


Остановите войну!
for scientists:
Ehab Al-Shaer
Ehab S. Al-Shaer
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [i8]Ehsan Aghaei, Xi Niu, Waseem G. Shadid, Ehab Al-Shaer:
Language Model for Text Analytic in Cybersecurity. CoRR abs/2204.02685 (2022) - 2021
- [j46]Mohammad Ashiqur Rahman, Amarjit Datta, Ehab Al-Shaer:
Automated Configuration Synthesis for Resilient Smart Metering Infrastructure. EAI Endorsed Trans. Security Safety 8(28): e4 (2021) - [c161]Md Sajidul Islam Sajid, Jinpeng Wei, Basel Abdeen, Ehab Al-Shaer, Md. Mazharul Islam, Walter Diong, Latifur Khan:
SODA: A System for Cyber Deception Orchestration and Automation. ACSAC 2021: 675-689 - [c160]Md. Mazharul Islam, Ashutosh Dutta, Md Sajidul Islam Sajid, Ehab Al-Shaer, Jinpeng Wei, Sadegh Farhang:
CHIMERA: Autonomous Planning and Orchestration for Malware Deception. CNS 2021: 173-181 - [c159]Siddhartha Shankar Das, Edoardo Serra
, Mahantesh Halappanavar, Alex Pothen, Ehab Al-Shaer:
V2W-BERT: A Framework for Effective Hierarchical Multiclass Classification of Software Vulnerabilities. DSAA 2021: 1-12 - [i7]Siddhartha Shankar Das, Edoardo Serra, Mahantesh Halappanavar, Alex Pothen, Ehab Al-Shaer:
V2W-BERT: A Framework for Effective Hierarchical Multiclass Classification of Software Vulnerabilities. CoRR abs/2102.11498 (2021) - [i6]Ashutosh Dutta, Ehab Al-Shaer, Samrat Chatterjee:
Constraints Satisfiability Driven Reinforcement Learning for Autonomous Cyber Defense. CoRR abs/2104.08994 (2021) - 2020
- [j45]Mohammad Ashiqur Rahman, Md. Golam Moula Mehedi Hasan, Mohammad Hossein Manshaei, Ehab Al-Shaer:
A game-theoretic analysis to defend against remote operating system fingerprinting. J. Inf. Secur. Appl. 52: 102456 (2020) - [c158]Qi Duan, Ehab Al-Shaer, Jiang Xie:
Range and Topology Mutation Based Wireless Agility. MTD@CCS 2020: 59-67 - [c157]Md Sajidul Islam Sajid, Jinpeng Wei, Md Rabbi Alam, Ehsan Aghaei, Ehab Al-Shaer:
DodgeTron: Towards Autonomous Cyber Deception Using Dynamic Hybrid Analysis of Malware. CNS 2020: 1-9 - [c156]Muhammad Abdul Basit Ur Rahim, Qi Duan, Ehab Al-Shaer:
A Formal Analysis of Moving Target Defense. COMPSAC 2020: 1802-1807 - [c155]Amirreza Niakanlahiji, Jafar Haadi Jafarian, Bei-Tseng Chu, Ehab Al-Shaer:
HoneyBug: Personalized Cyber Deception for Web Applications. HICSS 2020: 1-10 - [c154]Moumita Das Purba, Bill Chu, Ehab Al-Shaer:
From Word Embedding to Cyber-Phrase Embedding: Comparison of Processing Cybersecurity Texts. ISI 2020: 1-6 - [c153]Adam Dalton, Ehsan Aghaei, Ehab Al-Shaer, Archna Bhatia, Esteban Castillo, Zhuo Cheng, Sreekar Dhaduvai, Qi Duan, Bryanna Hebenstreit, Md. Mazharul Islam, Younes Karimi, Amir Masoumzadeh, Brodie Mather, Sashank Santhanam, Samira Shaikh, Alan Zemel, Tomek Strzalkowski, Bonnie J. Dorr:
Active Defense Against Social Engineering: The Case for Human Language Technology. STOC@LREC 2020: 1-8 - [c152]Md. Mazharul Islam, Ehab Al-Shaer:
Active Deception Framework: An Extensible Development Environment for Adaptive Cyber Deception. SecDev 2020: 41-48 - [c151]Md. Mazharul Islam, Ehab Al-Shaer, Muhammad Abdul Basit Ur Rahim:
Email Address Mutation for Proactive Deterrence Against Lateral Spear-Phishing Attacks. SecureComm (1) 2020: 1-22 - [c150]Ehsan Aghaei, Waseem G. Shadid, Ehab Al-Shaer:
ThreatZoom: Hierarchical Neural Network for CVEs to CWEs Classification. SecureComm (1) 2020: 23-41 - [c149]Muhammad Abdul Basit Ur Rahim, Ehab Al-Shaer, Qi Duan:
A Formal Verification of Configuration-Based Mutation Techniques for Moving Target Defense. SecureComm (1) 2020: 61-79 - [p4]Mohammed Noraden Alsaleh, Ehab Al-Shaer:
Automated Cyber Risk Mitigation: Making Informed Cost-Effective Decisions. Adaptive Autonomous Secure Cyber Systems 2020: 131-157 - [i5]Adam Dalton, Ehsan Aghaei, Ehab Al-Shaer, Archna Bhatia, Esteban Castillo, Zhuo Cheng, Sreekar Dhaduvai, Qi Duan, Md. Mazharul Islam, Younes Karimi, Amir Masoumzadeh, Brodie Mather, Sashank Santhanam, Samira Shaikh, Tomek Strzalkowski, Bonnie J. Dorr:
The Panacea Threat Intelligence and Active Defense Platform. CoRR abs/2004.09662 (2020) - [i4]Ehsan Aghaei, Waseem G. Shadid, Ehab Al-Shaer:
ThreatZoom: CVE2CWE using Hierarchical Neural Network. CoRR abs/2009.11501 (2020)
2010 – 2019
- 2019
- [b3]Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang:
Autonomous Cyber Deception - Reasoning, Adaptive Planning, and Evaluation of HoneyThings. Springer 2019, ISBN 978-3-030-02109-2 - [j44]Mohammad Ashiqur Rahman, Amarjit Datta, Ehab Al-Shaer:
Security design against stealthy attacks on power system state estimation: A formal approach. Comput. Secur. 84: 301-317 (2019) - [c148]Md. Mazharul Islam, Qi Duan, Ehab Al-Shaer:
Specification-driven Moving Target Defense Synthesis. MTD@CCS 2019: 13-24 - [c147]Ashutosh Dutta, Ehab Al-Shaer:
"What", "Where", and "Why" Cybersecurity Controls to Enforce for Optimal Risk Mitigation. CNS 2019: 160-168 - [c146]Muhammad Abdul Basit Ur Rahim, Qi Duan, Ehab Al-Shaer:
A formal verification of mutation-based moving target defense. HotSoS 2019: 10:1-10:2 - [c145]Md. Mazharul Islam, Ehab Al-Shaer, Ashutosh Dutta, Mohammed Noraden Alsaleh:
CLIPS/ActiveSDN for automated and safe cybersecurity course-of-actions orchestration. HotSoS 2019: 13:1-13:3 - [c144]Ashutosh Dutta, Ehab Al-Shaer:
Cyber defense matrix: a new model for optimal composition of cybersecurity controls to construct resilient risk mitigation. HotSoS 2019: 14:1-14:2 - [c143]Ghaith Husari, Ehab Al-Shaer, Bill Chu, Ruhani Faiheem Rahman:
Learning APT chains from cyber threat intelligence. HotSoS 2019: 19:1-19:2 - [c142]Mohiuddin Ahmed
, Ehab Al-Shaer:
Measures and metrics for the enforcement of critical security controls: a case study of boundary defense. HotSoS 2019: 21:1-21:3 - [c141]Ehsan Aghaei, Ehab Al-Shaer:
ThreatZoom: neural network for automated vulnerability mitigation. HotSoS 2019: 24:1-24:3 - [c140]Abdullah Al Farooq, Ehab Al-Shaer, Thomas Moyer, Krishna Kant:
IoTC2: A Formal Method Approach for Detecting Conflicts in Large Scale IoT Systems. IM 2019: 442-447 - [e17]Xenofon D. Koutsoukos, Alvaro A. Cárdenas, Ehab Al-Shaer:
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, HotSoS 2019, Nashville, TN, USA, April 1-3, 2019. ACM 2019, ISBN 978-1-4503-7147-6 [contents] - [i3]Mohammad Ashiqur Rahman, Md Hasan Shahriar, Ehab Al-Shaer, Quanyan Zhu:
A Formal Approach for Efficient Navigation Management of Hybrid Electric Vehicles on Long Trips. CoRR abs/1907.00540 (2019) - 2018
- [c139]Mohammed Noraden Alsaleh, Jinpeng Wei, Ehab Al-Shaer, Mohiuddin Ahmed
:
gExtractor: Towards Automated Extraction of Malware Deception Parameters. SSPREW@ACSAC 2018: 2:1-2:12 - [c138]Fida Gillani, Ehab Al-Shaer, Qi Duan:
In-design Resilient SDN Control Plane and Elastic Forwarding Against Aggressive DDoS Attacks. MTD@CCS 2018: 80-89 - [c137]Qi Duan, Ehab Al-Shaer, Mazharul Islam, Jafar Haadi Jafarian:
CONCEAL: A Strategy Composition for Resilient Cyber Deception-Framework, Metrics and Deployment. CNS 2018: 1-9 - [c136]Mohiuddin Ahmed, Jinpeng Wei, Yongge Wang, Ehab Al-Shaer:
A Poisoning Attack Against Cryptocurrency Mining Pools. DPM/CBT@ESORICS 2018: 140-154 - [c135]Mohammed Noraden Alsaleh, Ehab Al-Shaer, Qi Duan:
Verifying the Enforcement and Effectiveness of Network Lateral Movement Resistance Techniques. ICETE (2) 2018: 412-423 - [c134]Ghaith Husari, Xi Niu, Bill Chu, Ehab Al-Shaer:
Using Entropy and Mutual Information to Extract Threat Actions from Cyber Threat Intelligence. ISI 2018: 1-6 - [c133]Amirreza Niakanlahiji, Bei-Tseng Chu, Ehab Al-Shaer:
PhishMon: A Machine Learning Framework for Detecting Phishing Webpages. ISI 2018: 220-225 - [i2]Abdullah Al Farooq, Ehab Al-Shaer, Thomas Moyer, Krishna Kant:
IoTC2: A Formal Method Approach for Detecting Conflicts in Large Scale IoT Systems. CoRR abs/1812.03966 (2018) - 2017
- [j43]Sara Qamar
, Zahid Anwar
, Mohammad Ashiqur Rahman, Ehab Al-Shaer, Bei-tseng Chu:
Data-driven analytics for cyber-threat intelligence and information sharing. Comput. Secur. 67: 35-58 (2017) - [j42]Mujahid Mohsin, Zahid Anwar
, Farhat Zaman, Ehab Al-Shaer:
IoTChecker: A data-driven framework for security analytics of Internet of Things configurations. Comput. Secur. 70: 199-223 (2017) - [j41]Mohammed Noraden Alsaleh
, Ehab Al-Shaer, Ghaith Husari:
ROI-Driven Cyber Risk Mitigation Using Host Compliance and Network Configuration. J. Netw. Syst. Manag. 25(4): 759-783 (2017) - [j40]Adel El-Atawy, Qi Duan
, Ehab Al-Shaer:
A Novel Class of Robust Covert Channels Using Out-of-Order Packets. IEEE Trans. Dependable Secur. Comput. 14(2): 116-129 (2017) - [j39]Mohammad Ashiqur Rahman, Mohammad Hossein Manshaei, Ehab Al-Shaer, Mohamed Shehab:
Secure and Private Data Aggregation for Energy Consumption Scheduling in Smart Grids. IEEE Trans. Dependable Secur. Comput. 14(2): 221-234 (2017) - [j38]Mohammad Ashiqur Rahman
, Ehab Al-Shaer:
Automated Synthesis of Distributed Network Access Controls: A Formal Framework with Refinement. IEEE Trans. Parallel Distributed Syst. 28(2): 416-430 (2017) - [c132]Ghaith Husari, Ehab Al-Shaer, Mohiuddin Ahmed
, Bill Chu, Xi Niu:
TTPDrill: Automatic and Accurate Extraction of Threat Actions from Unstructured Text of CTI Sources. ACSAC 2017: 103-115 - [c131]Morgan Burcham, Mahran Al-Zyoud, Jeffrey C. Carver, Mohammed Noraden Alsaleh, Hongying Du, Fida Gillani, Jun Jiang, Akond Rahman, Özgür Kafali, Ehab Al-Shaer, Laurie A. Williams:
Characterizing Scientific Reporting in Security Literature: An analysis of ACM CCS and IEEE S&P Papers. HotSoS 2017: 13-23 - [c130]Sreyasee Das Bhattacharjee, Ashit Talukder, Ehab Al-Shaer, Pratik Doshi:
Prioritized active learning for malicious URL detection using weighted text-based features. ISI 2017: 107-112 - [c129]Amirreza Niakanlahiji, Mir Mehedi A. Pritom, Bei-tseng Chu, Ehab Al-Shaer:
Predicting Zero-day Malicious IP Addresses. SafeConfig@CCS 2017: 1-6 - 2016
- [b2]Ehab Al-Shaer, Mohammad Ashiqur Rahman:
Security and Resiliency Analytics for Smart Grids - Static and Dynamic Approaches. Advances in Information Security 67, Springer 2016, ISBN 978-3-319-32870-6, pp. 3-134 - [j37]Fida Gillani, Ehab Al-Shaer, Basil AsSadhan
:
Economic metric to improve spam detectors. J. Netw. Comput. Appl. 65: 131-143 (2016) - [c128]Ehab Al-Shaer:
A Cyber Mutation: Metrics, Techniques and Future Directions. MTD@CCS 2016: 1 - [c127]Jafar Haadi Jafarian, Amirreza Niakanlahiji, Ehab Al-Shaer, Qi Duan:
Multi-dimensional Host Identity Anonymization for Defeating Skilled Attackers. MTD@CCS 2016: 47-58 - [c126]Usman Rauf, Fida Gillani, Ehab Al-Shaer, Mahantesh Halappanavar, Samrat Chatterjee, Christopher S. Oehmen:
Formal Approach for Resilient Reachability based on End-System Route Agility. MTD@CCS 2016: 117-127 - [c125]Mujahid Mohsin, Zahid Anwar, Ghaith Husari, Ehab Al-Shaer, Mohammad Ashiqur Rahman:
IoTSAT: A formal framework for security analysis of the internet of things (IoT). CNS 2016: 180-188 - [c124]Mohammad Ashiqur Rahman, Abdullah Al Farooq, Amarjit Datta, Ehab Al-Shaer:
Automated synthesis of resiliency configurations for cyber networks. CNS 2016: 243-251 - [c123]Mohammed Noraden Alsaleh, Ghaith Husari, Ehab Al-Shaer:
Optimizing the RoI of cyber risk mitigation. CNSM 2016: 223-227 - [c122]Mohammad Ashiqur Rahman, A. H. M. Jakaria, Ehab Al-Shaer:
Formal Analysis for Dependable Supervisory Control and Data Acquisition in Smart Grids. DSN 2016: 263-274 - [c121]Spike E. Dog, Alex Tweed, LeRoy Rouse, Bill Chu, Duan Qi, Yueqi Hu, Jing Yang, Ehab Al-Shaer:
Strategic Cyber Threat Intelligence Sharing: A Case Study of IDS Logs. ICCCN 2016: 1-6 - [c120]Mohammed Noraden Alsaleh, Ehab Al-Shaer:
Towards Automated Verification of Active Cyber Defense Strategies on Software Defined Networks. SafeConfig@CCS 2016: 23-29 - [p3]Ehab Al-Shaer, Syed Fida Gillani:
Agile Virtual Infrastructure for Cyber Deception Against Stealthy DDoS Attacks. Cyber Deception 2016: 235-259 - 2015
- [j36]Soumya Maity, Padmalochan Bera, S. K. Ghosh, Ehab Al-Shaer:
Formal integrated network security analysis tool: formal query-based network security configuration analysis. IET Networks 4(2): 137-147 (2015) - [j35]Soumya Maity, Soumya Kanti Ghosh, Ehab Al-Shaer:
PoliCon: a policy conciliation framework for heterogeneous mobile ad hoc networks. Secur. Commun. Networks 8(3): 418-430 (2015) - [j34]Jafar Haadi Jafarian, Ehab Al-Shaer, Qi Duan:
An Effective Address Mutation Approach for Disrupting Reconnaissance Attacks. IEEE Trans. Inf. Forensics Secur. 10(12): 2562-2577 (2015) - [j33]Muhammad Qasim Ali, Ehab Al-Shaer:
Randomization-Based Intrusion Detection System for Advanced Metering Infrastructure. ACM Trans. Inf. Syst. Secur. 18(2): 7:1-7:30 (2015) - [c119]Ehab Al-Shaer, Christopher S. Oehmen, Mohammad Ashiqur Rahman:
SafeConfig 2015: Workshop on Automated Decision Making for Active Cyber Defense. CCS 2015: 1711-1712 - [c118]Muhammad Qasim Ali, Ayesha Binte Ashfaq, Ehab Al-Shaer, Qi Duan:
Towards a science of anomaly detection system evasion. CNS 2015: 460-468 - [c117]Fida Gillani, Ehab Al-Shaer, Samantha Lo, Qi Duan, Mostafa H. Ammar, Ellen W. Zegura:
Agile virtualized infrastructure to proactively defend against cyber attacks. INFOCOM 2015: 729-737 - [c116]Jafar Haadi Jafarian, Ehab Al-Shaer, Qi Duan:
Adversary-aware IP address randomization for proactive agility against sophisticated attackers. INFOCOM 2015: 738-746 - [c115]Yasir Imtiaz Khan
, Ehab Al-Shaer, Usman Rauf:
Cyber Resilience-by-Construction: Modeling, Measuring & Verifying. SafeConfig@CCS 2015: 9-14 - [c114]Christopher S. Oehmen, Ehab Al-Shaer, Mohammad Ashiqur Rahman:
Automated Decision Making for Active Cyber Defense: Panel Discussion. SafeConfig@CCS 2015: 59 - [c113]Mohammad Ashiqur Rahman, Ehab Al-Shaer:
Formal synthesis of dependable configurations for advanced metering infrastructures. SmartGridComm 2015: 289-294 - [p2]Ehab Al-Shaer, Mohammad Ashiqur Rahman:
Attribution, Temptation, and Expectation: A Formal Framework for Defense-by-Deception in Cyberwarfare. Cyber Warfare 2015: 57-80 - [e16]Ehab Al-Shaer, Christopher S. Oehmen, Mohammad Ashiqur Rahman:
Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense, SafeConfig 2015, Denver, Colorado, USA, October 12, 2015. ACM 2015, ISBN 978-1-4503-3821-9 [contents] - 2014
- [b1]Ehab Al-Shaer:
Automated Firewall Analytics - Design, Configuration and Optimization. Springer 2014, ISBN 978-3-319-10370-9, pp. 1-127 - [j32]Ayesha Binte Ashfaq, Sajjad Rizvi, Mobin Javed, Syed Ali Khayam, Muhammad Qasim Ali, Ehab Al-Shaer:
Information theoretic feature space slicing for statistical anomaly detection. J. Netw. Comput. Appl. 41: 473-487 (2014) - [j31]Muhammad Qasim Ali, Ehab Al-Shaer, Taghrid Samak:
Firewall Policy Reconnaissance: Techniques and Analysis. IEEE Trans. Inf. Forensics Secur. 9(2): 296-308 (2014) - [j30]Syed Fida Gillani, Mehmet Demirci, Ehab Al-Shaer, Mostafa H. Ammar:
Problem Localization and Quantification Using Formal Evidential Reasoning for Virtual Networks. IEEE Trans. Netw. Serv. Manag. 11(3): 307-320 (2014) - [c112]Mohammad Ashiqur Rahman, Ehab Al-Shaer, Rakesh B. Bobba
:
Moving Target Defense for Hardening the Security of the Power System State Estimation. MTD@CCS 2014: 59-68 - [c111]Jafar Haadi Jafarian, Ehab Al-Shaer, Qi Duan:
Spatio-temporal Address Mutation for Proactive Cyber Agility against Sophisticated Attackers. MTD@CCS 2014: 69-78 - [c110]Ehab Al-Shaer, Krishna Kant:
Summary Abstract for the 7th ACM International Workshop on Cyber Security Analytics, Intelligence and Automation. CCS 2014: 1544-1545 - [c109]Mohammed Noraden Alsaleh, Ehab Al-Shaer:
Security configuration analytics using video games. CNS 2014: 256-264 - [c108]Muhammad Qasim Ali, Reza Yousefian, Ehab Al-Shaer, Sukumar Kamalasadan
, Quanyan Zhu:
Two-tier data-driven intrusion detection for automatic generation control in smart grid. CNS 2014: 292-300 - [c107]Mohammad Ashiqur Rahman, Ehab Al-Shaer, Rajesh G. Kavasseri
:
Security Threat Analytics and Countermeasure Synthesis for Power System State Estimation. DSN 2014: 156-167 - [c106]Mohammad Ashiqur Rahman, Ehab Al-Shaer, Rajesh G. Kavasseri
:
A formal model for verifying the impact of stealthy attacks on optimal power flow in power grids. ICCPS 2014: 175-186 - [c105]Mohammad Ashiqur Rahman, Ehab Al-Shaer, Rajesh G. Kavasseri
:
Impact Analysis of Topology Poisoning Attacks on Economic Operation of the Smart Power Grid. ICDCS 2014: 649-659 - [c104]Fida Gillani, Ehab Al-Shaer:
Improving Efficiency of Spam Detection using Economic Model. SafeConfig 2014: 11-18 - [c103]Mohammed Noraden Alsaleh, Ehab Al-Shaer:
Enterprise Risk Assessment Based on Compliance Reports and Vulnerability Scoring Systems. SafeConfig 2014: 25-28 - [e15]Ehab Al-Shaer, Krishna Kant:
Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence and Automation, SafeConfig '14, Scottsdale, Arizona, USA, November 3, 2014. ACM 2014, ISBN 978-1-4503-3147-0 [contents] - [i1]Qi Duan, Jafar Haadi Jafarian, Ehab Al-Shaer, Jinhui Xu:
On DDoS Attack Related Minimum Cut Problems. CoRR abs/1412.3359 (2014) - 2013
- [j29]Qi Duan, Ehab Al-Shaer:
Traffic-aware dynamic firewall policy management: techniques and applications. IEEE Commun. Mag. 51(7) (2013) - [j28]Mehmet Engin Tozal, Yongge Wang, Ehab Al-Shaer, Kamil Saraç, Bhavani Thuraisingham, Bei-tseng Chu:
Adaptive Information Coding for Secure and Reliable Wireless Telesurgery Communications. Mob. Networks Appl. 18(5): 697-711 (2013) - [j27]Muhammad Qasim Ali, Ehab Al-Shaer, Hassan Khan, Syed Ali Khayam:
Automated Anomaly Detector Adaptation using Adaptive Threshold Tuning. ACM Trans. Inf. Syst. Secur. 15(4): 17:1-17:30 (2013) - [j26]Mohammad Ashiqur Rahman, Ehab Al-Shaer, Padmalochan Bera:
A Noninvasive Threat Analyzer for Advanced Metering Infrastructure in Smart Grid. IEEE Trans. Smart Grid 4(1): 273-287 (2013) - [c102]Qi Duan, Yongge Wang, Fadi Mohsen, Ehab Al-Shaer:
Private and Anonymous Data Storage and Distribution in Cloud. IEEE SCC 2013: 264-271 - [c101]Saeed Al-Haj, Ehab Al-Shaer, HariGovind V. Ramasamy:
Security-Aware Resource Allocation in Clouds. IEEE SCC 2013: 400-407 - [c100]Mohammad Ashiqur Rahman, Fadi Mohsen, Ehab Al-Shaer:
A formal model for sustainable vehicle-to-grid management. SEGS@CCS 2013: 81-92 - [c99]Muhammad Qasim Ali, Ehab Al-Shaer:
Configuration-based IDS for advanced metering infrastructure. CCS 2013: 451-462 - [c98]Ayesha Binte Ashfaq, Muhammad Qasim Ali, Ehab Al-Shaer, Syed Ali Khayam:
Revisiting anomaly detection system design philosophy. CCS 2013: 1473-1476 - [c97]Mohammad Ashiqur Rahman, Mohammad Hossein Manshaei, Ehab Al-Shaer:
A game-theoretic approach for deceiving Remote Operating System Fingerprinting. CNS 2013: 73-81 - [c96]Qi Duan, Ehab Al-Shaer, Jafar Haadi Jafarian:
Efficient Random Route Mutation considering flow and network constraints. CNS 2013: 260-268 - [c95]Mohammed Noraden Alsaleh, Saeed Al-Haj, Ehab Al-Shaer:
Objective metrics for firewall security: A holistic view. CNS 2013: 470-477 - [c94]Saeed Al-Haj, Ehab Al-Shaer:
A formal approach for virtual machine migration planning. CNSM 2013: 51-58 - [c93]Jafar Haadi Jafarian, Ehab Al-Shaer, Qi Duan:
Formal Approach for Route Agility against Persistent Attackers. ESORICS 2013: 237-254 - [c92]Mehmet Demirci, Fida Gillani, Mostafa H. Ammar, Ehab Al-Shaer:
Overlay network placement for diagnosability. GLOBECOM 2013: 2236-2242 - [c91]Mohammad Ashiqur Rahman, Qi Duan, Ehab Al-Shaer:
Energy efficient navigation management for hybrid electric vehicles on highways. ICCPS 2013: 21-30 - [c90]Mohammad Ashiqur Rahman, Ehab Al-Shaer:
A Formal Framework for Network Security Design Synthesis. ICDCS 2013: 560-570 - [c89]Mohammad Ashiqur Rahman, Ehab Al-Shaer:
A formal approach for network security management based on qualitative risk analysis. IM 2013: 244-251 - [c88]Ehab Al-Shaer, Qi Duan, Saeed Al-Haj, Moustafa Youssef
:
SensorChecker: reachability verification in mission-oriented sensor networks. MiSeNet@MobiCom 2013: 51-56 - [c87]Mohammad Ashiqur Rahman, Ehab Al-Shaer:
Metrics for Automated Network Security Design. NDSS 2013 - [c86]Mohammad Ashiqur Rahman, Ehab Al-Shaer, Md. Ashfaqur Rahman:
A formal model for verifying stealthy attacks on state estimation in power grids. SmartGridComm 2013: 414-419 - [c85]Muhammad Qasim Ali, Ehab Al-Shaer:
Probabilistic model checking for AMI intrusion detection. SmartGridComm 2013: 468-473 - [c84]Muhammad Qasim Ali, Ehab Al-Shaer, Qi Duan:
Randomizing AMI configuration for proactive defense in smart grid. SmartGridComm 2013: 618-623 - [e14]Ehab Al-Shaer, Xinming Ou, Geoffrey G. Xie:
Automated Security Management [papers from SafeConfig 2012, Baltimore Inner Harbor, MD, USA]. Springer 2013, ISBN 978-3-319-01432-6 [contents] - 2012
- [j25]Yongning Tang, Ehab Al-Shaer, Kaustubh R. Joshi:
Reasoning under Uncertainty for Overlay Fault Diagnosis. IEEE Trans. Netw. Serv. Manag. 9(1): 34-47 (2012) - [j24]Taghrid Samak, Ehab Al-Shaer:
Fuzzy Conflict Analysis for QoS Policy Parameters in DiffServ Networks. IEEE Trans. Netw. Serv. Manag. 9(4): 459-472 (2012) - [c83]