Management}, journal = {J. Netw. Syst. Manag.}, volume = {16}, number = {3}, pages = {231--233}, year = {2008}, url = {https://doi.org/10.1007/s10922-008-9105-1}, doi = {10.1007/S10922-008-9105-1}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnsm/Al-ShaerKW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/TangAB08, author = {Yongning Tang and Ehab Al{-}Shaer and Raouf Boutaba}, title = {Efficient fault diagnosis using incremental alarm correlation and active investigation for internet and overlay networks}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {5}, number = {1}, pages = {36--49}, year = {2008}, url = {https://doi.org/10.1109/TNSM.2008.080104}, doi = {10.1109/TNSM.2008.080104}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnsm/TangAB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/Al-ShaerKA08, author = {Ehab Al{-}Shaer and Latifur Khan and Mohammad Salim Ahmed}, editor = {Frederick T. Sheldon and Axel W. Krings and Robert K. Abercrombie and Ali Mili}, title = {A comprehensive objective network security metric framework for proactive security configuration}, booktitle = {Proceedings of the 4th annual workshop on Cyber security and information intelligence research - developing strategies to meet the cyber security and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge, Tennessee, USA, May 12-14, 2008}, pages = {42:1--42:3}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1413140.1413189}, doi = {10.1145/1413140.1413189}, timestamp = {Wed, 31 Jan 2024 20:36:02 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/Al-ShaerKA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/AhmedAK08, author = {Mohammad Salim Ahmed and Ehab Al{-}Shaer and Latifur Khan}, title = {A Novel Quantitative Approach For Measuring Network Security}, booktitle = {{INFOCOM} 2008. 27th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 13-18 April 2008, Phoenix, AZ, {USA}}, pages = {1957--1965}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/INFOCOM.2008.260}, doi = {10.1109/INFOCOM.2008.260}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/AhmedAK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/TangA08, author = {Yongning Tang and Ehab Al{-}Shaer}, title = {Towards Collaborative User-Level Overlay Fault Diagnosis}, booktitle = {{INFOCOM} 2008. 27th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 13-18 April 2008, Phoenix, AZ, {USA}}, pages = {2476--2484}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/INFOCOM.2008.318}, doi = {10.1109/INFOCOM.2008.318}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/TangA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/AlsubhiAB08, author = {Khalid Alsubhi and Ehab Al{-}Shaer and Raouf Boutaba}, editor = {Marcus Brunner and Carlos Becker Westphall and Lisandro Zambenedetti Granville}, title = {Alert prioritization in Intrusion Detection Systems}, booktitle = {{IEEE/IFIP} Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, {NOMS} 2008, 7-11 April 2008, Salvador, Bahia, Brazil}, pages = {33--40}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/NOMS.2008.4575114}, doi = {10.1109/NOMS.2008.4575114}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/noms/AlsubhiAB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/AhmedATAK08, author = {Mohammad Salim Ahmed and Ehab Al{-}Shaer and Mohamed Mahmoud Taibah and Muhammad Abedin and Latifur Khan}, editor = {Marcus Brunner and Carlos Becker Westphall and Lisandro Zambenedetti Granville}, title = {Towards autonomic risk-aware security configuration}, booktitle = {{IEEE/IFIP} Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, {NOMS} 2008, 7-11 April 2008, Salvador, Bahia, Brazil}, pages = {722--725}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/NOMS.2008.4575198}, doi = {10.1109/NOMS.2008.4575198}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/noms/AhmedATAK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/Al-Shaer08, author = {Ehab Al{-}Shaer}, editor = {Marcus Brunner and Carlos Becker Westphall and Lisandro Zambenedetti Granville}, title = {Designing, optimizing, and evaluating network security configuration}, booktitle = {{IEEE/IFIP} Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, {NOMS} 2008, 7-11 April 2008, Salvador, Bahia, Brazil}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/NOMS.2008.4575105}, doi = {10.1109/NOMS.2008.4575105}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/noms/Al-Shaer08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/RoychoudhuriA08, author = {Lopamudra Roychoudhuri and Ehab S. Al{-}Shaer}, editor = {Marcus Brunner and Carlos Becker Westphall and Lisandro Zambenedetti Granville}, title = {Autonomic QoS optimization of real-time internet audio using loss prediction and stochastic control}, booktitle = {{IEEE/IFIP} Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, {NOMS} 2008, 7-11 April 2008, Salvador, Bahia, Brazil}, pages = {73--80}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/NOMS.2008.4575119}, doi = {10.1109/NOMS.2008.4575119}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/noms/RoychoudhuriA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/policy/SamakAL08, author = {Taghrid Samak and Ehab Al{-}Shaer and Hong Li}, title = {QoS Policy Modeling and Conflict Analysis}, booktitle = {9th {IEEE} International Workshop on Policies for Distributed Systems and Networks {(POLICY} 2008), 2-4 June 2008, Palisades, New York, {USA}}, pages = {19--26}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/POLICY.2008.40}, doi = {10.1109/POLICY.2008.40}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/policy/SamakAL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/LeBA08, author = {Anh Le and Raouf Boutaba and Ehab Al{-}Shaer}, editor = {Albert Levi and Peng Liu and Refik Molva}, title = {Correlation-based load balancing for network intrusion detection and prevention systems}, booktitle = {4th International {ICST} Conference on Security and Privacy in Communication Networks, {SECURECOMM} 2008, Istanbul, Turkey, September 22-25, 2008}, pages = {2}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1460877.1460880}, doi = {10.1145/1460877.1460880}, timestamp = {Tue, 06 Nov 2018 16:58:12 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/LeBA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsom/ZhangA07, author = {Bin Zhang and Ehab Al{-}Shaer}, editor = {Alexander Clemm and Lisandro Zambenedetti Granville and Rolf Stadler}, title = {Self-organizing Monitoring Agents for Hierarchical Event Correlation}, booktitle = {Managing Virtualization of Networks and Services, 18th {IFIP/IEEE} International Workshop on Distributed Systems: Operations and Management, {DSOM} 2007, San Jos{\'{e}}, CA, USA, October 29-31, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4785}, pages = {13--24}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75694-1\_2}, doi = {10.1007/978-3-540-75694-1\_2}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/dsom/ZhangA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/e2emon/SamakEAI07, author = {Taghrid Samak and Adel El{-}Atawy and Ehab Al{-}Shaer and Mohamed A. Ismail}, editor = {Kamil Sara{\c{c}} and Timur Friedman}, title = {A Novel Visualization Approach for Efficient Network-wide Traffic Monitoring}, booktitle = {Fifth {IEEE/IFIP} Workshop on End-to-End Monitoring Techniques and Services, {E2EMON} 2007, 21st May, 2007, Munich, Germany}, pages = {1--7}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/E2EMON.2007.375319}, doi = {10.1109/E2EMON.2007.375319}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/e2emon/SamakEAI07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/SamakEA07, author = {Taghrid Samak and Adel El{-}Atawy and Ehab Al{-}Shaer}, title = {FireCracker: {A} Framework for Inferring Firewall Policies using Smart Probing}, booktitle = {Proceedings of the {IEEE} International Conference on Network Protocols, {ICNP} 2007, October 16-19, 2007, Beijing, China}, pages = {294--303}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICNP.2007.4375860}, doi = {10.1109/ICNP.2007.4375860}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/SamakEA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/im/TangAZ07, author = {Yongning Tang and Ehab Al{-}Shaer and Bin Zhang}, title = {Toward Globally Optimal Event Monitoring {\&} Aggregation For Large-scale Overlay Networks}, booktitle = {Integrated Network Management, {IM} 2007. 10th {IFIP/IEEE} International Symposium on Integrated Network Management, Munich, Germany, 21-25 May 2007}, pages = {236--245}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/INM.2007.374788}, doi = {10.1109/INM.2007.374788}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/im/TangAZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/El-AtawySAL07, author = {Adel El{-}Atawy and Taghrid Samak and Ehab Al{-}Shaer and Hong Li}, title = {Using Online Traffic Statistical Matching for Optimizing Packet Filtering Performance}, booktitle = {{INFOCOM} 2007. 26th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 6-12 May 2007, Anchorage, Alaska, {USA}}, pages = {866--874}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/INFCOM.2007.106}, doi = {10.1109/INFCOM.2007.106}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/El-AtawySAL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/YanEA07, author = {Yonghe Yan and Adel El{-}Atawy and Ehab Al{-}Shaer}, title = {Ranking-Based Optimal Resource Allocation in Peer-to-Peer Networks}, booktitle = {{INFOCOM} 2007. 26th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 6-12 May 2007, Anchorage, Alaska, {USA}}, pages = {1100--1108}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/INFCOM.2007.132}, doi = {10.1109/INFCOM.2007.132}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/YanEA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lisa/TranAB07, author = {Tung Tran and Ehab S. Al{-}Shaer and Raouf Boutaba}, editor = {Paul Anderson}, title = {PolicyVis: Firewall Security Policy Visualization and Inspection}, booktitle = {Proceedings of the 21th Large Installation System Administration Conference, {LISA} 2007, Dallas, Texas, USA, November 11-16, 2007}, pages = {1--16}, publisher = {{USENIX}}, year = {2007}, url = {http://www.usenix.org/events/lisa07/tech/tran.html}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lisa/TranAB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/policy/El-AtawySWALPL07, author = {Adel El{-}Atawy and Taghrid Samak and Zein Wali and Ehab Al{-}Shaer and Frank Lin and Christopher Pham and Sheng Li}, title = {An Automated Framework for Validating Firewall Policy Enforcement}, booktitle = {8th {IEEE} International Workshop on Policies for Distributed Systems and Networks {(POLICY} 2007), 13-15 June 2007, Bologna, Italy}, pages = {151--160}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/POLICY.2007.5}, doi = {10.1109/POLICY.2007.5}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/policy/El-AtawySWALPL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/ZhangAJRP07, author = {Bin Zhang and Ehab Al{-}Shaer and Radha Jagadeesan and James Riely and Corin Pitcher}, editor = {Volkmar Lotz and Bhavani Thuraisingham}, title = {Specifications of a high-level conflict-free firewall policy language for multi-domain networks}, booktitle = {12th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings}, pages = {185--194}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1266840.1266871}, doi = {10.1145/1266840.1266871}, timestamp = {Wed, 29 Jun 2022 15:37:42 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/ZhangAJRP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/HamedA06, author = {Hazem Hamed and Ehab Al{-}Shaer}, title = {Taxonomy of conflicts in network security policies}, journal = {{IEEE} Commun. Mag.}, volume = {44}, number = {3}, pages = {134--141}, year = {2006}, url = {https://doi.org/10.1109/MCOM.2006.1607877}, doi = {10.1109/MCOM.2006.1607877}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/HamedA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/BoutabaAA06, author = {Raouf Boutaba and Ehab Al{-}Shaer and Kevin C. Almeroth}, title = {Special issue: monitoring and measurements of {IP} networks}, journal = {Comput. Commun.}, volume = {29}, number = {10}, pages = {1561--1563}, year = {2006}, url = {https://doi.org/10.1016/j.comcom.2005.07.007}, doi = {10.1016/J.COMCOM.2005.07.007}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/BoutabaAA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/RoychoudhuriAB06, author = {Lopamudra Roychoudhuri and Ehab S. Al{-}Shaer and Gregory B. Brewster}, title = {On the impact of loss and delay variation on Internet packet audio transmission}, journal = {Comput. Commun.}, volume = {29}, number = {10}, pages = {1578--1589}, year = {2006}, url = {https://doi.org/10.1016/j.comcom.2006.04.004}, doi = {10.1016/J.COMCOM.2006.04.004}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/RoychoudhuriAB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhsn/HamedA06, author = {Hazem H. Hamed and Ehab Al{-}Shaer}, title = {On autonomic optimization of firewall policy organization}, journal = {J. High Speed Networks}, volume = {15}, number = {3}, pages = {209--227}, year = {2006}, url = {http://content.iospress.com/articles/journal-of-high-speed-networks/jhs287}, timestamp = {Mon, 18 May 2015 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jhsn/HamedA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/HamedEA06, author = {Hazem H. Hamed and Adel El{-}Atawy and Ehab Al{-}Shaer}, title = {On Dynamic Optimization of Packet Matching in High-Speed Firewalls}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {24}, number = {10}, pages = {1817--1830}, year = {2006}, url = {https://doi.org/10.1109/JSAC.2006.877140}, doi = {10.1109/JSAC.2006.877140}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/HamedEA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AbedinNAK06, author = {Muhammad Abedin and Syeda Nessa and Ehab Al{-}Shaer and Latifur Khan}, editor = {G{\"{u}}nter Karjoth and Fabio Massacci}, title = {Vulnerability analysis For evaluating quality of protection of security policies}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Quality of Protection, QoP 2006, Alexandria, VA, USA, October 30, 2006}, pages = {49--52}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1179494.1179505}, doi = {10.1145/1179494.1179505}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AbedinNAK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HamedA06, author = {Hazem H. Hamed and Ehab Al{-}Shaer}, editor = {Ferng{-}Ching Lin and Der{-}Tsai Lee and Bao{-}Shuh Paul Lin and Shiuhpyng Shieh and Sushil Jajodia}, title = {Dynamic rule-ordering optimization for high-speed firewall filtering}, booktitle = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24, 2006}, pages = {332--342}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1128817.1128867}, doi = {10.1145/1128817.1128867}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HamedA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/HamedEA06, author = {Hazem H. Hamed and Adel El{-}Atawy and Ehab Al{-}Shaer}, title = {Adaptive Statistical Optimization Techniques for Firewall Packet Filtering}, booktitle = {{INFOCOM} 2006. 25th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 23-29 April 2006, Barcelona, Catalunya, Spain}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/INFOCOM.2006.129}, doi = {10.1109/INFOCOM.2006.129}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/HamedEA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/MasudKA06, author = {Mohammad M. Masud and Latifur Khan and Ehab Al{-}Shaer}, editor = {Sharad Mehrotra and Daniel Dajun Zeng and Hsinchun Chen and Bhavani Thuraisingham and Fei{-}Yue Wang}, title = {Email Worm Detection Using Na{\"{\i}}ve Bayes and Support Vector Machine}, booktitle = {Intelligence and Security Informatics, {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3975}, pages = {733--734}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11760146\_110}, doi = {10.1007/11760146\_110}, timestamp = {Fri, 17 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/MasudKA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/YanEA06, author = {Yonghe Yan and Adel El{-}Atawy and Ehab Al{-}Shaer}, editor = {Joseph L. Hellerstein and Burkhard Stiller}, title = {Fair Bandwidth Allocation under User Capacity Constraints}, booktitle = {Management of Integrated End-to-End Communications and Services, 10th {IEEE/IFIP} Network Operations and Management Symposium, {NOMS} 2006, Vancouver, Canada, April 3-7, 2006. Proceedings}, pages = {138--149}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/NOMS.2006.1687546}, doi = {10.1109/NOMS.2006.1687546}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/noms/YanEA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/GolnabiMKA06, author = {Korosh Golnabi and Richard K. Min and Latifur Khan and Ehab Al{-}Shaer}, editor = {Joseph L. Hellerstein and Burkhard Stiller}, title = {Analysis of Firewall Policy Rules Using Data Mining Techniques}, booktitle = {Management of Integrated End-to-End Communications and Services, 10th {IEEE/IFIP} Network Operations and Management Symposium, {NOMS} 2006, Vancouver, Canada, April 3-7, 2006. Proceedings}, pages = {305--315}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/NOMS.2006.1687561}, doi = {10.1109/NOMS.2006.1687561}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/noms/GolnabiMKA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/TaibahAB06, author = {Mohamed Mahmoud Taibah and Ehab Al{-}Shaer and Raouf Boutaba}, title = {An Architecture for an Email Worm Prevention System}, booktitle = {Second International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2006, Baltimore, MD, USA, August 2, 2006 - September 1, 2006}, pages = {1--9}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/SECCOMW.2006.359559}, doi = {10.1109/SECCOMW.2006.359559}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/TaibahAB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/e2emon/2006, editor = {Ehab Al{-}Shaer and Aiko Pras and Nevil Brownlee}, title = {Fourth {IEEE/IFIP} Workshop on End-to-End Monitoring Techniques and Services, E2EMON'06, 3rd April, 2006, Vancouver, BC, Canada}, publisher = {{IEEE}}, year = {2006}, url = {https://ieeexplore.ieee.org/xpl/conhome/10987/proceeding}, isbn = {1-4244-0145-3}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/e2emon/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ifip6/2006, editor = {Dominique Ga{\"{\i}}ti and Guy Pujolle and Ehab S. Al{-}Shaer and Kenneth L. Calvert and Simon A. Dobson and Guy Leduc and Olli Martikainen}, title = {Autonomic Networking, First International {IFIP} {TC6} Conference, {AN} 2006, Paris, France, September 27-29, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4195}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11880905}, doi = {10.1007/11880905}, isbn = {3-540-45891-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip6/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/Al-ShaerHBH05, author = {Ehab Al{-}Shaer and Hazem H. Hamed and Raouf Boutaba and Masum Hasan}, title = {Conflict classification and analysis of distributed firewall policies}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {23}, number = {10}, pages = {2069--2084}, year = {2005}, url = {https://doi.org/10.1109/JSAC.2005.854119}, doi = {10.1109/JSAC.2005.854119}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/Al-ShaerHBH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/RoychoudhuriA05, author = {Lopamudra Roychoudhuri and Ehab S. Al{-}Shaer}, title = {Real-time packet loss prediction based on end-to-end delay variation}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {2}, number = {1}, pages = {29--38}, year = {2005}, url = {https://doi.org/10.1109/TNSM.2005.4798299}, doi = {10.1109/TNSM.2005.4798299}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnsm/RoychoudhuriA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/HamedAM05, author = {Hazem H. Hamed and Ehab S. Al{-}Shaer and Will Marrero}, title = {Modeling and Verification of IPSec and {VPN} Security Policies}, booktitle = {13th {IEEE} International Conference on Network Protocols {(ICNP} 2005), 6-9 November 2005, Boston, MA, {USA}}, pages = {259--278}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ICNP.2005.25}, doi = {10.1109/ICNP.2005.25}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/HamedAM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/im/TangAB05, author = {Yongning Tang and Ehab S. Al{-}Shaer and Raouf Boutaba}, title = {Active integrated fault localization in communication networks}, booktitle = {Integrated Network Management, {IM} 2005. 9th {IFIP/IEEE} International Symposium on Integrated Network Management, 15-19 May 2005, Nice, France}, pages = {543--556}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/INM.2005.1440826}, doi = {10.1109/INM.2005.1440826}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/im/TangAB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmns/RoychoudhuriA05, author = {Lopamudra Roychoudhuri and Ehab S. Al{-}Shaer}, editor = {Jordi Dalmau Royo and Go Hasegawa}, title = {Real-Time Audio Quality Evaluation for Adaptive Multimedia Protocols}, booktitle = {Management of Multimedia Networks and Services, 8th International Conference on Management of Multimedia Networks and Services, {MMNS} 2005, Barcelona, Spain, October 24-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3754}, pages = {133--144}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11572831\_12}, doi = {10.1007/11572831\_12}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/mmns/RoychoudhuriA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/e2emon/2005, editor = {Ehab Al{-}Shaer and Aiko Pras and Philippe Owezarski}, title = {Third {IEEE/IFIP} Workshop on End-to-End Monitoring Techniques and Services, {E2EMON} 2005, 15th May 2005, Nice, France}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://ieeexplore.ieee.org/xpl/conhome/10461/proceeding}, isbn = {0-7803-9249-3}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/e2emon/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/Al-ShaerH04, author = {Ehab S. Al{-}Shaer and Hazem H. Hamed}, title = {Modeling and Management of Firewall Policies}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {1}, number = {1}, pages = {2--10}, year = {2004}, url = {https://doi.org/10.1109/TNSM.2004.4623689}, doi = {10.1109/TNSM.2004.4623689}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnsm/Al-ShaerH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsom/Al-ShaerZ04, author = {Ehab S. Al{-}Shaer and Bin Zhang}, editor = {Akhil Sahai and Felix Wu}, title = {HiFi+: {A} Monitoring Virtual Machine for Autonomic Distributed Management}, booktitle = {Utility Computing: 15th {IFIP/IEEE} International Workshop on Distributed Systems: Operations and Management, {DSOM} 2004, Davis, CA, USA, November 15-17, 2004.Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3278}, pages = {28--39}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30184-4\_3}, doi = {10.1007/978-3-540-30184-4\_3}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/dsom/Al-ShaerZ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/RoychoudhuriA04, author = {Lopamudra Roychoudhuri and Ehab S. Al{-}Shaer}, title = {Adaptive rate control for real-time packet audio based on loss prediction}, booktitle = {Proceedings of the Global Telecommunications Conference, 2004. {GLOBECOM} '04, Dallas, Texas, USA, 29 November - 3 December 2004}, pages = {634--638}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/GLOCOM.2004.1378039}, doi = {10.1109/GLOCOM.2004.1378039}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globecom/RoychoudhuriA04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/Al-ShaerH04, author = {Ehab S. Al{-}Shaer and Hazem H. Hamed}, title = {Discovery of Policy Anomalies in Distributed Firewalls}, booktitle = {Proceedings {IEEE} {INFOCOM} 2004, The 23rd Annual Joint Conference of the {IEEE} Computer and Communications Societies, Hong Kong, China, March 7-11, 2004}, pages = {2605--2616}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/INFCOM.2004.1354680}, doi = {10.1109/INFCOM.2004.1354680}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/Al-ShaerH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmns/RoychoudhuriA04, author = {Lopamudra Roychoudhuri and Ehab S. Al{-}Shaer}, editor = {John B. Vicente and David Hutchison}, title = {Real-time Analysis of Delay Variation for Packet Loss Prediction}, booktitle = {Management of Multimedia Networks and Services: 7th {IFIP/IEEE} International Conference, {MMNS} 2004, San Diego, CA, USA, October 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3271}, pages = {213--227}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30189-9\_18}, doi = {10.1007/978-3-540-30189-9\_18}, timestamp = {Thu, 22 Sep 2022 08:31:33 +0200}, biburl = {https://dblp.org/rec/conf/mmns/RoychoudhuriA04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/Al-ShaerT04, author = {Ehab Al{-}Shaer and Yongning Tang}, title = {{MRMON:} remote multicast monitoring}, booktitle = {Managing Next Generation Convergence Networks and Services, {IEEE/IFIP} Network Operations and Management Symposium, {NOMS} 2004, Seoul, Korea, 19-23 April 2004, Proceedings}, pages = {585--598}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/NOMS.2004.1317746}, doi = {10.1109/NOMS.2004.1317746}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/noms/Al-ShaerT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/Al-Shaer04, author = {Ehab Al{-}Shaer}, title = {Managing firewall and network-edge security policies}, booktitle = {Managing Next Generation Convergence Networks and Services, {IEEE/IFIP} Network Operations and Management Symposium, {NOMS} 2004, Seoul, Korea, 19-23 April 2004, Proceedings}, pages = {926}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/NOMS.2004.1317810}, doi = {10.1109/NOMS.2004.1317810}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/noms/Al-Shaer04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/Al-ShaerH03, author = {Ehab S. Al{-}Shaer and Hazem H. Hamed}, title = {Management and translation of filtering security policies}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2003, Anchorage, Alaska, USA, 11-15 May, 2003}, pages = {256--260}, publisher = {{IEEE}}, year = {2003}, url = {https://doi.org/10.1109/ICC.2003.1204180}, doi = {10.1109/ICC.2003.1204180}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/Al-ShaerH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/RoychoudhuriAHB03, author = {Lopamudra Roychoudhuri and Ehab Al{-}Shaer and Hazem Hamed and Gregory B. Brewster}, title = {Audio transmission over the Internet: experiments and observations}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2003, Anchorage, Alaska, USA, 11-15 May, 2003}, pages = {552--556}, publisher = {{IEEE}}, year = {2003}, url = {https://doi.org/10.1109/ICC.2003.1204237}, doi = {10.1109/ICC.2003.1204237}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/RoychoudhuriAHB03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/im/Al-ShaerH03, author = {Ehab S. Al{-}Shaer and Hazem H. Hamed}, editor = {Germ{\'{a}}n S. Goldszmidt and J{\"{u}}rgen Sch{\"{o}}nw{\"{a}}lder}, title = {Firewall Policy Advisor for Anomaly Discovery and Rule Editing}, booktitle = {Integrated Network Management VII, Managing It All, {IFIP/IEEE} Eighth International Symposium on Integrated Network Management {(IM} 2003), March 24-28, 2003, Colorado Springs, {USA}}, series = {{IFIP} Conference Proceedings}, volume = {246}, pages = {17--30}, publisher = {Kluwer}, year = {2003}, timestamp = {Mon, 24 Mar 2003 13:34:13 +0100}, biburl = {https://dblp.org/rec/conf/im/Al-ShaerH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmns/YounisMA03, author = {Mohamed F. Younis and Poonam Munshi and Ehab S. Al{-}Shaer}, editor = {Alan Marshall and Nazim Agoulmine}, title = {Architecture for Efficient Monitoring and Management of Sensor Networks}, booktitle = {Management of Multimedia Networks and Services, 6th {IFIP/IEEE} International Conference, {MMNS} 2003, Belfast, Northern Ireland, UK, September 7-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2839}, pages = {488--502}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39404-4\_37}, doi = {10.1007/978-3-540-39404-4\_37}, timestamp = {Fri, 08 Nov 2019 13:02:40 +0100}, biburl = {https://dblp.org/rec/conf/mmns/YounisMA03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnsm/Al-ShaerT02, author = {Ehab S. Al{-}Shaer and Yongning Tang}, title = {QoS Path Monitoring for Multicast Networks}, journal = {J. Netw. Syst. Manag.}, volume = {10}, number = {3}, pages = {357--381}, year = {2002}, url = {https://doi.org/10.1023/A:1019814627444}, doi = {10.1023/A:1019814627444}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnsm/Al-ShaerT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/noms/Al-ShaerT02, author = {Ehab Al{-}Shaer and Yongning Tang}, editor = {Rolf Stadler and Mehmet Ulema}, title = {{SMRM:} SNMP-based multicast reachability monitoring}, booktitle = {Management Solutions for the New Communications World, 8th {IEEE/IFIP} Network Operations and Management Symposium, {NOMS} 2002, Florence, Italy, April 15-19, 2002. Proceedings}, pages = {467--482}, publisher = {{IEEE}}, year = {2002}, url = {https://doi.org/10.1109/NOMS.2002.1015602}, doi = {10.1109/NOMS.2002.1015602}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/noms/Al-ShaerT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/Al-ShaerT01, author = {Ehab S. Al{-}Shaer and Yongning Tang}, title = {Toward integrating {IP} multicasting in internet network management protocols}, journal = {Comput. Commun.}, volume = {24}, number = {5-6}, pages = {473--485}, year = {2001}, url = {https://doi.org/10.1016/S0140-3664(00)00296-6}, doi = {10.1016/S0140-3664(00)00296-6}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/Al-ShaerT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/im/Al-Shaer01, author = {Ehab Al{-}Shaer}, editor = {George Pavlou and Nikos Anerousis and Antonio Liotta}, title = {A Dynamic Group Management Framework for Large-scale Distributed Event Monitoring}, booktitle = {2001 {IEEE/IFIP} International Symposium on Integrated Network Management, {IM} 2001, Seattle, USA, May 14-18, 2001. Proceedings}, pages = {361--374}, publisher = {{IEEE}}, year = {2001}, url = {https://doi.org/10.1109/INM.2001.918053}, doi = {10.1109/INM.2001.918053}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/im/Al-Shaer01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/mmns/2001, editor = {Ehab S. Al{-}Shaer and Giovanni Pacifici}, title = {Management of Multimedia on the Internet, 4th {IFIP/IEEE} International Conference on Management of Multimedia Networks and Services, {MMNS} 2001, Chicago, IL, {USA} October 29 - November 1, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2216}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45508-6}, doi = {10.1007/3-540-45508-6}, isbn = {3-540-42786-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmns/2001.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/Al-ShaerFA00, author = {Ehab S. Al{-}Shaer and Mohamed Fayad and Hussein M. Abdel{-}Wahab}, title = {Adaptive object-oriented filtering framework for event management applications}, journal = {{ACM} Comput. Surv.}, volume = {32}, number = {1es}, pages = {37}, year = {2000}, url = {https://doi.org/10.1145/351936.351974}, doi = {10.1145/351936.351974}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/Al-ShaerFA00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnsm/Al-Shaer00, author = {Ehab S. Al{-}Shaer}, title = {Active Management Framework for Distributed Multimedia Systems}, journal = {J. Netw. Syst. Manag.}, volume = {8}, number = {1}, pages = {49--72}, year = {2000}, url = {https://doi.org/10.1023/A:1009415025046}, doi = {10.1023/A:1009415025046}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnsm/Al-Shaer00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmns/Al-ShaerT00, author = {Ehab S. Al{-}Shaer and Yongning Tang}, editor = {Jos{\'{e}} Neuman de Souza and Raouf Boutaba}, title = {Integrating {IP} Multicasting in Standard Network Management Protocols}, booktitle = {Managing QoS in Multimedia Networks and Services, {IEEE/IFIP} {TC6} - {WG6.4} {\&} {WG6.6} Third International Conference on Management of Multimedia Networks and Services (MMNS'2000), September 25-28, 2000, Fortaleza, Cear{\'{a}}, Brazil}, series = {{IFIP} Conference Proceedings}, volume = {182}, pages = {239--251}, publisher = {Kluwer}, year = {2000}, timestamp = {Wed, 13 Feb 2002 08:45:50 +0100}, biburl = {https://dblp.org/rec/conf/mmns/Al-ShaerT00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nis/Al-Shaer99, author = {Ehab S. Al{-}Shaer}, title = {Dynamic Monitoring Approach for Multi-poin Multimedia Systems}, journal = {Netw. Inf. Syst. J.}, volume = {2}, number = {1}, pages = {75--88}, year = {1999}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nis/Al-Shaer99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsom/Al-Shaer99, author = {Ehab S. Al{-}Shaer}, editor = {Rolf Stadler and Burkhard Stiller}, title = {Programmable Agents for Active Distributed Monitoring}, booktitle = {Active Technologies for Network and Service Management, 10th {IFIP/IEEE} International Workshop on Distributed Systems: Operations and Management, {DSOM} '99, Zurich, Switzerland, October 11-13, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1700}, pages = {19--32}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48100-1\_2}, doi = {10.1007/3-540-48100-1\_2}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/dsom/Al-Shaer99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/Al-ShaerAM99, author = {Ehab S. Al{-}Shaer and Hussein M. Abdel{-}Wahab and Kurt Maly}, title = {HiFi: {A} New Monitoring Architecture for Distributed Systems Management}, booktitle = {Proceedings of the 19th International Conference on Distributed Computing Systems, Austin, TX, USA, May 31 - June 4, 1999}, pages = {171--178}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/ICDCS.1999.776518}, doi = {10.1109/ICDCS.1999.776518}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/Al-ShaerAM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/MalyAOWGYSA97, author = {Kurt Maly and Hussein M. Abdel{-}Wahab and C. Michael Overstreet and J. Christian Wild and Ajay K. Gupta and Alaa Youssef and Emilia Stoica and Ehab S. Al{-}Shaer}, title = {Interactive Distance Learning over Intranets}, journal = {{IEEE} Internet Comput.}, volume = {1}, number = {1}, pages = {60--71}, year = {1997}, url = {https://doi.org/10.1109/4236.585174}, doi = {10.1109/4236.585174}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/internet/MalyAOWGYSA97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/Al-Shaer97, author = {Ehab S. Al{-}Shaer}, title = {Event Filtering Framework: Key Criteria and Design Trade-offs}, booktitle = {21st International Computer Software and Applications Conference {(COMPSAC} '97), 11-15 August 1997, Washington, DC, {USA}}, pages = {88--93}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/CMPSAC.1997.624763}, doi = {10.1109/CMPSAC.1997.624763}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/Al-Shaer97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/Al-ShaerAM97, author = {Ehab S. Al{-}Shaer and Hussein M. Abdel{-}Wahab and Kurt Maly}, title = {Application-Layer Group Communication Server for Extending Reliable Multicast Protocols Services}, booktitle = {1997 International Conference on Network Protocols {(ICNP} '97), 28-31 October 1997, Atlanta, GA, {USA}}, pages = {267}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/ICNP.1997.643728}, doi = {10.1109/ICNP.1997.643728}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/Al-ShaerAM97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmns/Al-ShaerAM97, author = {Ehab S. Al{-}Shaer and Hussein M. Abdel{-}Wahab and Kurt Maly}, editor = {Raouf Boutaba and Abdelhakim Hafid}, title = {A scalable monitoring architecture for managing distributed multimedia systems}, booktitle = {Management of Multimedia Networks and Services, {IEEE/IFIP} {TC6/WG6.4/WG6.6} International Conference on Management of Multimedia Networks and Services, 8-10 July 1997, Montreal, Canada}, series = {{IFIP} Conference Proceedings}, volume = {112}, pages = {237--248}, publisher = {Chapman {\&} Hall}, year = {1997}, timestamp = {Thu, 23 Jun 2016 15:53:29 +0200}, biburl = {https://dblp.org/rec/conf/mmns/Al-ShaerAM97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wetice/Al-ShaerYAMO97, author = {Ehab S. Al{-}Shaer and Alaa Youssef and Hussein M. Abdel{-}Wahab and Kurt Maly and C. Michael Overstreet}, title = {Reliability, Scalability and Robustness Issues in IRI*}, booktitle = {6th Workshop on Enabling Technologies {(WET-ICE} '97), Infrastructure for Collaborative Enterprises, 18-20 June 1997, MIT, Cambridge, MA, USA, Proceedings}, pages = {320--326}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/ENABL.1997.630834}, doi = {10.1109/ENABL.1997.630834}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wetice/Al-ShaerYAMO97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.