BibTeX records: Ehab Al-Shaer

download as .bib file

@article{DBLP:journals/tissec/SajidWADAK23,
  author       = {Md Sajidul Islam Sajid and
                  Jinpeng Wei and
                  Ehab Al{-}Shaer and
                  Qi Duan and
                  Basel Abdeen and
                  Latifur Khan},
  title        = {symbSODA: Configurable and Verifiable Orchestration Automation for
                  Active Malware Deception},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {4},
  pages        = {51:1--51:36},
  year         = {2023},
  url          = {https://doi.org/10.1145/3624568},
  doi          = {10.1145/3624568},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/SajidWADAK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AbdeenAS23,
  author       = {Basel Abdeen and
                  Ehab Al{-}Shaer and
                  Waseem G. Shadid},
  title        = {VeriActor: Dynamic Generation of Challenge-Response Questions for
                  Enhanced Email Sender Verification},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10289040},
  doi          = {10.1109/CNS59707.2023.10289040},
  timestamp    = {Mon, 13 Nov 2023 09:18:17 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/AbdeenAS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/DuttaACD23,
  author       = {Ashutosh Dutta and
                  Ehab Al{-}Shaer and
                  Samrat Chatterjee and
                  Qi Duan},
  title        = {Autonomous Cyber Defense Against Dynamic Multi-strategy Infrastructural
                  DDoS Attacks},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2023,
                  Orlando, FL, USA, October 2-5, 2023},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CNS59707.2023.10288937},
  doi          = {10.1109/CNS59707.2023.10288937},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/DuttaACD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/AbdeenASKH23,
  author       = {Basel Abdeen and
                  Ehab Al{-}Shaer and
                  Anoop Singhal and
                  Latifur Khan and
                  Kevin W. Hamlen},
  editor       = {Vijayalakshmi Atluri and
                  Anna Lisa Ferrara},
  title        = {{SMET:} Semantic Mapping of {CVE} to ATT{\&}CK and Its Application
                  to Cybersecurity},
  booktitle    = {Data and Applications Security and Privacy {XXXVII} - 37th Annual
                  {IFIP} {WG} 11.3 Conference, DBSec 2023, Sophia-Antipolis, France,
                  July 19-21, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13942},
  pages        = {243--260},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-37586-6\_15},
  doi          = {10.1007/978-3-031-37586-6\_15},
  timestamp    = {Fri, 14 Jul 2023 22:01:48 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/AbdeenASKH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-02785,
  author       = {Ehsan Aghaei and
                  Ehab Al{-}Shaer},
  title        = {CVE-driven Attack Technique Prediction with Semantic Information Extraction
                  and a Domain-specific Language Model},
  journal      = {CoRR},
  volume       = {abs/2309.02785},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.02785},
  doi          = {10.48550/ARXIV.2309.02785},
  eprinttype    = {arXiv},
  eprint       = {2309.02785},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-02785.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-03040,
  author       = {Ehsan Aghaei and
                  Ehab Al{-}Shaer and
                  Waseem G. Shadid and
                  Xi Niu},
  title        = {Automated {CVE} Analysis for Threat Prioritization and Impact Prediction},
  journal      = {CoRR},
  volume       = {abs/2309.03040},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.03040},
  doi          = {10.48550/ARXIV.2309.03040},
  eprinttype    = {arXiv},
  eprint       = {2309.03040},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-03040.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/DasHTSPA22,
  author       = {Siddhartha Shankar Das and
                  Mahantesh Halappanavar and
                  Antonino Tumeo and
                  Edoardo Serra and
                  Alex Pothen and
                  Ehab Al{-}Shaer},
  editor       = {Shusaku Tsumoto and
                  Yukio Ohsawa and
                  Lei Chen and
                  Dirk Van den Poel and
                  Xiaohua Hu and
                  Yoichi Motomura and
                  Takuya Takagi and
                  Lingfei Wu and
                  Ying Xie and
                  Akihiro Abe and
                  Vijay Raghavan},
  title        = {{VWC-BERT:} Scaling Vulnerability-Weakness-Exploit Mapping on Modern
                  {AI} Accelerators},
  booktitle    = {{IEEE} International Conference on Big Data, Big Data 2022, Osaka,
                  Japan, December 17-20, 2022},
  pages        = {1224--1229},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/BigData55660.2022.10020622},
  doi          = {10.1109/BIGDATA55660.2022.10020622},
  timestamp    = {Fri, 18 Aug 2023 17:39:03 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdataconf/DasHTSPA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/AghaeiNSA22,
  author       = {Ehsan Aghaei and
                  Xi Niu and
                  Waseem G. Shadid and
                  Ehab Al{-}Shaer},
  editor       = {Fengjun Li and
                  Kaitai Liang and
                  Zhiqiang Lin and
                  Sokratis K. Katsikas},
  title        = {SecureBERT: {A} Domain-Specific Language Model for Cybersecurity},
  booktitle    = {Security and Privacy in Communication Networks - 18th {EAI} International
                  Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {462},
  pages        = {39--56},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25538-0\_3},
  doi          = {10.1007/978-3-031-25538-0\_3},
  timestamp    = {Thu, 06 Jul 2023 17:45:42 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/AghaeiNSA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2204-02685,
  author       = {Ehsan Aghaei and
                  Xi Niu and
                  Waseem G. Shadid and
                  Ehab Al{-}Shaer},
  title        = {Language Model for Text Analytic in Cybersecurity},
  journal      = {CoRR},
  volume       = {abs/2204.02685},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2204.02685},
  doi          = {10.48550/ARXIV.2204.02685},
  eprinttype    = {arXiv},
  eprint       = {2204.02685},
  timestamp    = {Tue, 12 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2204-02685.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/RahmanDA21,
  author       = {Mohammad Ashiqur Rahman and
                  Amarjit Datta and
                  Ehab Al{-}Shaer},
  title        = {Automated Configuration Synthesis for Resilient Smart Metering Infrastructure},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {8},
  number       = {28},
  pages        = {e4},
  year         = {2021},
  url          = {https://doi.org/10.4108/eai.10-9-2021.170948},
  doi          = {10.4108/EAI.10-9-2021.170948},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/RahmanDA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SajidWAAIDK21,
  author       = {Md Sajidul Islam Sajid and
                  Jinpeng Wei and
                  Basel Abdeen and
                  Ehab Al{-}Shaer and
                  Md. Mazharul Islam and
                  Walter Diong and
                  Latifur Khan},
  title        = {{SODA:} {A} System for Cyber Deception Orchestration and Automation},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {675--689},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485918},
  doi          = {10.1145/3485832.3485918},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SajidWAAIDK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/IslamDSAWF21,
  author       = {Md. Mazharul Islam and
                  Ashutosh Dutta and
                  Md Sajidul Islam Sajid and
                  Ehab Al{-}Shaer and
                  Jinpeng Wei and
                  Sadegh Farhang},
  title        = {{CHIMERA:} Autonomous Planning and Orchestration for Malware Deception},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2021,
                  Tempe, AZ, USA, October 4-6, 2021},
  pages        = {173--181},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CNS53000.2021.9705030},
  doi          = {10.1109/CNS53000.2021.9705030},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/IslamDSAWF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsaa/DasSHPA21,
  author       = {Siddhartha Shankar Das and
                  Edoardo Serra and
                  Mahantesh Halappanavar and
                  Alex Pothen and
                  Ehab Al{-}Shaer},
  title        = {{V2W-BERT:} {A} Framework for Effective Hierarchical Multiclass Classification
                  of Software Vulnerabilities},
  booktitle    = {8th {IEEE} International Conference on Data Science and Advanced Analytics,
                  {DSAA} 2021, Porto, Portugal, October 6-9, 2021},
  pages        = {1--12},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DSAA53316.2021.9564227},
  doi          = {10.1109/DSAA53316.2021.9564227},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dsaa/DasSHPA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2102-11498,
  author       = {Siddhartha Shankar Das and
                  Edoardo Serra and
                  Mahantesh Halappanavar and
                  Alex Pothen and
                  Ehab Al{-}Shaer},
  title        = {{V2W-BERT:} {A} Framework for Effective Hierarchical Multiclass Classification
                  of Software Vulnerabilities},
  journal      = {CoRR},
  volume       = {abs/2102.11498},
  year         = {2021},
  url          = {https://arxiv.org/abs/2102.11498},
  eprinttype    = {arXiv},
  eprint       = {2102.11498},
  timestamp    = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2102-11498.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2104-08994,
  author       = {Ashutosh Dutta and
                  Ehab Al{-}Shaer and
                  Samrat Chatterjee},
  title        = {Constraints Satisfiability Driven Reinforcement Learning for Autonomous
                  Cyber Defense},
  journal      = {CoRR},
  volume       = {abs/2104.08994},
  year         = {2021},
  url          = {https://arxiv.org/abs/2104.08994},
  eprinttype    = {arXiv},
  eprint       = {2104.08994},
  timestamp    = {Mon, 26 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2104-08994.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RahmanHMA20,
  author       = {Mohammad Ashiqur Rahman and
                  Md. Golam Moula Mehedi Hasan and
                  Mohammad Hossein Manshaei and
                  Ehab Al{-}Shaer},
  title        = {A game-theoretic analysis to defend against remote operating system
                  fingerprinting},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {52},
  pages        = {102456},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jisa.2020.102456},
  doi          = {10.1016/J.JISA.2020.102456},
  timestamp    = {Wed, 27 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/RahmanHMA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DuanAX20,
  author       = {Qi Duan and
                  Ehab Al{-}Shaer and
                  Jiang Xie},
  editor       = {Hamed Okhravi and
                  Cliff Wang},
  title        = {Range and Topology Mutation Based Wireless Agility},
  booktitle    = {Proceedings of the 7th {ACM} Workshop on Moving Target Defense, MTD@CCS
                  2020, Virtual Event, USA, November 9, 2020},
  pages        = {59--67},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3411496.3421228},
  doi          = {10.1145/3411496.3421228},
  timestamp    = {Mon, 14 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DuanAX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SajidWAAA20,
  author       = {Md Sajidul Islam Sajid and
                  Jinpeng Wei and
                  Md Rabbi Alam and
                  Ehsan Aghaei and
                  Ehab Al{-}Shaer},
  title        = {DodgeTron: Towards Autonomous Cyber Deception Using Dynamic Hybrid
                  Analysis of Malware},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162202},
  doi          = {10.1109/CNS48642.2020.9162202},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/SajidWAAA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/RahimDA20,
  author       = {Muhammad Abdul Basit Ur Rahim and
                  Qi Duan and
                  Ehab Al{-}Shaer},
  title        = {A Formal Analysis of Moving Target Defense},
  booktitle    = {44th {IEEE} Annual Computers, Software, and Applications Conference,
                  {COMPSAC} 2020, Madrid, Spain, July 13-17, 2020},
  pages        = {1802--1807},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/COMPSAC48688.2020.00050},
  doi          = {10.1109/COMPSAC48688.2020.00050},
  timestamp    = {Tue, 29 Sep 2020 12:30:55 +0200},
  biburl       = {https://dblp.org/rec/conf/compsac/RahimDA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/NiakanlahijiJCA20,
  author       = {Amirreza Niakanlahiji and
                  Jafar Haadi Jafarian and
                  Bei{-}Tseng Chu and
                  Ehab Al{-}Shaer},
  title        = {HoneyBug: Personalized Cyber Deception for Web Applications},
  booktitle    = {53rd Hawaii International Conference on System Sciences, {HICSS} 2020,
                  Maui, Hawaii, USA, January 7-10, 2020},
  pages        = {1--10},
  publisher    = {ScholarSpace},
  year         = {2020},
  url          = {https://hdl.handle.net/10125/63972},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hicss/NiakanlahijiJCA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/PurbaCA20,
  author       = {Moumita Das Purba and
                  Bill Chu and
                  Ehab Al{-}Shaer},
  title        = {From Word Embedding to Cyber-Phrase Embedding: Comparison of Processing
                  Cybersecurity Texts},
  booktitle    = {{IEEE} International Conference on Intelligence and Security Informatics,
                  {ISI} 2020, Arlington, VA, USA, November 9-10, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ISI49825.2020.9280541},
  doi          = {10.1109/ISI49825.2020.9280541},
  timestamp    = {Mon, 14 Dec 2020 11:14:41 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/PurbaCA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lrec/DaltonAABCCDDHI20,
  author       = {Adam Dalton and
                  Ehsan Aghaei and
                  Ehab Al{-}Shaer and
                  Archna Bhatia and
                  Esteban Castillo and
                  Zhuo Cheng and
                  Sreekar Dhaduvai and
                  Qi Duan and
                  Bryanna Hebenstreit and
                  Md. Mazharul Islam and
                  Younes Karimi and
                  Amir Masoumzadeh and
                  Brodie Mather and
                  Sashank Santhanam and
                  Samira Shaikh and
                  Alan Zemel and
                  Tomek Strzalkowski and
                  Bonnie J. Dorr},
  editor       = {Archna Bhatia and
                  Samira Shaikh},
  title        = {Active Defense Against Social Engineering: The Case for Human Language
                  Technology},
  booktitle    = {Proceedings for the First International Workshop on Social Threats
                  in Online Conversations: Understanding and Management, STOC@LREC 2020,
                  Marseille, France, May 2020},
  pages        = {1--8},
  publisher    = {European Language Resources Association},
  year         = {2020},
  url          = {https://aclanthology.org/2020.stoc-1.1/},
  timestamp    = {Fri, 08 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/lrec/DaltonAABCCDDHI20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/IslamA20,
  author       = {Md. Mazharul Islam and
                  Ehab Al{-}Shaer},
  title        = {Active Deception Framework: An Extensible Development Environment
                  for Adaptive Cyber Deception},
  booktitle    = {{IEEE} Secure Development, SecDev 2020, Atlanta, GA, USA, September
                  28-30, 2020},
  pages        = {41--48},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SecDev45635.2020.00023},
  doi          = {10.1109/SECDEV45635.2020.00023},
  timestamp    = {Thu, 27 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/IslamA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/IslamAR20,
  author       = {Md. Mazharul Islam and
                  Ehab Al{-}Shaer and
                  Muhammad Abdul Basit Ur Rahim},
  editor       = {Noseong Park and
                  Kun Sun and
                  Sara Foresti and
                  Kevin R. B. Butler and
                  Nitesh Saxena},
  title        = {Email Address Mutation for Proactive Deterrence Against Lateral Spear-Phishing
                  Attacks},
  booktitle    = {Security and Privacy in Communication Networks - 16th {EAI} International
                  Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020,
                  Proceedings, Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {335},
  pages        = {1--22},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-63086-7\_1},
  doi          = {10.1007/978-3-030-63086-7\_1},
  timestamp    = {Thu, 27 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/IslamAR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/AghaeiSA20,
  author       = {Ehsan Aghaei and
                  Waseem G. Shadid and
                  Ehab Al{-}Shaer},
  editor       = {Noseong Park and
                  Kun Sun and
                  Sara Foresti and
                  Kevin R. B. Butler and
                  Nitesh Saxena},
  title        = {ThreatZoom: Hierarchical Neural Network for CVEs to CWEs Classification},
  booktitle    = {Security and Privacy in Communication Networks - 16th {EAI} International
                  Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020,
                  Proceedings, Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {335},
  pages        = {23--41},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-63086-7\_2},
  doi          = {10.1007/978-3-030-63086-7\_2},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/AghaeiSA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/RahimAD20,
  author       = {Muhammad Abdul Basit Ur Rahim and
                  Ehab Al{-}Shaer and
                  Qi Duan},
  editor       = {Noseong Park and
                  Kun Sun and
                  Sara Foresti and
                  Kevin R. B. Butler and
                  Nitesh Saxena},
  title        = {A Formal Verification of Configuration-Based Mutation Techniques for
                  Moving Target Defense},
  booktitle    = {Security and Privacy in Communication Networks - 16th {EAI} International
                  Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020,
                  Proceedings, Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {335},
  pages        = {61--79},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-63086-7\_5},
  doi          = {10.1007/978-3-030-63086-7\_5},
  timestamp    = {Tue, 15 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/RahimAD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/20/AlsalehA20,
  author       = {Mohammed Noraden Alsaleh and
                  Ehab Al{-}Shaer},
  editor       = {Sushil Jajodia and
                  George Cybenko and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang and
                  Michael P. Wellman},
  title        = {Automated Cyber Risk Mitigation: Making Informed Cost-Effective Decisions},
  booktitle    = {Adaptive Autonomous Secure Cyber Systems},
  pages        = {131--157},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-33432-1\_7},
  doi          = {10.1007/978-3-030-33432-1\_7},
  timestamp    = {Mon, 03 Jan 2022 21:52:41 +0100},
  biburl       = {https://dblp.org/rec/books/sp/20/AlsalehA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2004-09662,
  author       = {Adam Dalton and
                  Ehsan Aghaei and
                  Ehab Al{-}Shaer and
                  Archna Bhatia and
                  Esteban Castillo and
                  Zhuo Cheng and
                  Sreekar Dhaduvai and
                  Qi Duan and
                  Md. Mazharul Islam and
                  Younes Karimi and
                  Amir Masoumzadeh and
                  Brodie Mather and
                  Sashank Santhanam and
                  Samira Shaikh and
                  Tomek Strzalkowski and
                  Bonnie J. Dorr},
  title        = {The Panacea Threat Intelligence and Active Defense Platform},
  journal      = {CoRR},
  volume       = {abs/2004.09662},
  year         = {2020},
  url          = {https://arxiv.org/abs/2004.09662},
  eprinttype    = {arXiv},
  eprint       = {2004.09662},
  timestamp    = {Fri, 08 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2004-09662.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-11501,
  author       = {Ehsan Aghaei and
                  Waseem G. Shadid and
                  Ehab Al{-}Shaer},
  title        = {ThreatZoom: {CVE2CWE} using Hierarchical Neural Network},
  journal      = {CoRR},
  volume       = {abs/2009.11501},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.11501},
  eprinttype    = {arXiv},
  eprint       = {2009.11501},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-11501.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/AWHW2019,
  author       = {Ehab Al{-}Shaer and
                  Jinpeng Wei and
                  Kevin W. Hamlen and
                  Cliff Wang},
  title        = {Autonomous Cyber Deception - Reasoning, Adaptive Planning, and Evaluation
                  of HoneyThings},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-02110-8},
  doi          = {10.1007/978-3-030-02110-8},
  isbn         = {978-3-030-02109-2},
  timestamp    = {Tue, 19 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/AWHW2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RahmanDA19,
  author       = {Mohammad Ashiqur Rahman and
                  Amarjit Datta and
                  Ehab Al{-}Shaer},
  title        = {Security design against stealthy attacks on power system state estimation:
                  {A} formal approach},
  journal      = {Comput. Secur.},
  volume       = {84},
  pages        = {301--317},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.cose.2019.03.022},
  doi          = {10.1016/J.COSE.2019.03.022},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RahmanDA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/IslamDA19,
  author       = {Md. Mazharul Islam and
                  Qi Duan and
                  Ehab Al{-}Shaer},
  editor       = {Zhuo Lu},
  title        = {Specification-driven Moving Target Defense Synthesis},
  booktitle    = {Proceedings of the 6th {ACM} Workshop on Moving Target Defense, MTD@CCS
                  2019, London, UK, November 11, 2019},
  pages        = {13--24},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338468.3356830},
  doi          = {10.1145/3338468.3356830},
  timestamp    = {Thu, 27 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/IslamDA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/DuttaA19,
  author       = {Ashutosh Dutta and
                  Ehab Al{-}Shaer},
  title        = {"What", "Where", and "Why" Cybersecurity
                  Controls to Enforce for Optimal Risk Mitigation},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {160--168},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802745},
  doi          = {10.1109/CNS.2019.8802745},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/DuttaA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotsos/RahimDA19,
  author       = {Muhammad Abdul Basit Ur Rahim and
                  Qi Duan and
                  Ehab Al{-}Shaer},
  editor       = {Xenofon D. Koutsoukos and
                  Alvaro A. C{\'{a}}rdenas and
                  Ehab Al{-}Shaer},
  title        = {A formal verification of mutation-based moving target defense},
  booktitle    = {Proceedings of the 6th Annual Symposium on Hot Topics in the Science
                  of Security, HotSoS 2019, Nashville, TN, USA, April 1-3, 2019},
  pages        = {10:1--10:2},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3314058.3317723},
  doi          = {10.1145/3314058.3317723},
  timestamp    = {Sat, 22 Jun 2019 19:13:09 +0200},
  biburl       = {https://dblp.org/rec/conf/hotsos/RahimDA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotsos/IslamADA19,
  author       = {Md. Mazharul Islam and
                  Ehab Al{-}Shaer and
                  Ashutosh Dutta and
                  Mohammed Noraden Alsaleh},
  editor       = {Xenofon D. Koutsoukos and
                  Alvaro A. C{\'{a}}rdenas and
                  Ehab Al{-}Shaer},
  title        = {CLIPS/ActiveSDN for automated and safe cybersecurity course-of-actions
                  orchestration},
  booktitle    = {Proceedings of the 6th Annual Symposium on Hot Topics in the Science
                  of Security, HotSoS 2019, Nashville, TN, USA, April 1-3, 2019},
  pages        = {13:1--13:3},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3314058.3317724},
  doi          = {10.1145/3314058.3317724},
  timestamp    = {Thu, 27 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hotsos/IslamADA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotsos/DuttaA19,
  author       = {Ashutosh Dutta and
                  Ehab Al{-}Shaer},
  editor       = {Xenofon D. Koutsoukos and
                  Alvaro A. C{\'{a}}rdenas and
                  Ehab Al{-}Shaer},
  title        = {Cyber defense matrix: a new model for optimal composition of cybersecurity
                  controls to construct resilient risk mitigation},
  booktitle    = {Proceedings of the 6th Annual Symposium on Hot Topics in the Science
                  of Security, HotSoS 2019, Nashville, TN, USA, April 1-3, 2019},
  pages        = {14:1--14:2},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3314058.3317725},
  doi          = {10.1145/3314058.3317725},
  timestamp    = {Sat, 22 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hotsos/DuttaA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotsos/HusariACR19,
  author       = {Ghaith Husari and
                  Ehab Al{-}Shaer and
                  Bill Chu and
                  Ruhani Faiheem Rahman},
  editor       = {Xenofon D. Koutsoukos and
                  Alvaro A. C{\'{a}}rdenas and
                  Ehab Al{-}Shaer},
  title        = {Learning {APT} chains from cyber threat intelligence},
  booktitle    = {Proceedings of the 6th Annual Symposium on Hot Topics in the Science
                  of Security, HotSoS 2019, Nashville, TN, USA, April 1-3, 2019},
  pages        = {19:1--19:2},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3314058.3317728},
  doi          = {10.1145/3314058.3317728},
  timestamp    = {Sat, 22 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hotsos/HusariACR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotsos/AhmedA19,
  author       = {Mohiuddin Ahmed and
                  Ehab Al{-}Shaer},
  editor       = {Xenofon D. Koutsoukos and
                  Alvaro A. C{\'{a}}rdenas and
                  Ehab Al{-}Shaer},
  title        = {Measures and metrics for the enforcement of critical security controls:
                  a case study of boundary defense},
  booktitle    = {Proceedings of the 6th Annual Symposium on Hot Topics in the Science
                  of Security, HotSoS 2019, Nashville, TN, USA, April 1-3, 2019},
  pages        = {21:1--21:3},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3314058.3317730},
  doi          = {10.1145/3314058.3317730},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hotsos/AhmedA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotsos/AghaeiA19,
  author       = {Ehsan Aghaei and
                  Ehab Al{-}Shaer},
  editor       = {Xenofon D. Koutsoukos and
                  Alvaro A. C{\'{a}}rdenas and
                  Ehab Al{-}Shaer},
  title        = {ThreatZoom: neural network for automated vulnerability mitigation},
  booktitle    = {Proceedings of the 6th Annual Symposium on Hot Topics in the Science
                  of Security, HotSoS 2019, Nashville, TN, USA, April 1-3, 2019},
  pages        = {24:1--24:3},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3314058.3318167},
  doi          = {10.1145/3314058.3318167},
  timestamp    = {Sat, 22 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hotsos/AghaeiA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/im/FarooqAMK19,
  author       = {Abdullah Al Farooq and
                  Ehab Al{-}Shaer and
                  Thomas Moyer and
                  Krishna Kant},
  editor       = {Joe Betser and
                  Carol J. Fung and
                  Alex Clemm and
                  J{\'{e}}r{\^{o}}me Fran{\c{c}}ois and
                  Shingo Ata},
  title        = {IoTC\({}^{\mbox{2}}\): {A} Formal Method Approach for Detecting Conflicts
                  in Large Scale IoT Systems},
  booktitle    = {{IFIP/IEEE} International Symposium on Integrated Network Management,
                  {IM} 2019, Washington, DC, USA, April 09-11, 2019},
  pages        = {442--447},
  publisher    = {{IFIP}},
  year         = {2019},
  url          = {https://ieeexplore.ieee.org/document/8717844},
  timestamp    = {Tue, 10 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/im/FarooqAMK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/hotsos/2019,
  editor       = {Xenofon D. Koutsoukos and
                  Alvaro A. C{\'{a}}rdenas and
                  Ehab Al{-}Shaer},
  title        = {Proceedings of the 6th Annual Symposium on Hot Topics in the Science
                  of Security, HotSoS 2019, Nashville, TN, USA, April 1-3, 2019},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3314058},
  doi          = {10.1145/3314058},
  isbn         = {978-1-4503-7147-6},
  timestamp    = {Sat, 22 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hotsos/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-00540,
  author       = {Mohammad Ashiqur Rahman and
                  Md Hasan Shahriar and
                  Ehab Al{-}Shaer and
                  Quanyan Zhu},
  title        = {A Formal Approach for Efficient Navigation Management of Hybrid Electric
                  Vehicles on Long Trips},
  journal      = {CoRR},
  volume       = {abs/1907.00540},
  year         = {2019},
  url          = {http://arxiv.org/abs/1907.00540},
  eprinttype    = {arXiv},
  eprint       = {1907.00540},
  timestamp    = {Mon, 08 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1907-00540.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/AlsalehWAA18,
  author       = {Mohammed Noraden Alsaleh and
                  Jinpeng Wei and
                  Ehab Al{-}Shaer and
                  Mohiuddin Ahmed},
  editor       = {Jeffrey Todd McDonald and
                  S{\'{e}}bastien Bardin and
                  Natalia Stakhanova},
  title        = {gExtractor: Towards Automated Extraction of Malware Deception Parameters},
  booktitle    = {Proceedings of the 8th Software Security, Protection, and Reverse
                  Engineering Workshop, San Juan, PR, USA, December 3-4, 2018},
  pages        = {2:1--2:12},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3289239.3289244},
  doi          = {10.1145/3289239.3289244},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/AlsalehWAA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GillaniAD18,
  author       = {Fida Gillani and
                  Ehab Al{-}Shaer and
                  Qi Duan},
  editor       = {Massimiliano Albanese and
                  Dijiang Huang},
  title        = {In-design Resilient {SDN} Control Plane and Elastic Forwarding Against
                  Aggressive DDoS Attacks},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Moving Target Defense, {CCS}
                  2018, Toronto, ON, Canada, October 15, 2018},
  pages        = {80--89},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3268966.3268968},
  doi          = {10.1145/3268966.3268968},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GillaniAD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/DuanAIJ18,
  author       = {Qi Duan and
                  Ehab Al{-}Shaer and
                  Mazharul Islam and
                  Jafar Haadi Jafarian},
  title        = {{CONCEAL:} {A} Strategy Composition for Resilient Cyber Deception-Framework,
                  Metrics and Deployment},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433196},
  doi          = {10.1109/CNS.2018.8433196},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/DuanAIJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AhmedWWA18,
  author       = {Mohiuddin Ahmed and
                  Jinpeng Wei and
                  Yongge Wang and
                  Ehab Al{-}Shaer},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Jordi Herrera{-}Joancomart{\'{\i}} and
                  Giovanni Livraga and
                  Ruben Rios},
  title        = {A Poisoning Attack Against Cryptocurrency Mining Pools},
  booktitle    = {Data Privacy Management, Cryptocurrencies and Blockchain Technology
                  - {ESORICS} 2018 International Workshops, {DPM} 2018 and {CBT} 2018,
                  Barcelona, Spain, September 6-7, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11025},
  pages        = {140--154},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00305-0\_11},
  doi          = {10.1007/978-3-030-00305-0\_11},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/AhmedWWA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/AlsalehAD18,
  author       = {Mohammed Noraden Alsaleh and
                  Ehab Al{-}Shaer and
                  Qi Duan},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat},
  title        = {Verifying the Enforcement and Effectiveness of Network Lateral Movement
                  Resistance Techniques},
  booktitle    = {Proceedings of the 15th International Joint Conference on e-Business
                  and Telecommunications, {ICETE} 2018 - Volume 2: SECRYPT, Porto, Portugal,
                  July 26-28, 2018},
  pages        = {412--423},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006868904120423},
  doi          = {10.5220/0006868904120423},
  timestamp    = {Wed, 29 Aug 2018 15:17:20 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/AlsalehAD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/HusariNCA18,
  author       = {Ghaith Husari and
                  Xi Niu and
                  Bill Chu and
                  Ehab Al{-}Shaer},
  title        = {Using Entropy and Mutual Information to Extract Threat Actions from
                  Cyber Threat Intelligence},
  booktitle    = {2018 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2018, Miami, FL, USA, November 9-11, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ISI.2018.8587343},
  doi          = {10.1109/ISI.2018.8587343},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/HusariNCA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/NiakanlahijiCA18,
  author       = {Amirreza Niakanlahiji and
                  Bei{-}Tseng Chu and
                  Ehab Al{-}Shaer},
  title        = {PhishMon: {A} Machine Learning Framework for Detecting Phishing Webpages},
  booktitle    = {2018 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2018, Miami, FL, USA, November 9-11, 2018},
  pages        = {220--225},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ISI.2018.8587410},
  doi          = {10.1109/ISI.2018.8587410},
  timestamp    = {Fri, 04 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/NiakanlahijiCA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1812-03966,
  author       = {Abdullah Al Farooq and
                  Ehab Al{-}Shaer and
                  Thomas Moyer and
                  Krishna Kant},
  title        = {IoTC2: {A} Formal Method Approach for Detecting Conflicts in Large
                  Scale IoT Systems},
  journal      = {CoRR},
  volume       = {abs/1812.03966},
  year         = {2018},
  url          = {http://arxiv.org/abs/1812.03966},
  eprinttype    = {arXiv},
  eprint       = {1812.03966},
  timestamp    = {Thu, 13 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1812-03966.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/QamarARAC17,
  author       = {Sara Qamar and
                  Zahid Anwar and
                  Mohammad Ashiqur Rahman and
                  Ehab Al{-}Shaer and
                  Bei{-}tseng Chu},
  title        = {Data-driven analytics for cyber-threat intelligence and information
                  sharing},
  journal      = {Comput. Secur.},
  volume       = {67},
  pages        = {35--58},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.cose.2017.02.005},
  doi          = {10.1016/J.COSE.2017.02.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/QamarARAC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MohsinAZA17,
  author       = {Mujahid Mohsin and
                  Zahid Anwar and
                  Farhat Zaman and
                  Ehab Al{-}Shaer},
  title        = {IoTChecker: {A} data-driven framework for security analytics of Internet
                  of Things configurations},
  journal      = {Comput. Secur.},
  volume       = {70},
  pages        = {199--223},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.cose.2017.05.012},
  doi          = {10.1016/J.COSE.2017.05.012},
  timestamp    = {Thu, 25 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MohsinAZA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnsm/AlsalehAH17,
  author       = {Mohammed Noraden Alsaleh and
                  Ehab Al{-}Shaer and
                  Ghaith Husari},
  title        = {ROI-Driven Cyber Risk Mitigation Using Host Compliance and Network
                  Configuration},
  journal      = {J. Netw. Syst. Manag.},
  volume       = {25},
  number       = {4},
  pages        = {759--783},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10922-017-9428-x},
  doi          = {10.1007/S10922-017-9428-X},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnsm/AlsalehAH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/El-AtawyDA17,
  author       = {Adel El{-}Atawy and
                  Qi Duan and
                  Ehab Al{-}Shaer},
  title        = {A Novel Class of Robust Covert Channels Using Out-of-Order Packets},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {2},
  pages        = {116--129},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2443779},
  doi          = {10.1109/TDSC.2015.2443779},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/El-AtawyDA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RahmanMAS17,
  author       = {Mohammad Ashiqur Rahman and
                  Mohammad Hossein Manshaei and
                  Ehab Al{-}Shaer and
                  Mohamed Shehab},
  title        = {Secure and Private Data Aggregation for Energy Consumption Scheduling
                  in Smart Grids},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {14},
  number       = {2},
  pages        = {221--234},
  year         = {2017},
  url          = {https://doi.org/10.1109/TDSC.2015.2446492},
  doi          = {10.1109/TDSC.2015.2446492},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/RahmanMAS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/RahmanA17,
  author       = {Mohammad Ashiqur Rahman and
                  Ehab Al{-}Shaer},
  title        = {Automated Synthesis of Distributed Network Access Controls: {A} Formal
                  Framework with Refinement},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {28},
  number       = {2},
  pages        = {416--430},
  year         = {2017},
  url          = {https://doi.org/10.1109/TPDS.2016.2585108},
  doi          = {10.1109/TPDS.2016.2585108},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/RahmanA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HusariAACN17,
  author       = {Ghaith Husari and
                  Ehab Al{-}Shaer and
                  Mohiuddin Ahmed and
                  Bill Chu and
                  Xi Niu},
  title        = {TTPDrill: Automatic and Accurate Extraction of Threat Actions from
                  Unstructured Text of {CTI} Sources},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {103--115},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134646},
  doi          = {10.1145/3134600.3134646},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/HusariAACN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotsos/BurchamACADGJRK17,
  author       = {Morgan Burcham and
                  Mahran Al{-}Zyoud and
                  Jeffrey C. Carver and
                  Mohammed Noraden Alsaleh and
                  Hongying Du and
                  Fida Gillani and
                  Jun Jiang and
                  Akond Rahman and
                  {\"{O}}zg{\"{u}}r Kafali and
                  Ehab Al{-}Shaer and
                  Laurie A. Williams},
  title        = {Characterizing Scientific Reporting in Security Literature: An analysis
                  of {ACM} {CCS} and {IEEE} S{\&}P Papers},
  booktitle    = {Proceedings of the Hot Topics in Science of Security: Symposium and
                  Bootcamp, HoTSoS 2017, Hanover, MD, USA, April 4-5, 2017},
  pages        = {13--23},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3055305.3055307},
  doi          = {10.1145/3055305.3055307},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hotsos/BurchamACADGJRK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/BhattacharjeeTA17,
  author       = {Sreyasee Das Bhattacharjee and
                  Ashit Talukder and
                  Ehab Al{-}Shaer and
                  Pratik Doshi},
  title        = {Prioritized active learning for malicious {URL} detection using weighted
                  text-based features},
  booktitle    = {2017 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2017, Beijing, China, July 22-24, 2017},
  pages        = {107--112},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ISI.2017.8004883},
  doi          = {10.1109/ISI.2017.8004883},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/BhattacharjeeTA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/NiakanlahijiPCA17,
  author       = {Amirreza Niakanlahiji and
                  Mir Mehedi A. Pritom and
                  Bei{-}tseng Chu and
                  Ehab Al{-}Shaer},
  editor       = {Nicholas J. Multari and
                  Anoop Singhal and
                  Erin Miller},
  title        = {Predicting Zero-day Malicious {IP} Addresses},
  booktitle    = {Proceedings of the 2017 Workshop on Automated Decision Making for
                  Active Cyber Defense, SafeConfig@CCS 2017, Dallas, TX, USA, October
                  30 - November 03, 2017},
  pages        = {1--6},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3140368.3140369},
  doi          = {10.1145/3140368.3140369},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/safeconfig/NiakanlahijiPCA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/Al-ShaerR16,
  author       = {Ehab Al{-}Shaer and
                  Mohammad Ashiqur Rahman},
  title        = {Security and Resiliency Analytics for Smart Grids - Static and Dynamic
                  Approaches},
  series       = {Advances in Information Security},
  volume       = {67},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-32871-3},
  doi          = {10.1007/978-3-319-32871-3},
  isbn         = {978-3-319-32870-6},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Al-ShaerR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/GillaniAA16,
  author       = {Fida Gillani and
                  Ehab Al{-}Shaer and
                  Basil AsSadhan},
  title        = {Economic metric to improve spam detectors},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {65},
  pages        = {131--143},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jnca.2016.02.019},
  doi          = {10.1016/J.JNCA.2016.02.019},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/GillaniAA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Al-Shaer16,
  author       = {Ehab Al{-}Shaer},
  editor       = {Peng Liu and
                  Cliff Wang},
  title        = {A Cyber Mutation: Metrics, Techniques and Future Directions},
  booktitle    = {Proceedings of the 2016 {ACM} Workshop on Moving Target Defense, MTD@CCS
                  2016, Vienna, Austria, October 24, 2016},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2995272.2995285},
  doi          = {10.1145/2995272.2995285},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Al-Shaer16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JafarianNAD16,
  author       = {Jafar Haadi Jafarian and
                  Amirreza Niakanlahiji and
                  Ehab Al{-}Shaer and
                  Qi Duan},
  editor       = {Peng Liu and
                  Cliff Wang},
  title        = {Multi-dimensional Host Identity Anonymization for Defeating Skilled
                  Attackers},
  booktitle    = {Proceedings of the 2016 {ACM} Workshop on Moving Target Defense, MTD@CCS
                  2016, Vienna, Austria, October 24, 2016},
  pages        = {47--58},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2995272.2995278},
  doi          = {10.1145/2995272.2995278},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JafarianNAD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RaufGAHCO16,
  author       = {Usman Rauf and
                  Fida Gillani and
                  Ehab Al{-}Shaer and
                  Mahantesh Halappanavar and
                  Samrat Chatterjee and
                  Christopher S. Oehmen},
  editor       = {Peng Liu and
                  Cliff Wang},
  title        = {Formal Approach for Resilient Reachability based on End-System Route
                  Agility},
  booktitle    = {Proceedings of the 2016 {ACM} Workshop on Moving Target Defense, MTD@CCS
                  2016, Vienna, Austria, October 24, 2016},
  pages        = {117--127},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2995272.2995275},
  doi          = {10.1145/2995272.2995275},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/RaufGAHCO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/MohsinAHAR16,
  author       = {Mujahid Mohsin and
                  Zahid Anwar and
                  Ghaith Husari and
                  Ehab Al{-}Shaer and
                  Mohammad Ashiqur Rahman},
  title        = {IoTSAT: {A} formal framework for security analysis of the internet
                  of things (IoT)},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {180--188},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860484},
  doi          = {10.1109/CNS.2016.7860484},
  timestamp    = {Thu, 25 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/MohsinAHAR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/RahmanFDA16,
  author       = {Mohammad Ashiqur Rahman and
                  Abdullah Al Farooq and
                  Amarjit Datta and
                  Ehab Al{-}Shaer},
  title        = {Automated synthesis of resiliency configurations for cyber networks},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {243--251},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860491},
  doi          = {10.1109/CNS.2016.7860491},
  timestamp    = {Sun, 30 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/RahmanFDA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsm/AlsalehHA16,
  author       = {Mohammed Noraden Alsaleh and
                  Ghaith Husari and
                  Ehab Al{-}Shaer},
  title        = {Optimizing the RoI of cyber risk mitigation},
  booktitle    = {12th International Conference on Network and Service Management, {CNSM}
                  2016, Montreal, QC, Canada, October 31 - Nov. 4, 2016},
  pages        = {223--227},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNSM.2016.7818421},
  doi          = {10.1109/CNSM.2016.7818421},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsm/AlsalehHA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/RahmanJA16,
  author       = {Mohammad Ashiqur Rahman and
                  A. H. M. Jakaria and
                  Ehab Al{-}Shaer},
  title        = {Formal Analysis for Dependable Supervisory Control and Data Acquisition
                  in Smart Grids},
  booktitle    = {46th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2016, Toulouse, France, June 28 - July 1, 2016},
  pages        = {263--274},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/DSN.2016.32},
  doi          = {10.1109/DSN.2016.32},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/RahmanJA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccn/DogTRCQHYA16,
  author       = {Spike E. Dog and
                  Alex Tweed and
                  LeRoy Rouse and
                  Bill Chu and
                  Duan Qi and
                  Yueqi Hu and
                  Jing Yang and
                  Ehab Al{-}Shaer},
  title        = {Strategic Cyber Threat Intelligence Sharing: {A} Case Study of {IDS}
                  Logs},
  booktitle    = {25th International Conference on Computer Communication and Networks,
                  {ICCCN} 2016, Waikoloa, HI, USA, August 1-4, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICCCN.2016.7568578},
  doi          = {10.1109/ICCCN.2016.7568578},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/icccn/DogTRCQHYA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/AlsalehA16,
  author       = {Mohammed Noraden Alsaleh and
                  Ehab Al{-}Shaer},
  editor       = {Nicholas J. Multari and
                  Anoop Singhal and
                  David O. Manz},
  title        = {Towards Automated Verification of Active Cyber Defense Strategies
                  on Software Defined Networks},
  booktitle    = {Proceedings of the 2016 {ACM} Workshop on Automated Decision Making
                  for Active Cyber Defense, SafeConfig@CCS 2016, Vienna, Austria, October
                  24, 2016},
  pages        = {23--29},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2994475.2994482},
  doi          = {10.1145/2994475.2994482},
  timestamp    = {Tue, 06 Nov 2018 11:07:22 +0100},
  biburl       = {https://dblp.org/rec/conf/safeconfig/AlsalehA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/16/Al-ShaerG16,
  author       = {Ehab Al{-}Shaer and
                  Syed Fida Gillani},
  editor       = {Sushil Jajodia and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Agile Virtual Infrastructure for Cyber Deception Against Stealthy
                  DDoS Attacks},
  booktitle    = {Cyber Deception, Building the Scientific Foundation},
  pages        = {235--259},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-32699-3\_10},
  doi          = {10.1007/978-3-319-32699-3\_10},
  timestamp    = {Wed, 25 Sep 2019 17:41:11 +0200},
  biburl       = {https://dblp.org/rec/books/sp/16/Al-ShaerG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-net/MaityBGA15,
  author       = {Soumya Maity and
                  Padmalochan Bera and
                  S. K. Ghosh and
                  Ehab Al{-}Shaer},
  title        = {Formal integrated network security analysis tool: formal query-based
                  network security configuration analysis},
  journal      = {{IET} Networks},
  volume       = {4},
  number       = {2},
  pages        = {137--147},
  year         = {2015},
  url          = {https://doi.org/10.1049/iet-net.2013.0090},
  doi          = {10.1049/IET-NET.2013.0090},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-net/MaityBGA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/MaityGA15,
  author       = {Soumya Maity and
                  Soumya Kanti Ghosh and
                  Ehab Al{-}Shaer},
  title        = {PoliCon: a policy conciliation framework for heterogeneous mobile
                  ad hoc networks},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {3},
  pages        = {418--430},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.990},
  doi          = {10.1002/SEC.990},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/MaityGA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JafarianAD15,
  author       = {Jafar Haadi Jafarian and
                  Ehab Al{-}Shaer and
                  Qi Duan},
  title        = {An Effective Address Mutation Approach for Disrupting Reconnaissance
                  Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {12},
  pages        = {2562--2577},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2467358},
  doi          = {10.1109/TIFS.2015.2467358},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/JafarianAD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AliA15,
  author       = {Muhammad Qasim Ali and
                  Ehab Al{-}Shaer},
  title        = {Randomization-Based Intrusion Detection System for Advanced Metering
                  Infrastructure},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {18},
  number       = {2},
  pages        = {7:1--7:30},
  year         = {2015},
  url          = {https://doi.org/10.1145/2814936},
  doi          = {10.1145/2814936},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/AliA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Al-ShaerOR15,
  author       = {Ehab Al{-}Shaer and
                  Christopher S. Oehmen and
                  Mohammad Ashiqur Rahman},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {SafeConfig 2015: Workshop on Automated Decision Making for Active
                  Cyber Defense},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {1711--1712},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2812624},
  doi          = {10.1145/2810103.2812624},
  timestamp    = {Tue, 10 Nov 2020 19:58:09 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Al-ShaerOR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AliAAD15,
  author       = {Muhammad Qasim Ali and
                  Ayesha Binte Ashfaq and
                  Ehab Al{-}Shaer and
                  Qi Duan},
  title        = {Towards a science of anomaly detection system evasion},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {460--468},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346858},
  doi          = {10.1109/CNS.2015.7346858},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AliAAD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/GillaniALDAZ15,
  author       = {Fida Gillani and
                  Ehab Al{-}Shaer and
                  Samantha Lo and
                  Qi Duan and
                  Mostafa H. Ammar and
                  Ellen W. Zegura},
  title        = {Agile virtualized infrastructure to proactively defend against cyber
                  attacks},
  booktitle    = {2015 {IEEE} Conference on Computer Communications, {INFOCOM} 2015,
                  Kowloon, Hong Kong, April 26 - May 1, 2015},
  pages        = {729--737},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/INFOCOM.2015.7218442},
  doi          = {10.1109/INFOCOM.2015.7218442},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/GillaniALDAZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/JafarianAD15,
  author       = {Jafar Haadi Jafarian and
                  Ehab Al{-}Shaer and
                  Qi Duan},
  title        = {Adversary-aware {IP} address randomization for proactive agility against
                  sophisticated attackers},
  booktitle    = {2015 {IEEE} Conference on Computer Communications, {INFOCOM} 2015,
                  Kowloon, Hong Kong, April 26 - May 1, 2015},
  pages        = {738--746},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/INFOCOM.2015.7218443},
  doi          = {10.1109/INFOCOM.2015.7218443},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/JafarianAD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/KhanAR15,
  author       = {Yasir Imtiaz Khan and
                  Ehab Al{-}Shaer and
                  Usman Rauf},
  editor       = {Ehab Al{-}Shaer and
                  Christopher S. Oehmen and
                  Mohammad Ashiqur Rahman},
  title        = {Cyber Resilience-by-Construction: Modeling, Measuring {\&} Verifying},
  booktitle    = {Proceedings of the 2015 Workshop on Automated Decision Making for
                  Active Cyber Defense, SafeConfig 2015, Denver, Colorado, USA, October
                  12, 2015},
  pages        = {9--14},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2809826.2809836},
  doi          = {10.1145/2809826.2809836},
  timestamp    = {Tue, 06 Nov 2018 11:07:22 +0100},
  biburl       = {https://dblp.org/rec/conf/safeconfig/KhanAR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/OehmenAR15,
  author       = {Christopher S. Oehmen and
                  Ehab Al{-}Shaer and
                  Mohammad Ashiqur Rahman},
  editor       = {Ehab Al{-}Shaer and
                  Christopher S. Oehmen and
                  Mohammad Ashiqur Rahman},
  title        = {Automated Decision Making for Active Cyber Defense: Panel Discussion},
  booktitle    = {Proceedings of the 2015 Workshop on Automated Decision Making for
                  Active Cyber Defense, SafeConfig 2015, Denver, Colorado, USA, October
                  12, 2015},
  pages        = {59},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2809826.2809828},
  doi          = {10.1145/2809826.2809828},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/safeconfig/OehmenAR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartgridcomm/RahmanA15,
  author       = {Mohammad Ashiqur Rahman and
                  Ehab Al{-}Shaer},
  title        = {Formal synthesis of dependable configurations for advanced metering
                  infrastructures},
  booktitle    = {2015 {IEEE} International Conference on Smart Grid Communications,
                  SmartGridComm 2015, Miami, FL, USA, November 2-5, 2015},
  pages        = {289--294},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/SmartGridComm.2015.7436315},
  doi          = {10.1109/SMARTGRIDCOMM.2015.7436315},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/smartgridcomm/RahmanA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Al-ShaerR15,
  author       = {Ehab Al{-}Shaer and
                  Mohammad Ashiqur Rahman},
  editor       = {Sushil Jajodia and
                  Paulo Shakarian and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Attribution, Temptation, and Expectation: {A} Formal Framework for
                  Defense-by-Deception in Cyberwarfare},
  booktitle    = {Cyber Warfare - Building the Scientific Foundation},
  series       = {Advances in Information Security},
  volume       = {56},
  pages        = {57--80},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-14039-1\_4},
  doi          = {10.1007/978-3-319-14039-1\_4},
  timestamp    = {Tue, 16 May 2017 14:24:25 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Al-ShaerR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/safeconfig/2015,
  editor       = {Ehab Al{-}Shaer and
                  Christopher S. Oehmen and
                  Mohammad Ashiqur Rahman},
  title        = {Proceedings of the 2015 Workshop on Automated Decision Making for
                  Active Cyber Defense, SafeConfig 2015, Denver, Colorado, USA, October
                  12, 2015},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2809826},
  doi          = {10.1145/2809826},
  isbn         = {978-1-4503-3821-9},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/safeconfig/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/Al-Shaer14,
  author       = {Ehab Al{-}Shaer},
  title        = {Automated Firewall Analytics - Design, Configuration and Optimization},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10371-6},
  doi          = {10.1007/978-3-319-10371-6},
  isbn         = {978-3-319-10370-9},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/Al-Shaer14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/AshfaqRJKAA14,
  author       = {Ayesha Binte Ashfaq and
                  Sajjad Rizvi and
                  Mobin Javed and
                  Syed Ali Khayam and
                  Muhammad Qasim Ali and
                  Ehab Al{-}Shaer},
  title        = {Information theoretic feature space slicing for statistical anomaly
                  detection},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {41},
  pages        = {473--487},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jnca.2014.01.002},
  doi          = {10.1016/J.JNCA.2014.01.002},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/AshfaqRJKAA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AliAS14,
  author       = {Muhammad Qasim Ali and
                  Ehab Al{-}Shaer and
                  Taghrid Samak},
  title        = {Firewall Policy Reconnaissance: Techniques and Analysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {9},
  number       = {2},
  pages        = {296--308},
  year         = {2014},
  url          = {https://doi.org/10.1109/TIFS.2013.2296874},
  doi          = {10.1109/TIFS.2013.2296874},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AliAS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/GillaniDAA14,
  author       = {Syed Fida Gillani and
                  Mehmet Demirci and
                  Ehab Al{-}Shaer and
                  Mostafa H. Ammar},
  title        = {Problem Localization and Quantification Using Formal Evidential Reasoning
                  for Virtual Networks},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {11},
  number       = {3},
  pages        = {307--320},
  year         = {2014},
  url          = {https://doi.org/10.1109/TNSM.2014.2326297},
  doi          = {10.1109/TNSM.2014.2326297},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnsm/GillaniDAA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RahmanAB14,
  author       = {Mohammad Ashiqur Rahman and
                  Ehab Al{-}Shaer and
                  Rakesh B. Bobba},
  editor       = {Sushil Jajodia and
                  Kun Sun},
  title        = {Moving Target Defense for Hardening the Security of the Power System
                  State Estimation},
  booktitle    = {Proceedings of the First {ACM} Workshop on Moving Target Defense,
                  {MTD} '14, Scottsdale, Arizona, USA, November 7, 2014},
  pages        = {59--68},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2663474.2663482},
  doi          = {10.1145/2663474.2663482},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/RahmanAB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JafarianAD14,
  author       = {Jafar Haadi Jafarian and
                  Ehab Al{-}Shaer and
                  Qi Duan},
  editor       = {Sushil Jajodia and
                  Kun Sun},
  title        = {Spatio-temporal Address Mutation for Proactive Cyber Agility against
                  Sophisticated Attackers},
  booktitle    = {Proceedings of the First {ACM} Workshop on Moving Target Defense,
                  {MTD} '14, Scottsdale, Arizona, USA, November 7, 2014},
  pages        = {69--78},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2663474.2663483},
  doi          = {10.1145/2663474.2663483},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JafarianAD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Al-ShaerK14,
  author       = {Ehab Al{-}Shaer and
                  Krishna Kant},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {Summary Abstract for the 7th {ACM} International Workshop on Cyber
                  Security Analytics, Intelligence and Automation},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {1544--1545},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660382},
  doi          = {10.1145/2660267.2660382},
  timestamp    = {Tue, 10 Nov 2020 20:00:23 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Al-ShaerK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AlsalehA14,
  author       = {Mohammed Noraden Alsaleh and
                  Ehab Al{-}Shaer},
  title        = {Security configuration analytics using video games},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {256--264},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997493},
  doi          = {10.1109/CNS.2014.6997493},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AlsalehA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AliYAKZ14,
  author       = {Muhammad Qasim Ali and
                  Reza Yousefian and
                  Ehab Al{-}Shaer and
                  Sukumar Kamalasadan and
                  Quanyan Zhu},
  title        = {Two-tier data-driven intrusion detection for automatic generation
                  control in smart grid},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {292--300},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997497},
  doi          = {10.1109/CNS.2014.6997497},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/AliYAKZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/RahmanAK14,
  author       = {Mohammad Ashiqur Rahman and
                  Ehab Al{-}Shaer and
                  Rajesh G. Kavasseri},
  title        = {Security Threat Analytics and Countermeasure Synthesis for Power System
                  State Estimation},
  booktitle    = {44th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2014, Atlanta, GA, USA, June 23-26, 2014},
  pages        = {156--167},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/DSN.2014.29},
  doi          = {10.1109/DSN.2014.29},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/RahmanAK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccps/RahmanAK14,
  author       = {Mohammad Ashiqur Rahman and
                  Ehab Al{-}Shaer and
                  Rajesh G. Kavasseri},
  title        = {A formal model for verifying the impact of stealthy attacks on optimal
                  power flow in power grids},
  booktitle    = {{ACM/IEEE} International Conference on Cyber-Physical Systems, ICCPS,
                  Berlin, Germany, April 14-17, 2014},
  pages        = {175--186},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICCPS.2014.6843721},
  doi          = {10.1109/ICCPS.2014.6843721},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccps/RahmanAK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/RahmanAK14,
  author       = {Mohammad Ashiqur Rahman and
                  Ehab Al{-}Shaer and
                  Rajesh G. Kavasseri},
  title        = {Impact Analysis of Topology Poisoning Attacks on Economic Operation
                  of the Smart Power Grid},
  booktitle    = {{IEEE} 34th International Conference on Distributed Computing Systems,
                  {ICDCS} 2014, Madrid, Spain, June 30 - July 3, 2014},
  pages        = {649--659},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICDCS.2014.72},
  doi          = {10.1109/ICDCS.2014.72},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/RahmanAK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/GillaniA14,
  author       = {Fida Gillani and
                  Ehab Al{-}Shaer},
  editor       = {Ehab Al{-}Shaer and
                  Krishna Kant},
  title        = {Improving Efficiency of Spam Detection using Economic Model},
  booktitle    = {Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence
                  and Automation, SafeConfig '14, Scottsdale, Arizona, USA, November
                  3, 2014},
  pages        = {11--18},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2665936.2665942},
  doi          = {10.1145/2665936.2665942},
  timestamp    = {Thu, 13 Feb 2020 15:16:46 +0100},
  biburl       = {https://dblp.org/rec/conf/safeconfig/GillaniA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/AlsalehA14,
  author       = {Mohammed Noraden Alsaleh and
                  Ehab Al{-}Shaer},
  editor       = {Ehab Al{-}Shaer and
                  Krishna Kant},
  title        = {Enterprise Risk Assessment Based on Compliance Reports and Vulnerability
                  Scoring Systems},
  booktitle    = {Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence
                  and Automation, SafeConfig '14, Scottsdale, Arizona, USA, November
                  3, 2014},
  pages        = {25--28},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2665936.2665941},
  doi          = {10.1145/2665936.2665941},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/safeconfig/AlsalehA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/safeconfig/2014,
  editor       = {Ehab Al{-}Shaer and
                  Krishna Kant},
  title        = {Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence
                  and Automation, SafeConfig '14, Scottsdale, Arizona, USA, November
                  3, 2014},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2665936},
  doi          = {10.1145/2665936},
  isbn         = {978-1-4503-3147-0},
  timestamp    = {Thu, 13 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/safeconfig/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/DuanJAX14,
  author       = {Qi Duan and
                  Jafar Haadi Jafarian and
                  Ehab Al{-}Shaer and
                  Jinhui Xu},
  title        = {On DDoS Attack Related Minimum Cut Problems},
  journal      = {CoRR},
  volume       = {abs/1412.3359},
  year         = {2014},
  url          = {http://arxiv.org/abs/1412.3359},
  eprinttype    = {arXiv},
  eprint       = {1412.3359},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/DuanJAX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/DuanA13,
  author       = {Qi Duan and
                  Ehab Al{-}Shaer},
  title        = {Traffic-aware dynamic firewall policy management: techniques and applications},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {51},
  number       = {7},
  year         = {2013},
  url          = {https://doi.org/10.1109/MCOM.2013.6553681},
  doi          = {10.1109/MCOM.2013.6553681},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/DuanA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/TozalWASTC13,
  author       = {Mehmet Engin Tozal and
                  Yongge Wang and
                  Ehab Al{-}Shaer and
                  Kamil Sara{\c{c}} and
                  Bhavani Thuraisingham and
                  Bei{-}tseng Chu},
  title        = {Adaptive Information Coding for Secure and Reliable Wireless Telesurgery
                  Communications},
  journal      = {Mob. Networks Appl.},
  volume       = {18},
  number       = {5},
  pages        = {697--711},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11036-011-0333-3},
  doi          = {10.1007/S11036-011-0333-3},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/monet/TozalWASTC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AliAKK13,
  author       = {Muhammad Qasim Ali and
                  Ehab Al{-}Shaer and
                  Hassan Khan and
                  Syed Ali Khayam},
  title        = {Automated Anomaly Detector Adaptation using Adaptive Threshold Tuning},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {15},
  number       = {4},
  pages        = {17:1--17:30},
  year         = {2013},
  url          = {https://doi.org/10.1145/2445566.2445569},
  doi          = {10.1145/2445566.2445569},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/AliAKK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/RahmanAB13,
  author       = {Mohammad Ashiqur Rahman and
                  Ehab Al{-}Shaer and
                  Padmalochan Bera},
  title        = {A Noninvasive Threat Analyzer for Advanced Metering Infrastructure
                  in Smart Grid},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {4},
  number       = {1},
  pages        = {273--287},
  year         = {2013},
  url          = {https://doi.org/10.1109/TSG.2012.2228283},
  doi          = {10.1109/TSG.2012.2228283},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsg/RahmanAB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEscc/DuanWMA13,
  author       = {Qi Duan and
                  Yongge Wang and
                  Fadi Mohsen and
                  Ehab Al{-}Shaer},
  title        = {Private and Anonymous Data Storage and Distribution in Cloud},
  booktitle    = {2013 {IEEE} International Conference on Services Computing, Santa
                  Clara, CA, USA, June 28 - July 3, 2013},
  pages        = {264--271},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SCC.2013.53},
  doi          = {10.1109/SCC.2013.53},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEscc/DuanWMA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEscc/Al-HajAR13,
  author       = {Saeed Al{-}Haj and
                  Ehab Al{-}Shaer and
                  HariGovind V. Ramasamy},
  title        = {Security-Aware Resource Allocation in Clouds},
  booktitle    = {2013 {IEEE} International Conference on Services Computing, Santa
                  Clara, CA, USA, June 28 - July 3, 2013},
  pages        = {400--407},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SCC.2013.36},
  doi          = {10.1109/SCC.2013.36},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEscc/Al-HajAR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RahmanMA13,
  author       = {Mohammad Ashiqur Rahman and
                  Fadi Mohsen and
                  Ehab Al{-}Shaer},
  editor       = {Benessa Defend and
                  Klaus Kursawe},
  title        = {A formal model for sustainable vehicle-to-grid management},
  booktitle    = {SEGS'13, Proceedings of the 2013 {ACM} Workshop on Smart Energy Grid
                  Security, Co-located with {CCS} 2013, November 8, 2013, Berlin, Germany},
  pages        = {81--92},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2516930.2516937},
  doi          = {10.1145/2516930.2516937},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/RahmanMA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AliA13,
  author       = {Muhammad Qasim Ali and
                  Ehab Al{-}Shaer},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {Configuration-based {IDS} for advanced metering infrastructure},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {451--462},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516745},
  doi          = {10.1145/2508859.2516745},
  timestamp    = {Tue, 10 Nov 2020 19:58:06 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AliA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AshfaqAAK13,
  author       = {Ayesha Binte Ashfaq and
                  Muhammad Qasim Ali and
                  Ehab Al{-}Shaer and
                  Syed Ali Khayam},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {Revisiting anomaly detection system design philosophy},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {1473--1476},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2512529},
  doi          = {10.1145/2508859.2512529},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AshfaqAAK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/RahmanMA13,
  author       = {Mohammad Ashiqur Rahman and
                  Mohammad Hossein Manshaei and
                  Ehab Al{-}Shaer},
  title        = {A game-theoretic approach for deceiving Remote Operating System Fingerprinting},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {73--81},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682694},
  doi          = {10.1109/CNS.2013.6682694},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/RahmanMA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/DuanAJ13,
  author       = {Qi Duan and
                  Ehab Al{-}Shaer and
                  Jafar Haadi Jafarian},
  title        = {Efficient Random Route Mutation considering flow and network constraints},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {260--268},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682715},
  doi          = {10.1109/CNS.2013.6682715},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/DuanAJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AlsalehAA13,
  author       = {Mohammed Noraden Alsaleh and
                  Saeed Al{-}Haj and
                  Ehab Al{-}Shaer},
  title        = {Objective metrics for firewall security: {A} holistic view},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {470--477},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682762},
  doi          = {10.1109/CNS.2013.6682762},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AlsalehAA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsm/Al-HajA13,
  author       = {Saeed Al{-}Haj and
                  Ehab Al{-}Shaer},
  title        = {A formal approach for virtual machine migration planning},
  booktitle    = {Proceedings of the 9th International Conference on Network and Service
                  Management, {CNSM} 2013, Zurich, Switzerland, October 14-18, 2013},
  pages        = {51--58},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNSM.2013.6727809},
  doi          = {10.1109/CNSM.2013.6727809},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cnsm/Al-HajA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/JafarianAD13,
  author       = {Jafar Haadi Jafarian and
                  Ehab Al{-}Shaer and
                  Qi Duan},
  editor       = {Jason Crampton and
                  Sushil Jajodia and
                  Keith Mayes},
  title        = {Formal Approach for Route Agility against Persistent Attackers},
  booktitle    = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research
                  in Computer Security, Egham, UK, September 9-13, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8134},
  pages        = {237--254},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40203-6\_14},
  doi          = {10.1007/978-3-642-40203-6\_14},
  timestamp    = {Wed, 25 Sep 2019 18:03:15 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/JafarianAD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/DemirciGAA13,
  author       = {Mehmet Demirci and
                  Fida Gillani and
                  Mostafa H. Ammar and
                  Ehab Al{-}Shaer},
  title        = {Overlay network placement for diagnosability},
  booktitle    = {2013 {IEEE} Global Communications Conference, {GLOBECOM} 2013, Atlanta,
                  GA, USA, December 9-13, 2013},
  pages        = {2236--2242},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/GLOCOM.2013.6831407},
  doi          = {10.1109/GLOCOM.2013.6831407},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/DemirciGAA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccps/RahmanDA13,
  author       = {Mohammad Ashiqur Rahman and
                  Qi Duan and
                  Ehab Al{-}Shaer},
  editor       = {Chenyang Lu and
                  P. R. Kumar and
                  Radu Stoleru},
  title        = {Energy efficient navigation management for hybrid electric vehicles
                  on highways},
  booktitle    = {{ACM/IEEE} 4th International Conference on Cyber-Physical Systems
                  (with {CPS} Week 2013), {ICCPS} '13, Philadelphia, PA, USA, April
                  8-11, 2013},
  pages        = {21--30},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2502524.2502528},
  doi          = {10.1145/2502524.2502528},
  timestamp    = {Thu, 08 Apr 2021 08:40:46 +0200},
  biburl       = {https://dblp.org/rec/conf/iccps/RahmanDA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/RahmanA13,
  author       = {Mohammad Ashiqur Rahman and
                  Ehab Al{-}Shaer},
  title        = {A Formal Framework for Network Security Design Synthesis},
  booktitle    = {{IEEE} 33rd International Conference on Distributed Computing Systems,
                  {ICDCS} 2013, 8-11 July, 2013, Philadelphia, Pennsylvania, {USA}},
  pages        = {560--570},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICDCS.2013.70},
  doi          = {10.1109/ICDCS.2013.70},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/RahmanA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/im/RahmanA13,
  author       = {Mohammad Ashiqur Rahman and
                  Ehab Al{-}Shaer},
  editor       = {Filip De Turck and
                  Yixin Diao and
                  Choong Seon Hong and
                  Deep Medhi and
                  Ramin Sadre},
  title        = {A formal approach for network security management based on qualitative
                  risk analysis},
  booktitle    = {2013 {IFIP/IEEE} International Symposium on Integrated Network Management
                  {(IM} 2013), Ghent, Belgium, May 27-31, 2013},
  pages        = {244--251},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/6572992/},
  timestamp    = {Tue, 10 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/im/RahmanA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobicom/Al-ShaerDAY13,
  author       = {Ehab Al{-}Shaer and
                  Qi Duan and
                  Saeed Al{-}Haj and
                  Moustafa Youssef},
  editor       = {Thomas F. La Porta and
                  Habib M. Ammari},
  title        = {SensorChecker: reachability verification in mission-oriented sensor
                  networks},
  booktitle    = {Proceedings of the 2nd {ACM} annual international workshop on Mission-oriented
                  wireless sensor networking, MiSeNet@MobiCom 2013, Miami, Florida,
                  USA, October 4, 2013},
  pages        = {51--56},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2509338.2509344},
  doi          = {10.1145/2509338.2509344},
  timestamp    = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobicom/Al-ShaerDAY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/RahmanA13,
  author       = {Mohammad Ashiqur Rahman and
                  Ehab Al{-}Shaer},
  title        = {Metrics for Automated Network Security Design},
  booktitle    = {20th Annual Network and Distributed System Security Symposium, {NDSS}
                  2013, San Diego, California, USA, February 24-27, 2013},
  publisher    = {The Internet Society},
  year         = {2013},
  url          = {https://www.ndss-symposium.org/ndss2013/metrics-automated-network-security-design},
  timestamp    = {Mon, 01 Feb 2021 08:42:13 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/RahmanA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartgridcomm/RahmanAR13,
  author       = {Mohammad Ashiqur Rahman and
                  Ehab Al{-}Shaer and
                  Md. Ashfaqur Rahman},
  title        = {A formal model for verifying stealthy attacks on state estimation
                  in power grids},
  booktitle    = {{IEEE} Fourth International Conference on Smart Grid Communications,
                  SmartGridComm 2013, Vancouver, BC, Canada, October 21-24, 2013},
  pages        = {414--419},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SmartGridComm.2013.6687993},
  doi          = {10.1109/SMARTGRIDCOMM.2013.6687993},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/smartgridcomm/RahmanAR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartgridcomm/AliA13,
  author       = {Muhammad Qasim Ali and
                  Ehab Al{-}Shaer},
  title        = {Probabilistic model checking for {AMI} intrusion detection},
  booktitle    = {{IEEE} Fourth International Conference on Smart Grid Communications,
                  SmartGridComm 2013, Vancouver, BC, Canada, October 21-24, 2013},
  pages        = {468--473},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SmartGridComm.2013.6688002},
  doi          = {10.1109/SMARTGRIDCOMM.2013.6688002},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/smartgridcomm/AliA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartgridcomm/AliAD13,
  author       = {Muhammad Qasim Ali and
                  Ehab Al{-}Shaer and
                  Qi Duan},
  title        = {Randomizing {AMI} configuration for proactive defense in smart grid},
  booktitle    = {{IEEE} Fourth International Conference on Smart Grid Communications,
                  SmartGridComm 2013, Vancouver, BC, Canada, October 21-24, 2013},
  pages        = {618--623},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/SmartGridComm.2013.6688027},
  doi          = {10.1109/SMARTGRIDCOMM.2013.6688027},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/smartgridcomm/AliAD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/safeconfig/2012,
  editor       = {Ehab Al{-}Shaer and
                  Xinming Ou and
                  Geoffrey G. Xie},
  title        = {Automated Security Management [papers from SafeConfig 2012, Baltimore
                  Inner Harbor, MD, {USA]}},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-01433-3},
  doi          = {10.1007/978-3-319-01433-3},
  isbn         = {978-3-319-01432-6},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/safeconfig/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/TangAJ12,
  author       = {Yongning Tang and
                  Ehab Al{-}Shaer and
                  Kaustubh R. Joshi},
  title        = {Reasoning under Uncertainty for Overlay Fault Diagnosis},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {9},
  number       = {1},
  pages        = {34--47},
  year         = {2012},
  url          = {https://doi.org/10.1109/TNSM.2011.010312.110126},
  doi          = {10.1109/TNSM.2011.010312.110126},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnsm/TangAJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/SamakA12,
  author       = {Taghrid Samak and
                  Ehab Al{-}Shaer},
  title        = {Fuzzy Conflict Analysis for QoS Policy Parameters in DiffServ Networks},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {9},
  number       = {4},
  pages        = {459--472},
  year         = {2012},
  url          = {https://doi.org/10.1109/TNSM.2012.062512.120308},
  doi          = {10.1109/TNSM.2012.062512.120308},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnsm/SamakA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GillaniAAK12,
  author       = {Syed Fida Gillani and
                  Ehab Al{-}Shaer and
                  Sardar Ali and
                  Syed Ali Khayam},
  editor       = {Heung Youl Youm and
                  Yoojae Won},
  title        = {Monetizing spambot activity and understanding its relation with spambot
                  traffic features},
  booktitle    = {7th {ACM} Symposium on Information, Compuer and Communications Security,
                  {ASIACCS} '12, Seoul, Korea, May 2-4, 2012},
  pages        = {51--52},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2414456.2414486},
  doi          = {10.1145/2414456.2414486},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GillaniAAK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsm/GillaniAAD12,
  author       = {Fida Gillani and
                  Ehab Al{-}Shaer and
                  Mostafa H. Ammar and
                  Mehmet Demirci},
  title        = {Fine-grain diagnosis of overlay performance anomalies using end-point
                  network experiences},
  booktitle    = {8th International Conference on Network and Service Management, {CNSM}
                  2012, Las Vegas, NV, USA, October 22-26, 2012},
  pages        = {91--99},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6379996/},
  timestamp    = {Sun, 08 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsm/GillaniAAD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsm/DuanAA12,
  author       = {Qi Duan and
                  Saeed Al{-}Haj and
                  Ehab Al{-}Shaer},
  title        = {Provable configuration planning for wireless sensor networks},
  booktitle    = {8th International Conference on Network and Service Management, {CNSM}
                  2012, Las Vegas, NV, USA, October 22-26, 2012},
  pages        = {316--321},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6380036/},
  timestamp    = {Sun, 08 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsm/DuanAA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexa/ShehabABA12,
  author       = {Mohamed Shehab and
                  Saeed Al{-}Haj and
                  Salil Bhagurkar and
                  Ehab Al{-}Shaer},
  editor       = {Stephen W. Liddle and
                  Klaus{-}Dieter Schewe and
                  A Min Tjoa and
                  Xiaofang Zhou},
  title        = {Anomaly Discovery and Resolution in MySQL Access Control Policies},
  booktitle    = {Database and Expert Systems Applications - 23rd International Conference,
                  {DEXA} 2012, Vienna, Austria, September 3-6, 2012. Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7447},
  pages        = {514--522},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32597-7\_47},
  doi          = {10.1007/978-3-642-32597-7\_47},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dexa/ShehabABA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/RahmanBA12,
  author       = {Mohammad Ashiqur Rahman and
                  Padmalochan Bera and
                  Ehab Al{-}Shaer},
  editor       = {Albert G. Greenberg and
                  Kazem Sohraby},
  title        = {SmartAnalyzer: {A} noninvasive security threat analyzer for {AMI}
                  smart grid},
  booktitle    = {Proceedings of the {IEEE} {INFOCOM} 2012, Orlando, FL, USA, March
                  25-30, 2012},
  pages        = {2255--2263},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/INFCOM.2012.6195611},
  doi          = {10.1109/INFCOM.2012.6195611},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/RahmanBA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/TranAAB12,
  author       = {Tung Tran and
                  Issam Aib and
                  Ehab Al{-}Shaer and
                  Raouf Boutaba},
  editor       = {Filip De Turck and
                  Luciano Paschoal Gaspary and
                  Deep Medhi},
  title        = {An evasive attack on {SNORT} flowbits},
  booktitle    = {2012 {IEEE} Network Operations and Management Symposium, {NOMS} 2012,
                  Maui, HI, USA, April 16-20, 2012},
  pages        = {351--358},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/NOMS.2012.6211918},
  doi          = {10.1109/NOMS.2012.6211918},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/noms/TranAAB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/AmezzianeAA12,
  author       = {Mohamed Amezziane and
                  Ehab Al{-}Shaer and
                  Muhammad Qasim Ali},
  editor       = {Filip De Turck and
                  Luciano Paschoal Gaspary and
                  Deep Medhi},
  title        = {On stochastic risk ordering of network services for proactive security
                  management},
  booktitle    = {2012 {IEEE} Network Operations and Management Symposium, {NOMS} 2012,
                  Maui, HI, USA, April 16-20, 2012},
  pages        = {994--1000},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/NOMS.2012.6212020},
  doi          = {10.1109/NOMS.2012.6212020},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/noms/AmezzianeAA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/AlsalehAE12,
  author       = {Mohammed Noraden Alsaleh and
                  Ehab Al{-}Shaer and
                  Adel El{-}Atawy},
  editor       = {Ehab Al{-}Shaer and
                  Xinming Ou and
                  Geoffrey G. Xie},
  title        = {Towards a Unified Modeling and Verification of Network and System
                  Security Configurations},
  booktitle    = {Automated Security Management [papers from SafeConfig 2012, Baltimore
                  Inner Harbor, MD, {USA]}},
  pages        = {3--19},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-319-01433-3\_1},
  doi          = {10.1007/978-3-319-01433-3\_1},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/safeconfig/AlsalehAE12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/RahmanA12,
  author       = {Mohammad Ashiqur Rahman and
                  Ehab Al{-}Shaer},
  editor       = {Ehab Al{-}Shaer and
                  Xinming Ou and
                  Geoffrey G. Xie},
  title        = {A Declarative Logic-Based Approach for Threat Analysis of Advanced
                  Metering Infrastructure},
  booktitle    = {Automated Security Management [papers from SafeConfig 2012, Baltimore
                  Inner Harbor, MD, {USA]}},
  pages        = {59--77},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-319-01433-3\_4},
  doi          = {10.1007/978-3-319-01433-3\_4},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/safeconfig/RahmanA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/Al-ShaerDJ12,
  author       = {Ehab Al{-}Shaer and
                  Qi Duan and
                  Jafar Haadi Jafarian},
  editor       = {Angelos D. Keromytis and
                  Roberto Di Pietro},
  title        = {Random Host Mutation for Moving Target Defense},
  booktitle    = {Security and Privacy in Communication Networks - 8th International
                  {ICST} Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012.
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {106},
  pages        = {310--327},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-36883-7\_19},
  doi          = {10.1007/978-3-642-36883-7\_19},
  timestamp    = {Tue, 23 May 2017 01:12:12 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/Al-ShaerDJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/JafarianAD12,
  author       = {Jafar Haadi Jafarian and
                  Ehab Al{-}Shaer and
                  Qi Duan},
  editor       = {Nick Feamster and
                  Jennifer Rexford},
  title        = {Openflow random host mutation: transparent moving target defense using
                  software defined networking},
  booktitle    = {Proceedings of the first workshop on Hot topics in software defined
                  networks, HotSDN@SIGCOMM 2012, Helsinki, Finland, August 13, 2012},
  pages        = {127--132},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2342441.2342467},
  doi          = {10.1145/2342441.2342467},
  timestamp    = {Mon, 26 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcomm/JafarianAD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RahmanBSA12,
  author       = {Mohammad Ashiqur Rahman and
                  Libin Bai and
                  Mohamed Shehab and
                  Ehab Al{-}Shaer},
  editor       = {Geyong Min and
                  Yulei Wu and
                  Lei (Chris) Liu and
                  Xiaolong Jin and
                  Stephen A. Jarvis and
                  Ahmed Yassin Al{-}Dubai},
  title        = {Secure Distributed Solution for Optimal Energy Consumption Scheduling
                  in Smart Grid},
  booktitle    = {11th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2012, Liverpool, United
                  Kingdom, June 25-27, 2012},
  pages        = {279--286},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/TrustCom.2012.252},
  doi          = {10.1109/TRUSTCOM.2012.252},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/RahmanBSA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnsm/AhmedATK11,
  author       = {Mohammad Salim Ahmed and
                  Ehab Al{-}Shaer and
                  Mohamed Mahmoud Taibah and
                  Latifur Khan},
  title        = {Objective Risk Evaluation for Automated Security Management},
  journal      = {J. Netw. Syst. Manag.},
  volume       = {19},
  number       = {3},
  pages        = {343--366},
  year         = {2011},
  url          = {https://doi.org/10.1007/s10922-010-9177-6},
  doi          = {10.1007/S10922-010-9177-6},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnsm/AhmedATK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SalahSSA11,
  author       = {Khaled Salah and
                  Karim Sattar and
                  Mohammed H. Sqalli and
                  Ehab Al{-}Shaer},
  title        = {A potential low-rate DoS attack against network firewalls},
  journal      = {Secur. Commun. Networks},
  volume       = {4},
  number       = {2},
  pages        = {136--146},
  year         = {2011},
  url          = {https://doi.org/10.1002/sec.118},
  doi          = {10.1002/SEC.118},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/SalahSSA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsm/0007A11,
  author       = {Bin Zhang and
                  Ehab Al{-}Shaer},
  title        = {On synthesizing distributed firewall configurations considering risk,
                  usability and cost constraints},
  booktitle    = {7th International Conference on Network and Service Management, {CNSM}
                  2011, Paris, France, October 24-28, 2011},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6103995/},
  timestamp    = {Sun, 08 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cnsm/0007A11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/im/RahmanA11,
  author       = {Mohammad Ashiqur Rahman and
                  Ehab Al{-}Shaer},
  editor       = {Nazim Agoulmine and
                  Claudio Bartolini and
                  Tom Pfeifer and
                  Declan O'Sullivan},
  title        = {A declarative approach for global network security configuration verification
                  and evaluation},
  booktitle    = {Proceedings of the 12th {IFIP/IEEE} International Symposium on Integrated
                  Network Management, {IM} 2011, Dublin, Ireland, 23-27 May 2011},
  pages        = {531--538},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/INM.2011.5990556},
  doi          = {10.1109/INM.2011.5990556},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/im/RahmanA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwqos/SamakEA11,
  author       = {Taghrid Samak and
                  Adel El{-}Atawy and
                  Ehab Al{-}Shaer},
  title        = {QoS policy verification for DiffServ networks},
  booktitle    = {19th International Workshop on Quality of Service, IWQoS 2011, San
                  Jose, California, USA, 6-7 June 2011},
  pages        = {1--3},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/IWQOS.2011.5931332},
  doi          = {10.1109/IWQOS.2011.5931332},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/iwqos/SamakEA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/Al-HajA11,
  author       = {Saeed Al{-}Haj and
                  Ehab Al{-}Shaer},
  editor       = {John Banghart and
                  Ehab Al{-}Shaer and
                  Tony Sager and
                  HariGovind V. Ramasamy},
  title        = {CloudChecker: An imperative framework for cloud configuration management},
  booktitle    = {4th Symposium on Configuration Analytics and Automation, SafeConfig
                  2011, Arlington, VA, USA, October 31 - November 1, 2011},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/SafeConfig.2011.6111666},
  doi          = {10.1109/SAFECONFIG.2011.6111666},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/safeconfig/Al-HajA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/Al-HajA11a,
  author       = {Saeed Al{-}Haj and
                  Ehab Al{-}Shaer},
  editor       = {John Banghart and
                  Ehab Al{-}Shaer and
                  Tony Sager and
                  HariGovind V. Ramasamy},
  title        = {Measuring Firewall Security},
  booktitle    = {4th Symposium on Configuration Analytics and Automation, SafeConfig
                  2011, Arlington, VA, USA, October 31 - November 1, 2011},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/SafeConfig.2011.6111669},
  doi          = {10.1109/SAFECONFIG.2011.6111669},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/safeconfig/Al-HajA11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/Al-ShaerA11,
  author       = {Ehab Al{-}Shaer and
                  Mohammed Noraden Alsaleh},
  editor       = {John Banghart and
                  Ehab Al{-}Shaer and
                  Tony Sager and
                  HariGovind V. Ramasamy},
  title        = {ConfigChecker: {A} tool for comprehensive security configuration analytics},
  booktitle    = {4th Symposium on Configuration Analytics and Automation, SafeConfig
                  2011, Arlington, VA, USA, October 31 - November 1, 2011},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/SafeConfig.2011.6111667},
  doi          = {10.1109/SAFECONFIG.2011.6111667},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/safeconfig/Al-ShaerA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/AlsalehA11,
  author       = {Mohammed Noraden Alsaleh and
                  Ehab Al{-}Shaer},
  editor       = {John Banghart and
                  Ehab Al{-}Shaer and
                  Tony Sager and
                  HariGovind V. Ramasamy},
  title        = {{SCAP} Based Configuration Analytics for Comprehensive Compliance
                  Checking},
  booktitle    = {4th Symposium on Configuration Analytics and Automation, SafeConfig
                  2011, Arlington, VA, USA, October 31 - November 1, 2011},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/SafeConfig.2011.6111674},
  doi          = {10.1109/SAFECONFIG.2011.6111674},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/safeconfig/AlsalehA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/NarainMA11,
  author       = {Sanjai Narain and
                  Sharad Malik and
                  Ehab Al{-}Shaer},
  editor       = {John Banghart and
                  Ehab Al{-}Shaer and
                  Tony Sager and
                  HariGovind V. Ramasamy},
  title        = {Towards Eliminating Configuration Errors in Cyber Infrastructure},
  booktitle    = {4th Symposium on Configuration Analytics and Automation, SafeConfig
                  2011, Arlington, VA, USA, October 31 - November 1, 2011},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/SafeConfig.2011.6111678},
  doi          = {10.1109/SAFECONFIG.2011.6111678},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/safeconfig/NarainMA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/RahmanA11,
  author       = {Mohammad Ashiqur Rahman and
                  Ehab Al{-}Shaer},
  editor       = {John Banghart and
                  Ehab Al{-}Shaer and
                  Tony Sager and
                  HariGovind V. Ramasamy},
  title        = {AMIAnalyzer: Security analysis of {AMI} configurations},
  booktitle    = {4th Symposium on Configuration Analytics and Automation, SafeConfig
                  2011, Arlington, VA, USA, October 31 - November 1, 2011},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/SafeConfig.2011.6111662},
  doi          = {10.1109/SAFECONFIG.2011.6111662},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/safeconfig/RahmanA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/Al-HajBA11,
  author       = {Saeed Al{-}Haj and
                  Padmalochan Bera and
                  Ehab Al{-}Shaer},
  editor       = {Muttukrishnan Rajarajan and
                  Fred Piper and
                  Haining Wang and
                  George Kesidis},
  title        = {Build and Test Your Own Network Configuration},
  booktitle    = {Security and Privacy in Communication Networks - 7th International
                  {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {96},
  pages        = {522--532},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-31909-9\_33},
  doi          = {10.1007/978-3-642-31909-9\_33},
  timestamp    = {Tue, 23 May 2017 01:12:12 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/Al-HajBA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Al-Shaer11,
  author       = {Ehab Al{-}Shaer},
  editor       = {Sushil Jajodia and
                  Anup K. Ghosh and
                  Vipin Swarup and
                  Cliff Wang and
                  Xiaoyang Sean Wang},
  title        = {Toward Network Configuration Randomization for Moving Target Defense},
  booktitle    = {Moving Target Defense - Creating Asymmetric Uncertainty for Cyber
                  Threats},
  series       = {Advances in Information Security},
  volume       = {54},
  pages        = {153--159},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4614-0977-9\_9},
  doi          = {10.1007/978-1-4614-0977-9\_9},
  timestamp    = {Tue, 16 May 2017 14:24:25 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Al-Shaer11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/safeconfig/2011,
  editor       = {John Banghart and
                  Ehab Al{-}Shaer and
                  Tony Sager and
                  HariGovind V. Ramasamy},
  title        = {4th Symposium on Configuration Analytics and Automation, SafeConfig
                  2011, Arlington, VA, USA, October 31 - November 1, 2011},
  publisher    = {{IEEE}},
  year         = {2011},
  timestamp    = {Wed, 16 Jan 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/safeconfig/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Al-Shaer11,
  author       = {Ehab Al{-}Shaer},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Firewalls},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {474--482},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_911},
  doi          = {10.1007/978-1-4419-5906-5\_911},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Al-Shaer11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijaras/RoychoudhuriA10,
  author       = {Lopamudra Roychoudhuri and
                  Ehab S. Al{-}Shaer},
  title        = {Autonomic QoS Optimization of Real-Time Internet Audio Using Loss
                  Prediction and Stochastic Control},
  journal      = {Int. J. Adapt. Resilient Auton. Syst.},
  volume       = {1},
  number       = {3},
  pages        = {81--107},
  year         = {2010},
  url          = {https://doi.org/10.4018/jaras.2010070105},
  doi          = {10.4018/JARAS.2010070105},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijaras/RoychoudhuriA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipt/AbedinNKAA10,
  author       = {Muhammad Abedin and
                  Syeda Nessa and
                  Latifur Khan and
                  Ehab Al{-}Shaer and
                  Mamoun Awad},
  title        = {Analysis of firewall policy rules using traffic mining techniques},
  journal      = {Int. J. Internet Protoc. Technol.},
  volume       = {5},
  number       = {1/2},
  pages        = {3--22},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJIPT.2010.032611},
  doi          = {10.1504/IJIPT.2010.032611},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipt/AbedinNKAA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SamakA10,
  author       = {Taghrid Samak and
                  Ehab Al{-}Shaer},
  editor       = {Rachel Greenstadt},
  title        = {Synthetic security policy generation via network traffic clustering},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop on Security and Artificial Intelligence,
                  AISec 2010, Chicago, Illinois, USA, October 8, 2010},
  pages        = {45--53},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866423.1866433},
  doi          = {10.1145/1866423.1866433},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SamakA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/ZhangA10,
  author       = {Bin Zhang and
                  Ehab Al{-}Shaer},
  title        = {Towards Automatic Creation of Usable Security Configuration},
  booktitle    = {{INFOCOM} 2010. 29th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  15-19 March 2010, San Diego, CA, {USA}},
  pages        = {341--345},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/INFCOM.2010.5462215},
  doi          = {10.1109/INFCOM.2010.5462215},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/ZhangA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/Al-Shaer10,
  author       = {Ehab Al{-}Shaer},
  editor       = {James B. D. Joshi and
                  Barbara Carminati},
  title        = {Automated management of network access control from design to enforcement},
  booktitle    = {15th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings},
  pages        = {77},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1809842.1809844},
  doi          = {10.1145/1809842.1809844},
  timestamp    = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/Al-Shaer10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/Al-ShaerA10,
  author       = {Ehab Al{-}Shaer and
                  Saeed Al{-}Haj},
  editor       = {Tony Sager and
                  Gail{-}Joon Ahn and
                  Krishna Kant and
                  Heather Richter Lipford},
  title        = {FlowChecker: configuration analysis and verification of federated
                  openflow infrastructures},
  booktitle    = {3rd {ACM} Workshop on Assurable and Usable Security Configuration,
                  SafeConfig 2010, Chicago, IL, USA, October 4, 2010},
  pages        = {37--44},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866898.1866905},
  doi          = {10.1145/1866898.1866905},
  timestamp    = {Thu, 13 Feb 2020 15:16:46 +0100},
  biburl       = {https://dblp.org/rec/conf/safeconfig/Al-ShaerA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2010,
  editor       = {Ehab Al{-}Shaer and
                  Angelos D. Keromytis and
                  Vitaly Shmatikov},
  title        = {Proceedings of the 17th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  publisher    = {{ACM}},
  year         = {2010},
  isbn         = {978-1-4503-0245-6},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2010insider-threats,
  editor       = {Ehab Al{-}Shaer and
                  Brent Lagesse and
                  Craig A. Shue},
  title        = {Proceedings of the 2010 {ACM} workshop on Insider threats, Insider
                  Threats '10, Chicago, Illinois, USA, October 8, 2010},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866886},
  doi          = {10.1145/1866886},
  isbn         = {978-1-4503-0092-6},
  timestamp    = {Thu, 17 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2010insider-threats.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/drm/2010,
  editor       = {Ehab Al{-}Shaer and
                  Hongxia Jin and
                  Marc Joye},
  title        = {Proceedings of the 10th {ACM} Workshop on Digital Rights Management,
                  Chicago, Illinois, USA, October 4, 2010},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {http://dl.acm.org/citation.cfm?id=1866870},
  isbn         = {978-1-4503-0091-9},
  timestamp    = {Wed, 28 Mar 2012 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/drm/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wpes/2010,
  editor       = {Ehab Al{-}Shaer and
                  Keith B. Frikken},
  title        = {Proceedings of the 2010 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2010, Chicago, Illinois, USA, October 4, 2010},
  publisher    = {{ACM}},
  year         = {2010},
  isbn         = {978-1-4503-0096-4},
  timestamp    = {Fri, 04 Feb 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/Al-ShaerGKMNX09,
  author       = {Ehab Al{-}Shaer and
                  Albert G. Greenberg and
                  Charles R. Kalmanek and
                  David A. Maltz and
                  T. S. Eugene Ng and
                  Geoffrey G. Xie},
  title        = {New frontiers in internet network management},
  journal      = {Comput. Commun. Rev.},
  volume       = {39},
  number       = {5},
  pages        = {37--39},
  year         = {2009},
  url          = {https://doi.org/10.1145/1629607.1629615},
  doi          = {10.1145/1629607.1629615},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccr/Al-ShaerGKMNX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/Al-ShaerES09,
  author       = {Ehab Al{-}Shaer and
                  Adel El{-}Atawy and
                  Taghrid Samak},
  title        = {Automated pseudo-live testing of firewall configuration enforcement},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {27},
  number       = {3},
  pages        = {302--314},
  year         = {2009},
  url          = {https://doi.org/10.1109/JSAC.2009.090406},
  doi          = {10.1109/JSAC.2009.090406},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/Al-ShaerES09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ElbadawiA09,
  author       = {Khalid Elbadawi and
                  Ehab Al{-}Shaer},
  editor       = {Wanqing Li and
                  Willy Susilo and
                  Udaya Kiran Tupakula and
                  Reihaneh Safavi{-}Naini and
                  Vijay Varadharajan},
  title        = {TimeVM: a framework for online intrusion mitigation and fast recovery
                  using multi-time-lag traffic replay},
  booktitle    = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2009, Sydney, Australia, March
                  10-12, 2009},
  pages        = {135--145},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1533057.1533077},
  doi          = {10.1145/1533057.1533077},
  timestamp    = {Fri, 18 Mar 2022 11:47:58 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ElbadawiA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/TangA09,
  author       = {Yongning Tang and
                  Ehab Al{-}Shaer},
  title        = {Sharing end-user negative symptoms for improving overlay network dependability},
  booktitle    = {Proceedings of the 2009 {IEEE/IFIP} International Conference on Dependable
                  Systems and Networks, {DSN} 2009, Estoril, Lisbon, Portugal, June
                  29 - July 2, 2009},
  pages        = {275--284},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/DSN.2009.5270328},
  doi          = {10.1109/DSN.2009.5270328},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/TangA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/SmithAE09,
  author       = {Kyle Smith and
                  Ehab Al{-}Shaer and
                  Khalid Elbadawi},
  title        = {Information Theoretic Approach for Characterizing Spam Botnets Based
                  on Traffic Properties},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2009, Dresden, Germany, 14-18 June 2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICC.2009.5199083},
  doi          = {10.1109/ICC.2009.5199083},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/SmithAE09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/Al-ShaerMEE09,
  author       = {Ehab Al{-}Shaer and
                  Wilfredo Marrero and
                  Adel El{-}Atawy and
                  Khalid Elbadawi},
  editor       = {Henning Schulzrinne and
                  K. K. Ramakrishnan and
                  Timothy G. Griffin and
                  Srikanth V. Krishnamurthy},
  title        = {Network Configuration in {A} Box: Towards End-to-End Verification
                  of Network Reachability and Security},
  booktitle    = {Proceedings of the 17th annual {IEEE} International Conference on
                  Network Protocols, 2009. {ICNP} 2009, Princeton, NJ, USA, 13-16 October
                  2009},
  pages        = {123--132},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICNP.2009.5339690},
  doi          = {10.1109/ICNP.2009.5339690},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnp/Al-ShaerMEE09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/im/ZhangA09,
  author       = {Bin Zhang and
                  Ehab Al{-}Shaer},
  title        = {Optimizing correlation structure of event services considering time
                  and capacity constraints},
  booktitle    = {Integrated Network Management, {IM} 2009. 11th {IFIP/IEEE} International
                  Symposium on Integrated Network Management, Hofstra University, Long
                  Island, NY, USA, June 1-5, 2009},
  pages        = {203--210},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/INM.2009.5188811},
  doi          = {10.1109/INM.2009.5188811},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/im/ZhangA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/El-AtawyA09,
  author       = {Adel El{-}Atawy and
                  Ehab Al{-}Shaer},
  title        = {Building Covert Channels over the Packet Reordering Phenomenon},
  booktitle    = {{INFOCOM} 2009. 28th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  19-25 April 2009, Rio de Janeiro, Brazil},
  pages        = {2186--2194},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/INFCOM.2009.5062143},
  doi          = {10.1109/INFCOM.2009.5062143},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/El-AtawyA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/El-AtawyATB09,
  author       = {Adel El{-}Atawy and
                  Ehab Al{-}Shaer and
                  Tung Tran and
                  Raouf Boutaba},
  title        = {Adaptive Early Packet Filtering for Defending Firewalls Against DoS
                  Attacks},
  booktitle    = {{INFOCOM} 2009. 28th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  19-25 April 2009, Rio de Janeiro, Brazil},
  pages        = {2437--2445},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/INFCOM.2009.5062171},
  doi          = {10.1109/INFCOM.2009.5062171},
  timestamp    = {Wed, 28 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/El-AtawyATB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/TangA09,
  author       = {Yongning Tang and
                  Ehab Al{-}Shaer},
  title        = {Overlay Fault Diagnosis Based on Evidential Reasoning},
  booktitle    = {{INFOCOM} 2009. 28th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  19-25 April 2009, Rio de Janeiro, Brazil},
  pages        = {2596--2600},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/INFCOM.2009.5062194},
  doi          = {10.1109/INFCOM.2009.5062194},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/TangA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nas/TangCXA09,
  author       = {Yongning Tang and
                  Guang Cheng and
                  Zhiwei Xu and
                  Ehab Al{-}Shaer},
  title        = {Community-base Fault Diagnosis Using Incremental Belief Revision},
  booktitle    = {International Conference on Networking, Architecture, and Storage,
                  {NAS} 2009, 9-11 July 2009, Zhang Jia Jie, Hunan, China},
  pages        = {121--128},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/NAS.2009.24},
  doi          = {10.1109/NAS.2009.24},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nas/TangCXA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/SamakEA09,
  author       = {Taghrid Samak and
                  Adel El{-}Atawy and
                  Ehab Al{-}Shaer},
  editor       = {Ehab Al{-}Shaer and
                  Mohamed G. Gouda and
                  Jorge Lobo and
                  Sanjai Narain and
                  Felix Wu},
  title        = {Towards network security policy generation for configuration analysis
                  and testing},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Assurable and Usable Security
                  Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009},
  pages        = {45--52},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1655062.1655072},
  doi          = {10.1145/1655062.1655072},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/safeconfig/SamakEA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2009,
  editor       = {Ehab Al{-}Shaer and
                  Somesh Jha and
                  Angelos D. Keromytis},
  title        = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  publisher    = {{ACM}},
  year         = {2009},
  isbn         = {978-1-60558-894-0},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/drm/2009,
  editor       = {Ehab Al{-}Shaer and
                  Hongxia Jin and
                  Gregory L. Heileman},
  title        = {Proceedings of the 9th {ACM} Workshop on Digital Rights Management,
                  Chicago, Illinois, USA, November 9, 2009},
  publisher    = {{ACM}},
  year         = {2009},
  isbn         = {978-1-60558-779-0},
  timestamp    = {Wed, 25 Nov 2009 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/safeconfig/2009,
  editor       = {Ehab Al{-}Shaer and
                  Mohamed G. Gouda and
                  Jorge Lobo and
                  Sanjai Narain and
                  Felix Wu},
  title        = {Proceedings of the 2nd {ACM} Workshop on Assurable and Usable Security
                  Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {http://dl.acm.org/citation.cfm?id=1655062},
  isbn         = {978-1-60558-778-3},
  timestamp    = {Thu, 21 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/safeconfig/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wpes/2009,
  editor       = {Ehab Al{-}Shaer and
                  Stefano Paraboschi},
  title        = {Proceedings of the 2009 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2009, Chicago, Illinois, USA, November 9, 2009},
  publisher    = {{ACM}},
  year         = {2009},
  isbn         = {978-1-60558-783-7},
  timestamp    = {Fri, 04 Feb 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/YanEA08,
  author       = {Yonghe Yan and
                  Adel El{-}Atawy and
                  Ehab Al{-}Shaer},
  title        = {A game-theoretic model for capacity-constrained fair bandwidth allocation},
  journal      = {Int. J. Netw. Manag.},
  volume       = {18},
  number       = {6},
  pages        = {485--504},
  year         = {2008},
  url          = {https://doi.org/10.1002/nem.709},
  doi          = {10.1002/NEM.709},
  timestamp    = {Thu, 21 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnm/YanEA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnsm/Al-ShaerKW08,
  author       = {Ehab Al{-}Shaer and
                  Charles R. Kalmanek and
                  Felix Wu},
  title        = {Automated Security Configuration Management},
  journal      = {J. Netw. Syst. Manag.},
  volume       = {16},
  number       = {3},
  pages        = {231--233},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10922-008-9105-1},
  doi          = {10.1007/S10922-008-9105-1},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnsm/Al-ShaerKW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/TangAB08,
  author       = {Yongning Tang and
                  Ehab Al{-}Shaer and
                  Raouf Boutaba},
  title        = {Efficient fault diagnosis using incremental alarm correlation and
                  active investigation for internet and overlay networks},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {5},
  number       = {1},
  pages        = {36--49},
  year         = {2008},
  url          = {https://doi.org/10.1109/TNSM.2008.080104},
  doi          = {10.1109/TNSM.2008.080104},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnsm/TangAB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/Al-ShaerKA08,
  author       = {Ehab Al{-}Shaer and
                  Latifur Khan and
                  Mohammad Salim Ahmed},
  editor       = {Frederick T. Sheldon and
                  Axel W. Krings and
                  Robert K. Abercrombie and
                  Ali Mili},
  title        = {A comprehensive objective network security metric framework for proactive
                  security configuration},
  booktitle    = {Proceedings of the 4th annual workshop on Cyber security and information
                  intelligence research - developing strategies to meet the cyber security
                  and information intelligence challenges ahead, {CSIIRW} '08, Oak Ridge,
                  Tennessee, USA, May 12-14, 2008},
  pages        = {42:1--42:3},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1413140.1413189},
  doi          = {10.1145/1413140.1413189},
  timestamp    = {Wed, 31 Jan 2024 20:36:02 +0100},
  biburl       = {https://dblp.org/rec/conf/csiirw/Al-ShaerKA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/AhmedAK08,
  author       = {Mohammad Salim Ahmed and
                  Ehab Al{-}Shaer and
                  Latifur Khan},
  title        = {A Novel Quantitative Approach For Measuring Network Security},
  booktitle    = {{INFOCOM} 2008. 27th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  13-18 April 2008, Phoenix, AZ, {USA}},
  pages        = {1957--1965},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/INFOCOM.2008.260},
  doi          = {10.1109/INFOCOM.2008.260},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/AhmedAK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/TangA08,
  author       = {Yongning Tang and
                  Ehab Al{-}Shaer},
  title        = {Towards Collaborative User-Level Overlay Fault Diagnosis},
  booktitle    = {{INFOCOM} 2008. 27th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  13-18 April 2008, Phoenix, AZ, {USA}},
  pages        = {2476--2484},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/INFOCOM.2008.318},
  doi          = {10.1109/INFOCOM.2008.318},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/TangA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/AlsubhiAB08,
  author       = {Khalid Alsubhi and
                  Ehab Al{-}Shaer and
                  Raouf Boutaba},
  editor       = {Marcus Brunner and
                  Carlos Becker Westphall and
                  Lisandro Zambenedetti Granville},
  title        = {Alert prioritization in Intrusion Detection Systems},
  booktitle    = {{IEEE/IFIP} Network Operations and Management Symposium: Pervasive
                  Management for Ubioquitous Networks and Services, {NOMS} 2008, 7-11
                  April 2008, Salvador, Bahia, Brazil},
  pages        = {33--40},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/NOMS.2008.4575114},
  doi          = {10.1109/NOMS.2008.4575114},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/noms/AlsubhiAB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/AhmedATAK08,
  author       = {Mohammad Salim Ahmed and
                  Ehab Al{-}Shaer and
                  Mohamed Mahmoud Taibah and
                  Muhammad Abedin and
                  Latifur Khan},
  editor       = {Marcus Brunner and
                  Carlos Becker Westphall and
                  Lisandro Zambenedetti Granville},
  title        = {Towards autonomic risk-aware security configuration},
  booktitle    = {{IEEE/IFIP} Network Operations and Management Symposium: Pervasive
                  Management for Ubioquitous Networks and Services, {NOMS} 2008, 7-11
                  April 2008, Salvador, Bahia, Brazil},
  pages        = {722--725},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/NOMS.2008.4575198},
  doi          = {10.1109/NOMS.2008.4575198},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/noms/AhmedATAK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/Al-Shaer08,
  author       = {Ehab Al{-}Shaer},
  editor       = {Marcus Brunner and
                  Carlos Becker Westphall and
                  Lisandro Zambenedetti Granville},
  title        = {Designing, optimizing, and evaluating network security configuration},
  booktitle    = {{IEEE/IFIP} Network Operations and Management Symposium: Pervasive
                  Management for Ubioquitous Networks and Services, {NOMS} 2008, 7-11
                  April 2008, Salvador, Bahia, Brazil},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/NOMS.2008.4575105},
  doi          = {10.1109/NOMS.2008.4575105},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/noms/Al-Shaer08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/RoychoudhuriA08,
  author       = {Lopamudra Roychoudhuri and
                  Ehab S. Al{-}Shaer},
  editor       = {Marcus Brunner and
                  Carlos Becker Westphall and
                  Lisandro Zambenedetti Granville},
  title        = {Autonomic QoS optimization of real-time internet audio using loss
                  prediction and stochastic control},
  booktitle    = {{IEEE/IFIP} Network Operations and Management Symposium: Pervasive
                  Management for Ubioquitous Networks and Services, {NOMS} 2008, 7-11
                  April 2008, Salvador, Bahia, Brazil},
  pages        = {73--80},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/NOMS.2008.4575119},
  doi          = {10.1109/NOMS.2008.4575119},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/noms/RoychoudhuriA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/SamakAL08,
  author       = {Taghrid Samak and
                  Ehab Al{-}Shaer and
                  Hong Li},
  title        = {QoS Policy Modeling and Conflict Analysis},
  booktitle    = {9th {IEEE} International Workshop on Policies for Distributed Systems
                  and Networks {(POLICY} 2008), 2-4 June 2008, Palisades, New York,
                  {USA}},
  pages        = {19--26},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/POLICY.2008.40},
  doi          = {10.1109/POLICY.2008.40},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/policy/SamakAL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/LeBA08,
  author       = {Anh Le and
                  Raouf Boutaba and
                  Ehab Al{-}Shaer},
  editor       = {Albert Levi and
                  Peng Liu and
                  Refik Molva},
  title        = {Correlation-based load balancing for network intrusion detection and
                  prevention systems},
  booktitle    = {4th International {ICST} Conference on Security and Privacy in Communication
                  Networks, {SECURECOMM} 2008, Istanbul, Turkey, September 22-25, 2008},
  pages        = {2},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1460877.1460880},
  doi          = {10.1145/1460877.1460880},
  timestamp    = {Tue, 06 Nov 2018 16:58:12 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/LeBA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsom/ZhangA07,
  author       = {Bin Zhang and
                  Ehab Al{-}Shaer},
  editor       = {Alexander Clemm and
                  Lisandro Zambenedetti Granville and
                  Rolf Stadler},
  title        = {Self-organizing Monitoring Agents for Hierarchical Event Correlation},
  booktitle    = {Managing Virtualization of Networks and Services, 18th {IFIP/IEEE}
                  International Workshop on Distributed Systems: Operations and Management,
                  {DSOM} 2007, San Jos{\'{e}}, CA, USA, October 29-31, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4785},
  pages        = {13--24},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75694-1\_2},
  doi          = {10.1007/978-3-540-75694-1\_2},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/dsom/ZhangA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/e2emon/SamakEAI07,
  author       = {Taghrid Samak and
                  Adel El{-}Atawy and
                  Ehab Al{-}Shaer and
                  Mohamed A. Ismail},
  editor       = {Kamil Sara{\c{c}} and
                  Timur Friedman},
  title        = {A Novel Visualization Approach for Efficient Network-wide Traffic
                  Monitoring},
  booktitle    = {Fifth {IEEE/IFIP} Workshop on End-to-End Monitoring Techniques and
                  Services, {E2EMON} 2007, 21st May, 2007, Munich, Germany},
  pages        = {1--7},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/E2EMON.2007.375319},
  doi          = {10.1109/E2EMON.2007.375319},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/e2emon/SamakEAI07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/SamakEA07,
  author       = {Taghrid Samak and
                  Adel El{-}Atawy and
                  Ehab Al{-}Shaer},
  title        = {FireCracker: {A} Framework for Inferring Firewall Policies using Smart
                  Probing},
  booktitle    = {Proceedings of the {IEEE} International Conference on Network Protocols,
                  {ICNP} 2007, October 16-19, 2007, Beijing, China},
  pages        = {294--303},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICNP.2007.4375860},
  doi          = {10.1109/ICNP.2007.4375860},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnp/SamakEA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/im/TangAZ07,
  author       = {Yongning Tang and
                  Ehab Al{-}Shaer and
                  Bin Zhang},
  title        = {Toward Globally Optimal Event Monitoring {\&} Aggregation For
                  Large-scale Overlay Networks},
  booktitle    = {Integrated Network Management, {IM} 2007. 10th {IFIP/IEEE} International
                  Symposium on Integrated Network Management, Munich, Germany, 21-25
                  May 2007},
  pages        = {236--245},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/INM.2007.374788},
  doi          = {10.1109/INM.2007.374788},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/im/TangAZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/El-AtawySAL07,
  author       = {Adel El{-}Atawy and
                  Taghrid Samak and
                  Ehab Al{-}Shaer and
                  Hong Li},
  title        = {Using Online Traffic Statistical Matching for Optimizing Packet Filtering
                  Performance},
  booktitle    = {{INFOCOM} 2007. 26th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  6-12 May 2007, Anchorage, Alaska, {USA}},
  pages        = {866--874},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/INFCOM.2007.106},
  doi          = {10.1109/INFCOM.2007.106},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/El-AtawySAL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/YanEA07,
  author       = {Yonghe Yan and
                  Adel El{-}Atawy and
                  Ehab Al{-}Shaer},
  title        = {Ranking-Based Optimal Resource Allocation in Peer-to-Peer Networks},
  booktitle    = {{INFOCOM} 2007. 26th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  6-12 May 2007, Anchorage, Alaska, {USA}},
  pages        = {1100--1108},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/INFCOM.2007.132},
  doi          = {10.1109/INFCOM.2007.132},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/YanEA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lisa/TranAB07,
  author       = {Tung Tran and
                  Ehab S. Al{-}Shaer and
                  Raouf Boutaba},
  editor       = {Paul Anderson},
  title        = {PolicyVis: Firewall Security Policy Visualization and Inspection},
  booktitle    = {Proceedings of the 21th Large Installation System Administration Conference,
                  {LISA} 2007, Dallas, Texas, USA, November 11-16, 2007},
  pages        = {1--16},
  publisher    = {{USENIX}},
  year         = {2007},
  url          = {http://www.usenix.org/events/lisa07/tech/tran.html},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lisa/TranAB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/El-AtawySWALPL07,
  author       = {Adel El{-}Atawy and
                  Taghrid Samak and
                  Zein Wali and
                  Ehab Al{-}Shaer and
                  Frank Lin and
                  Christopher Pham and
                  Sheng Li},
  title        = {An Automated Framework for Validating Firewall Policy Enforcement},
  booktitle    = {8th {IEEE} International Workshop on Policies for Distributed Systems
                  and Networks {(POLICY} 2007), 13-15 June 2007, Bologna, Italy},
  pages        = {151--160},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/POLICY.2007.5},
  doi          = {10.1109/POLICY.2007.5},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/policy/El-AtawySWALPL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/ZhangAJRP07,
  author       = {Bin Zhang and
                  Ehab Al{-}Shaer and
                  Radha Jagadeesan and
                  James Riely and
                  Corin Pitcher},
  editor       = {Volkmar Lotz and
                  Bhavani Thuraisingham},
  title        = {Specifications of a high-level conflict-free firewall policy language
                  for multi-domain networks},
  booktitle    = {12th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings},
  pages        = {185--194},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1266840.1266871},
  doi          = {10.1145/1266840.1266871},
  timestamp    = {Wed, 29 Jun 2022 15:37:42 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/ZhangAJRP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/HamedA06,
  author       = {Hazem Hamed and
                  Ehab Al{-}Shaer},
  title        = {Taxonomy of conflicts in network security policies},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {44},
  number       = {3},
  pages        = {134--141},
  year         = {2006},
  url          = {https://doi.org/10.1109/MCOM.2006.1607877},
  doi          = {10.1109/MCOM.2006.1607877},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/HamedA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/BoutabaAA06,
  author       = {Raouf Boutaba and
                  Ehab Al{-}Shaer and
                  Kevin C. Almeroth},
  title        = {Special issue: monitoring and measurements of {IP} networks},
  journal      = {Comput. Commun.},
  volume       = {29},
  number       = {10},
  pages        = {1561--1563},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.comcom.2005.07.007},
  doi          = {10.1016/J.COMCOM.2005.07.007},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/BoutabaAA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/RoychoudhuriAB06,
  author       = {Lopamudra Roychoudhuri and
                  Ehab S. Al{-}Shaer and
                  Gregory B. Brewster},
  title        = {On the impact of loss and delay variation on Internet packet audio
                  transmission},
  journal      = {Comput. Commun.},
  volume       = {29},
  number       = {10},
  pages        = {1578--1589},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.comcom.2006.04.004},
  doi          = {10.1016/J.COMCOM.2006.04.004},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/RoychoudhuriAB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jhsn/HamedA06,
  author       = {Hazem H. Hamed and
                  Ehab Al{-}Shaer},
  title        = {On autonomic optimization of firewall policy organization},
  journal      = {J. High Speed Networks},
  volume       = {15},
  number       = {3},
  pages        = {209--227},
  year         = {2006},
  url          = {http://content.iospress.com/articles/journal-of-high-speed-networks/jhs287},
  timestamp    = {Mon, 18 May 2015 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jhsn/HamedA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/HamedEA06,
  author       = {Hazem H. Hamed and
                  Adel El{-}Atawy and
                  Ehab Al{-}Shaer},
  title        = {On Dynamic Optimization of Packet Matching in High-Speed Firewalls},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {24},
  number       = {10},
  pages        = {1817--1830},
  year         = {2006},
  url          = {https://doi.org/10.1109/JSAC.2006.877140},
  doi          = {10.1109/JSAC.2006.877140},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/HamedEA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AbedinNAK06,
  author       = {Muhammad Abedin and
                  Syeda Nessa and
                  Ehab Al{-}Shaer and
                  Latifur Khan},
  editor       = {G{\"{u}}nter Karjoth and
                  Fabio Massacci},
  title        = {Vulnerability analysis For evaluating quality of protection of security
                  policies},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Quality of Protection, QoP
                  2006, Alexandria, VA, USA, October 30, 2006},
  pages        = {49--52},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1179494.1179505},
  doi          = {10.1145/1179494.1179505},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AbedinNAK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HamedA06,
  author       = {Hazem H. Hamed and
                  Ehab Al{-}Shaer},
  editor       = {Ferng{-}Ching Lin and
                  Der{-}Tsai Lee and
                  Bao{-}Shuh Paul Lin and
                  Shiuhpyng Shieh and
                  Sushil Jajodia},
  title        = {Dynamic rule-ordering optimization for high-speed firewall filtering},
  booktitle    = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24,
                  2006},
  pages        = {332--342},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1128817.1128867},
  doi          = {10.1145/1128817.1128867},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HamedA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/HamedEA06,
  author       = {Hazem H. Hamed and
                  Adel El{-}Atawy and
                  Ehab Al{-}Shaer},
  title        = {Adaptive Statistical Optimization Techniques for Firewall Packet Filtering},
  booktitle    = {{INFOCOM} 2006. 25th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  23-29 April 2006, Barcelona, Catalunya, Spain},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/INFOCOM.2006.129},
  doi          = {10.1109/INFOCOM.2006.129},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/HamedEA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/MasudKA06,
  author       = {Mohammad M. Masud and
                  Latifur Khan and
                  Ehab Al{-}Shaer},
  editor       = {Sharad Mehrotra and
                  Daniel Dajun Zeng and
                  Hsinchun Chen and
                  Bhavani Thuraisingham and
                  Fei{-}Yue Wang},
  title        = {Email Worm Detection Using Na{\"{\i}}ve Bayes and Support Vector
                  Machine},
  booktitle    = {Intelligence and Security Informatics, {IEEE} International Conference
                  on Intelligence and Security Informatics, {ISI} 2006, San Diego, CA,
                  USA, May 23-24, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3975},
  pages        = {733--734},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11760146\_110},
  doi          = {10.1007/11760146\_110},
  timestamp    = {Fri, 17 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isi/MasudKA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/YanEA06,
  author       = {Yonghe Yan and
                  Adel El{-}Atawy and
                  Ehab Al{-}Shaer},
  editor       = {Joseph L. Hellerstein and
                  Burkhard Stiller},
  title        = {Fair Bandwidth Allocation under User Capacity Constraints},
  booktitle    = {Management of Integrated End-to-End Communications and Services, 10th
                  {IEEE/IFIP} Network Operations and Management Symposium, {NOMS} 2006,
                  Vancouver, Canada, April 3-7, 2006. Proceedings},
  pages        = {138--149},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/NOMS.2006.1687546},
  doi          = {10.1109/NOMS.2006.1687546},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/noms/YanEA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/GolnabiMKA06,
  author       = {Korosh Golnabi and
                  Richard K. Min and
                  Latifur Khan and
                  Ehab Al{-}Shaer},
  editor       = {Joseph L. Hellerstein and
                  Burkhard Stiller},
  title        = {Analysis of Firewall Policy Rules Using Data Mining Techniques},
  booktitle    = {Management of Integrated End-to-End Communications and Services, 10th
                  {IEEE/IFIP} Network Operations and Management Symposium, {NOMS} 2006,
                  Vancouver, Canada, April 3-7, 2006. Proceedings},
  pages        = {305--315},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/NOMS.2006.1687561},
  doi          = {10.1109/NOMS.2006.1687561},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/noms/GolnabiMKA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/TaibahAB06,
  author       = {Mohamed Mahmoud Taibah and
                  Ehab Al{-}Shaer and
                  Raouf Boutaba},
  title        = {An Architecture for an Email Worm Prevention System},
  booktitle    = {Second International Conference on Security and Privacy in Communication
                  Networks and the Workshops, SecureComm 2006, Baltimore, MD, USA, August
                  2, 2006 - September 1, 2006},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/SECCOMW.2006.359559},
  doi          = {10.1109/SECCOMW.2006.359559},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/TaibahAB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/e2emon/2006,
  editor       = {Ehab Al{-}Shaer and
                  Aiko Pras and
                  Nevil Brownlee},
  title        = {Fourth {IEEE/IFIP} Workshop on End-to-End Monitoring Techniques and
                  Services, E2EMON'06, 3rd April, 2006, Vancouver, BC, Canada},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/10987/proceeding},
  isbn         = {1-4244-0145-3},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/e2emon/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ifip6/2006,
  editor       = {Dominique Ga{\"{\i}}ti and
                  Guy Pujolle and
                  Ehab S. Al{-}Shaer and
                  Kenneth L. Calvert and
                  Simon A. Dobson and
                  Guy Leduc and
                  Olli Martikainen},
  title        = {Autonomic Networking, First International {IFIP} {TC6} Conference,
                  {AN} 2006, Paris, France, September 27-29, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4195},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11880905},
  doi          = {10.1007/11880905},
  isbn         = {3-540-45891-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip6/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/Al-ShaerHBH05,
  author       = {Ehab Al{-}Shaer and
                  Hazem H. Hamed and
                  Raouf Boutaba and
                  Masum Hasan},
  title        = {Conflict classification and analysis of distributed firewall policies},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {23},
  number       = {10},
  pages        = {2069--2084},
  year         = {2005},
  url          = {https://doi.org/10.1109/JSAC.2005.854119},
  doi          = {10.1109/JSAC.2005.854119},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/Al-ShaerHBH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/RoychoudhuriA05,
  author       = {Lopamudra Roychoudhuri and
                  Ehab S. Al{-}Shaer},
  title        = {Real-time packet loss prediction based on end-to-end delay variation},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {2},
  number       = {1},
  pages        = {29--38},
  year         = {2005},
  url          = {https://doi.org/10.1109/TNSM.2005.4798299},
  doi          = {10.1109/TNSM.2005.4798299},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnsm/RoychoudhuriA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/HamedAM05,
  author       = {Hazem H. Hamed and
                  Ehab S. Al{-}Shaer and
                  Will Marrero},
  title        = {Modeling and Verification of IPSec and {VPN} Security Policies},
  booktitle    = {13th {IEEE} International Conference on Network Protocols {(ICNP}
                  2005), 6-9 November 2005, Boston, MA, {USA}},
  pages        = {259--278},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICNP.2005.25},
  doi          = {10.1109/ICNP.2005.25},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnp/HamedAM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/im/TangAB05,
  author       = {Yongning Tang and
                  Ehab S. Al{-}Shaer and
                  Raouf Boutaba},
  title        = {Active integrated fault localization in communication networks},
  booktitle    = {Integrated Network Management, {IM} 2005. 9th {IFIP/IEEE} International
                  Symposium on Integrated Network Management, 15-19 May 2005, Nice,
                  France},
  pages        = {543--556},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/INM.2005.1440826},
  doi          = {10.1109/INM.2005.1440826},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/im/TangAB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmns/RoychoudhuriA05,
  author       = {Lopamudra Roychoudhuri and
                  Ehab S. Al{-}Shaer},
  editor       = {Jordi Dalmau Royo and
                  Go Hasegawa},
  title        = {Real-Time Audio Quality Evaluation for Adaptive Multimedia Protocols},
  booktitle    = {Management of Multimedia Networks and Services, 8th International
                  Conference on Management of Multimedia Networks and Services, {MMNS}
                  2005, Barcelona, Spain, October 24-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3754},
  pages        = {133--144},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11572831\_12},
  doi          = {10.1007/11572831\_12},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/mmns/RoychoudhuriA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/e2emon/2005,
  editor       = {Ehab Al{-}Shaer and
                  Aiko Pras and
                  Philippe Owezarski},
  title        = {Third {IEEE/IFIP} Workshop on End-to-End Monitoring Techniques and
                  Services, {E2EMON} 2005, 15th May 2005, Nice, France},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/10461/proceeding},
  isbn         = {0-7803-9249-3},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/e2emon/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/Al-ShaerH04,
  author       = {Ehab S. Al{-}Shaer and
                  Hazem H. Hamed},
  title        = {Modeling and Management of Firewall Policies},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {1},
  number       = {1},
  pages        = {2--10},
  year         = {2004},
  url          = {https://doi.org/10.1109/TNSM.2004.4623689},
  doi          = {10.1109/TNSM.2004.4623689},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnsm/Al-ShaerH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsom/Al-ShaerZ04,
  author       = {Ehab S. Al{-}Shaer and
                  Bin Zhang},
  editor       = {Akhil Sahai and
                  Felix Wu},
  title        = {HiFi+: {A} Monitoring Virtual Machine for Autonomic Distributed Management},
  booktitle    = {Utility Computing: 15th {IFIP/IEEE} International Workshop on Distributed
                  Systems: Operations and Management, {DSOM} 2004, Davis, CA, USA, November
                  15-17, 2004.Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3278},
  pages        = {28--39},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30184-4\_3},
  doi          = {10.1007/978-3-540-30184-4\_3},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/dsom/Al-ShaerZ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/RoychoudhuriA04,
  author       = {Lopamudra Roychoudhuri and
                  Ehab S. Al{-}Shaer},
  title        = {Adaptive rate control for real-time packet audio based on loss prediction},
  booktitle    = {Proceedings of the Global Telecommunications Conference, 2004. {GLOBECOM}
                  '04, Dallas, Texas, USA, 29 November - 3 December 2004},
  pages        = {634--638},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/GLOCOM.2004.1378039},
  doi          = {10.1109/GLOCOM.2004.1378039},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/RoychoudhuriA04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/Al-ShaerH04,
  author       = {Ehab S. Al{-}Shaer and
                  Hazem H. Hamed},
  title        = {Discovery of Policy Anomalies in Distributed Firewalls},
  booktitle    = {Proceedings {IEEE} {INFOCOM} 2004, The 23rd Annual Joint Conference
                  of the {IEEE} Computer and Communications Societies, Hong Kong, China,
                  March 7-11, 2004},
  pages        = {2605--2616},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/INFCOM.2004.1354680},
  doi          = {10.1109/INFCOM.2004.1354680},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/Al-ShaerH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmns/RoychoudhuriA04,
  author       = {Lopamudra Roychoudhuri and
                  Ehab S. Al{-}Shaer},
  editor       = {John B. Vicente and
                  David Hutchison},
  title        = {Real-time Analysis of Delay Variation for Packet Loss Prediction},
  booktitle    = {Management of Multimedia Networks and Services: 7th {IFIP/IEEE} International
                  Conference, {MMNS} 2004, San Diego, CA, USA, October 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3271},
  pages        = {213--227},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30189-9\_18},
  doi          = {10.1007/978-3-540-30189-9\_18},
  timestamp    = {Thu, 22 Sep 2022 08:31:33 +0200},
  biburl       = {https://dblp.org/rec/conf/mmns/RoychoudhuriA04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/Al-ShaerT04,
  author       = {Ehab Al{-}Shaer and
                  Yongning Tang},
  title        = {{MRMON:} remote multicast monitoring},
  booktitle    = {Managing Next Generation Convergence Networks and Services, {IEEE/IFIP}
                  Network Operations and Management Symposium, {NOMS} 2004, Seoul, Korea,
                  19-23 April 2004, Proceedings},
  pages        = {585--598},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/NOMS.2004.1317746},
  doi          = {10.1109/NOMS.2004.1317746},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/noms/Al-ShaerT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/Al-Shaer04,
  author       = {Ehab Al{-}Shaer},
  title        = {Managing firewall and network-edge security policies},
  booktitle    = {Managing Next Generation Convergence Networks and Services, {IEEE/IFIP}
                  Network Operations and Management Symposium, {NOMS} 2004, Seoul, Korea,
                  19-23 April 2004, Proceedings},
  pages        = {926},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/NOMS.2004.1317810},
  doi          = {10.1109/NOMS.2004.1317810},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/noms/Al-Shaer04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/Al-ShaerH03,
  author       = {Ehab S. Al{-}Shaer and
                  Hazem H. Hamed},
  title        = {Management and translation of filtering security policies},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2003, Anchorage, Alaska, USA, 11-15 May, 2003},
  pages        = {256--260},
  publisher    = {{IEEE}},
  year         = {2003},
  url          = {https://doi.org/10.1109/ICC.2003.1204180},
  doi          = {10.1109/ICC.2003.1204180},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/Al-ShaerH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/RoychoudhuriAHB03,
  author       = {Lopamudra Roychoudhuri and
                  Ehab Al{-}Shaer and
                  Hazem Hamed and
                  Gregory B. Brewster},
  title        = {Audio transmission over the Internet: experiments and observations},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2003, Anchorage, Alaska, USA, 11-15 May, 2003},
  pages        = {552--556},
  publisher    = {{IEEE}},
  year         = {2003},
  url          = {https://doi.org/10.1109/ICC.2003.1204237},
  doi          = {10.1109/ICC.2003.1204237},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/RoychoudhuriAHB03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/im/Al-ShaerH03,
  author       = {Ehab S. Al{-}Shaer and
                  Hazem H. Hamed},
  editor       = {Germ{\'{a}}n S. Goldszmidt and
                  J{\"{u}}rgen Sch{\"{o}}nw{\"{a}}lder},
  title        = {Firewall Policy Advisor for Anomaly Discovery and Rule Editing},
  booktitle    = {Integrated Network Management VII, Managing It All, {IFIP/IEEE} Eighth
                  International Symposium on Integrated Network Management {(IM} 2003),
                  March 24-28, 2003, Colorado Springs, {USA}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {246},
  pages        = {17--30},
  publisher    = {Kluwer},
  year         = {2003},
  timestamp    = {Mon, 24 Mar 2003 13:34:13 +0100},
  biburl       = {https://dblp.org/rec/conf/im/Al-ShaerH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmns/YounisMA03,
  author       = {Mohamed F. Younis and
                  Poonam Munshi and
                  Ehab S. Al{-}Shaer},
  editor       = {Alan Marshall and
                  Nazim Agoulmine},
  title        = {Architecture for Efficient Monitoring and Management of Sensor Networks},
  booktitle    = {Management of Multimedia Networks and Services, 6th {IFIP/IEEE} International
                  Conference, {MMNS} 2003, Belfast, Northern Ireland, UK, September
                  7-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2839},
  pages        = {488--502},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39404-4\_37},
  doi          = {10.1007/978-3-540-39404-4\_37},
  timestamp    = {Fri, 08 Nov 2019 13:02:40 +0100},
  biburl       = {https://dblp.org/rec/conf/mmns/YounisMA03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnsm/Al-ShaerT02,
  author       = {Ehab S. Al{-}Shaer and
                  Yongning Tang},
  title        = {QoS Path Monitoring for Multicast Networks},
  journal      = {J. Netw. Syst. Manag.},
  volume       = {10},
  number       = {3},
  pages        = {357--381},
  year         = {2002},
  url          = {https://doi.org/10.1023/A:1019814627444},
  doi          = {10.1023/A:1019814627444},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnsm/Al-ShaerT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/Al-ShaerT02,
  author       = {Ehab Al{-}Shaer and
                  Yongning Tang},
  editor       = {Rolf Stadler and
                  Mehmet Ulema},
  title        = {{SMRM:} SNMP-based multicast reachability monitoring},
  booktitle    = {Management Solutions for the New Communications World, 8th {IEEE/IFIP}
                  Network Operations and Management Symposium, {NOMS} 2002, Florence,
                  Italy, April 15-19, 2002. Proceedings},
  pages        = {467--482},
  publisher    = {{IEEE}},
  year         = {2002},
  url          = {https://doi.org/10.1109/NOMS.2002.1015602},
  doi          = {10.1109/NOMS.2002.1015602},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/noms/Al-ShaerT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/Al-ShaerT01,
  author       = {Ehab S. Al{-}Shaer and
                  Yongning Tang},
  title        = {Toward integrating {IP} multicasting in internet network management
                  protocols},
  journal      = {Comput. Commun.},
  volume       = {24},
  number       = {5-6},
  pages        = {473--485},
  year         = {2001},
  url          = {https://doi.org/10.1016/S0140-3664(00)00296-6},
  doi          = {10.1016/S0140-3664(00)00296-6},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/Al-ShaerT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/im/Al-Shaer01,
  author       = {Ehab Al{-}Shaer},
  editor       = {George Pavlou and
                  Nikos Anerousis and
                  Antonio Liotta},
  title        = {A Dynamic Group Management Framework for Large-scale Distributed Event
                  Monitoring},
  booktitle    = {2001 {IEEE/IFIP} International Symposium on Integrated Network Management,
                  {IM} 2001, Seattle, USA, May 14-18, 2001. Proceedings},
  pages        = {361--374},
  publisher    = {{IEEE}},
  year         = {2001},
  url          = {https://doi.org/10.1109/INM.2001.918053},
  doi          = {10.1109/INM.2001.918053},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/im/Al-Shaer01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mmns/2001,
  editor       = {Ehab S. Al{-}Shaer and
                  Giovanni Pacifici},
  title        = {Management of Multimedia on the Internet, 4th {IFIP/IEEE} International
                  Conference on Management of Multimedia Networks and Services, {MMNS}
                  2001, Chicago, IL, {USA} October 29 - November 1, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2216},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45508-6},
  doi          = {10.1007/3-540-45508-6},
  isbn         = {3-540-42786-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmns/2001.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/Al-ShaerFA00,
  author       = {Ehab S. Al{-}Shaer and
                  Mohamed Fayad and
                  Hussein M. Abdel{-}Wahab},
  title        = {Adaptive object-oriented filtering framework for event management
                  applications},
  journal      = {{ACM} Comput. Surv.},
  volume       = {32},
  number       = {1es},
  pages        = {37},
  year         = {2000},
  url          = {https://doi.org/10.1145/351936.351974},
  doi          = {10.1145/351936.351974},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/Al-ShaerFA00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnsm/Al-Shaer00,
  author       = {Ehab S. Al{-}Shaer},
  title        = {Active Management Framework for Distributed Multimedia Systems},
  journal      = {J. Netw. Syst. Manag.},
  volume       = {8},
  number       = {1},
  pages        = {49--72},
  year         = {2000},
  url          = {https://doi.org/10.1023/A:1009415025046},
  doi          = {10.1023/A:1009415025046},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnsm/Al-Shaer00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmns/Al-ShaerT00,
  author       = {Ehab S. Al{-}Shaer and
                  Yongning Tang},
  editor       = {Jos{\'{e}} Neuman de Souza and
                  Raouf Boutaba},
  title        = {Integrating {IP} Multicasting in Standard Network Management Protocols},
  booktitle    = {Managing QoS in Multimedia Networks and Services, {IEEE/IFIP} {TC6}
                  - {WG6.4} {\&} {WG6.6} Third International Conference on Management
                  of Multimedia Networks and Services (MMNS'2000), September 25-28,
                  2000, Fortaleza, Cear{\'{a}}, Brazil},
  series       = {{IFIP} Conference Proceedings},
  volume       = {182},
  pages        = {239--251},
  publisher    = {Kluwer},
  year         = {2000},
  timestamp    = {Wed, 13 Feb 2002 08:45:50 +0100},
  biburl       = {https://dblp.org/rec/conf/mmns/Al-ShaerT00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nis/Al-Shaer99,
  author       = {Ehab S. Al{-}Shaer},
  title        = {Dynamic Monitoring Approach for Multi-poin Multimedia Systems},
  journal      = {Netw. Inf. Syst. J.},
  volume       = {2},
  number       = {1},
  pages        = {75--88},
  year         = {1999},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nis/Al-Shaer99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsom/Al-Shaer99,
  author       = {Ehab S. Al{-}Shaer},
  editor       = {Rolf Stadler and
                  Burkhard Stiller},
  title        = {Programmable Agents for Active Distributed Monitoring},
  booktitle    = {Active Technologies for Network and Service Management, 10th {IFIP/IEEE}
                  International Workshop on Distributed Systems: Operations and Management,
                  {DSOM} '99, Zurich, Switzerland, October 11-13, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1700},
  pages        = {19--32},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48100-1\_2},
  doi          = {10.1007/3-540-48100-1\_2},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/dsom/Al-Shaer99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/Al-ShaerAM99,
  author       = {Ehab S. Al{-}Shaer and
                  Hussein M. Abdel{-}Wahab and
                  Kurt Maly},
  title        = {HiFi: {A} New Monitoring Architecture for Distributed Systems Management},
  booktitle    = {Proceedings of the 19th International Conference on Distributed Computing
                  Systems, Austin, TX, USA, May 31 - June 4, 1999},
  pages        = {171--178},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/ICDCS.1999.776518},
  doi          = {10.1109/ICDCS.1999.776518},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/Al-ShaerAM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/MalyAOWGYSA97,
  author       = {Kurt Maly and
                  Hussein M. Abdel{-}Wahab and
                  C. Michael Overstreet and
                  J. Christian Wild and
                  Ajay K. Gupta and
                  Alaa Youssef and
                  Emilia Stoica and
                  Ehab S. Al{-}Shaer},
  title        = {Interactive Distance Learning over Intranets},
  journal      = {{IEEE} Internet Comput.},
  volume       = {1},
  number       = {1},
  pages        = {60--71},
  year         = {1997},
  url          = {https://doi.org/10.1109/4236.585174},
  doi          = {10.1109/4236.585174},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/internet/MalyAOWGYSA97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/Al-Shaer97,
  author       = {Ehab S. Al{-}Shaer},
  title        = {Event Filtering Framework: Key Criteria and Design Trade-offs},
  booktitle    = {21st International Computer Software and Applications Conference {(COMPSAC}
                  '97), 11-15 August 1997, Washington, DC, {USA}},
  pages        = {88--93},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/CMPSAC.1997.624763},
  doi          = {10.1109/CMPSAC.1997.624763},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/Al-Shaer97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/Al-ShaerAM97,
  author       = {Ehab S. Al{-}Shaer and
                  Hussein M. Abdel{-}Wahab and
                  Kurt Maly},
  title        = {Application-Layer Group Communication Server for Extending Reliable
                  Multicast Protocols Services},
  booktitle    = {1997 International Conference on Network Protocols {(ICNP} '97), 28-31
                  October 1997, Atlanta, GA, {USA}},
  pages        = {267},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/ICNP.1997.643728},
  doi          = {10.1109/ICNP.1997.643728},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnp/Al-ShaerAM97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmns/Al-ShaerAM97,
  author       = {Ehab S. Al{-}Shaer and
                  Hussein M. Abdel{-}Wahab and
                  Kurt Maly},
  editor       = {Raouf Boutaba and
                  Abdelhakim Hafid},
  title        = {A scalable monitoring architecture for managing distributed multimedia
                  systems},
  booktitle    = {Management of Multimedia Networks and Services, {IEEE/IFIP} {TC6/WG6.4/WG6.6}
                  International Conference on Management of Multimedia Networks and
                  Services, 8-10 July 1997, Montreal, Canada},
  series       = {{IFIP} Conference Proceedings},
  volume       = {112},
  pages        = {237--248},
  publisher    = {Chapman {\&} Hall},
  year         = {1997},
  timestamp    = {Thu, 23 Jun 2016 15:53:29 +0200},
  biburl       = {https://dblp.org/rec/conf/mmns/Al-ShaerAM97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wetice/Al-ShaerYAMO97,
  author       = {Ehab S. Al{-}Shaer and
                  Alaa Youssef and
                  Hussein M. Abdel{-}Wahab and
                  Kurt Maly and
                  C. Michael Overstreet},
  title        = {Reliability, Scalability and Robustness Issues in IRI*},
  booktitle    = {6th Workshop on Enabling Technologies {(WET-ICE} '97), Infrastructure
                  for Collaborative Enterprises, 18-20 June 1997, MIT, Cambridge, MA,
                  USA, Proceedings},
  pages        = {320--326},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/ENABL.1997.630834},
  doi          = {10.1109/ENABL.1997.630834},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wetice/Al-ShaerYAMO97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics