51 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2019 Rahman MA, Datta A, Al-Shaer E. Security design against stealthy attacks on power system state estimation: A formal approach Computers & Security. 84: 301-317. DOI: 10.1016/J.Cose.2019.03.022  0.323
2018 Kernicky T, Whelan M, Al-Shaer E. Vibration-based damage detection with uncertainty quantification by structural identification using nonlinear constraint satisfaction with interval arithmetic Structural Health Monitoring. 18: 1569-1589. DOI: 10.1177/1475921718806476  0.31
2017 Rahman MA, Al-Shaer E. Automated Synthesis of Distributed Network Access Controls: A Formal Framework with Refinement Ieee Transactions On Parallel and Distributed Systems. 28: 416-430. DOI: 10.1109/Tpds.2016.2585108  0.377
2017 Rahman MA, Manshaei MH, Al-Shaer E, Shehab M. Secure and Private Data Aggregation for Energy Consumption Scheduling in Smart Grids Ieee Transactions On Dependable and Secure Computing. 14: 221-234. DOI: 10.1109/Tdsc.2015.2446492  0.371
2017 El-Atawy A, Duan Q, Al-Shaer E. A Novel Class of Robust Covert Channels Using Out-of-Order Packets Ieee Transactions On Dependable and Secure Computing. 14: 116-129. DOI: 10.1109/Tdsc.2015.2443779  0.38
2017 Mohsin M, Anwar Z, Zaman F, Al-Shaer E. IoTChecker: A data-driven framework for security analytics of Internet of Things configurations Computers & Security. 70: 199-223. DOI: 10.1016/J.Cose.2017.05.012  0.373
2017 Qamar S, Anwar Z, Rahman MA, Al-Shaer E, Chu B. Data-driven analytics for cyber-threat intelligence and information sharing Computers & Security. 67: 35-58. DOI: 10.1016/J.Cose.2017.02.005  0.386
2017 Alsaleh MN, Al-Shaer E, Husari G. ROI-Driven Cyber Risk Mitigation Using Host Compliance and Network Configuration Journal of Network and Systems Management. 25: 759-783. DOI: 10.1007/S10922-017-9428-X  0.38
2015 Kernicky TP, Whelan MJ, Rauf U, Al-Shaer E. Damage detection in a laboratory model using a nonlinear constraint satisfaction processor for finite element model updating Structural Health Monitoring 2015: System Reliability For Verification and Implementation - Proceedings of the 10th International Workshop On Structural Health Monitoring, Iwshm 2015. 2: 1403-1410. DOI: 10.12783/Shm2015/175  0.31
2015 Ali MQ, Al-Shaer E. Randomization-based intrusion detection system for advanced metering infrastructure Acm Transactions On Information and System Security. 18. DOI: 10.1145/2814936  0.338
2015 Jafarian JH, Al-Shaer E, Duan Q. An Effective Address Mutation Approach for Disrupting Reconnaissance Attacks Ieee Transactions On Information Forensics and Security. 10: 2562-2577. DOI: 10.1109/Tifs.2015.2467358  0.392
2015 Jafarian JH, Al-Shaer E, Duan Q. Adversary-aware IP address randomization for proactive agility against sophisticated attackers Proceedings - Ieee Infocom. 26: 738-746. DOI: 10.1109/INFOCOM.2015.7218443  0.302
2015 Maity S, Ghosh SK, Al-Shaer E. PoliCon: A policy conciliation framework for heterogeneous mobile ad hoc networks Security and Communication Networks. 8: 418-430. DOI: 10.1002/Sec.990  0.329
2014 Jafarian JH, Al-Shaer E, Duan Q. Spatio-temporal address mutation for proactive cyber agility against sophisticated attackers Proceedings of the Acm Conference On Computer and Communications Security. 2014: 69-78. DOI: 10.1145/2663474.2663483  0.318
2014 Gillani SF, Demirci M, Al-Shaer E, Ammar MH. Problem localization and quantification using formal evidential reasoning for virtual networks Ieee Transactions On Network and Service Management. 11: 307-320. DOI: 10.1109/Tnsm.2014.2326297  0.453
2014 Ali MQ, Al-Shaer E, Samak T. Firewall policy reconnaissance: Techniques and analysis Ieee Transactions On Information Forensics and Security. 9: 296-308. DOI: 10.1109/Tifs.2013.2296874  0.366
2014 Ashfaq AB, Rizvi S, Javed M, Khayam SA, Ali MQ, Al-Shaer E. Information theoretic feature space slicing for statistical anomaly detection Journal of Network and Computer Applications. 41: 473-487. DOI: 10.1016/J.Jnca.2014.01.002  0.314
2013 Ali MQ, Al-Shaer E, Khan H, Khayam SA. Automated anomaly detector adaptation using adaptive threshold tuning Acm Transactions On Information and System Security. 15. DOI: 10.1145/2445566.2445569  0.431
2013 Rahman MA, Al-Shaer E, Bera P. A noninvasive threat analyzer for advanced metering infrastructure in smart grid Ieee Transactions On Smart Grid. 4: 273-287. DOI: 10.1109/Tsg.2012.2228283  0.323
2013 Duan Q, Al-Shaer E. Traffic-aware dynamic firewall policy management: Techniques and applications Ieee Communications Magazine. 51: 73-79. DOI: 10.1109/Mcom.2013.6553681  0.388
2013 Duan Q, Al-Shaer E, Jafarian H. Efficient random route mutation considering flow and network constraints 2013 Ieee Conference On Communications and Network Security, Cns 2013. 260-268. DOI: 10.1109/CNS.2013.6682715  0.311
2013 Tozal ME, Wang Y, Al-Shaer E, Sarac K, Thuraisingham B, Chu BT. Adaptive information coding for secure and reliable wireless telesurgery communications Mobile Networks and Applications. 18: 697-711. DOI: 10.1007/S11036-011-0333-3  0.41
2013 Jafarian JH, Al-Shaer E, Duan Q. Formal approach for route agility against persistent attackers Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8134: 237-254. DOI: 10.1007/978-3-642-40203-6_14  0.335
2012 Samak T, Al-Shaer E. Fuzzy conflict analysis for QoS policy parameters in DiffServ networks Ieee Transactions On Network and Service Management. 9: 459-472. DOI: 10.1109/Tnsm.2012.062512.120308  0.378
2012 Gillani F, Al-Shaer E, Ammar M, Demirci M. Fine-grain diagnosis of overlay performance anomalies using end-point network experiences Proceedings of the 2012 8th International Conference On Network and Service Management, Cnsm 2012. 91-99.  0.371
2011 Al-Shaer E, Alsaleh MN. ConfigChecker: A tool for comprehensive security configuration analytics 2011 4th Symposium On Configuration Analytics and Automation, Safeconfig 2011. DOI: 10.1109/SafeConfig.2011.6111667  0.318
2011 Ahmed MS, Al-Shaer E, Taibah M, Khan L. Objective risk evaluation for automated security management Journal of Network and Systems Management. 19: 343-366. DOI: 10.1007/S10922-010-9177-6  0.369
2011 Salah K, Sattar K, Sqalli M, Al-Shaer E. A potential low-rate DoS attack against network firewalls Security and Communication Networks. 4: 136-146. DOI: 10.1002/Sec.118  0.41
2010 Abedin M, Nessa S, Khan L, Al-Shaer E, Awad M. Analysis of firewall policy rules using traffic mining techniques International Journal of Internet Protocol Technology. 5: 3-22. DOI: 10.1504/Ijipt.2010.032611  0.406
2009 Al-Shaer E, Marrero W, El-Atawy A, ElBadawi K. Network configuration in a box: Towards end-to-end verification of network reachability and security Proceedings - International Conference On Network Protocols, Icnp. 123-132. DOI: 10.1109/ICNP.2009.5339690  0.312
2009 Smith K, Al-Shaer E, Elbadawi K. Information theoretic approach for characterizing spam botnets based on traffic properties Ieee International Conference On Communications. DOI: 10.1109/ICC.2009.5199083  0.335
2008 Roychoudhuri L, Al-Shaer ES. Autonomic QoS optimization of real-time internet audio using loss prediction and stochastic control Noms 2008 - Ieee/Ifip Network Operations and Management Symposium: Pervasive Management For Ubiquitous Networks and Services. 73-80. DOI: 10.1109/NOMS.2008.4575119  0.772
2008 Al-Shaer E, Kalmanek CR, Wu F. Automated security configuration management Journal of Network and Systems Management. 16: 231-233. DOI: 10.1007/S10922-008-9105-1  0.335
2008 Yan Y, El-Atawy A, Al-Shaer E. A game-theoretic model for capacity-constrained fair bandwidth allocation International Journal of Network Management. 18: 485-504. DOI: 10.1002/Nem.709  0.425
2007 Tang Y, Al-Shaer E, Zhang B. Toward globally optimal event monitoring & aggregation for large-scale overlay networks 10th Ifip/Ieee International Symposium On Integrated Network Management 2007, Im '07. 236-245. DOI: 10.1109/INM.2007.374788  0.303
2007 El-Atawy A, Samak T, Al-Shaer E, Hong L. Using online traffic statistical matching for optimizing packet filtering performance Proceedings - Ieee Infocom. 866-874. DOI: 10.1109/INFCOM.2007.106  0.308
2006 Taibah MM, Al-Shaer E, Boutaba R. An architecture for an email worm prevention system 2006 Securecomm and Workshops. DOI: 10.1109/SECCOMW.2006.359559  0.311
2006 Hamed H, Al-Shaer E. Taxonomy of conflicts in network security policies Ieee Communications Magazine. 44: 134-141. DOI: 10.1109/Mcom.2006.1607877  0.357
2006 Hamed H, El-Atawy A, Al-Shaer E. On dynamic optimization of packet matching in high-speed firewalls Ieee Journal On Selected Areas in Communications. 24: 1817-1830. DOI: 10.1109/Jsac.2006.877140  0.445
2006 Hamed H, El-Atawy A, Al-Shaer E. Adaptive statistical optimization techniques for firewall packet filtering Proceedings - Ieee Infocom. DOI: 10.1109/INFOCOM.2006.129  0.31
2006 Roychoudhuri L, Al-Shaer E, Brewster GB. On the impact of loss and delay variation on Internet packet audio transmission Computer Communications. 29: 1578-1589. DOI: 10.1016/J.Comcom.2006.04.004  0.783
2006 Boutaba R, Al-Shaer E, Almeroth K. Special issue: monitoring and measurements of IP networks Computer Communications. 29: 1561-1563. DOI: 10.1016/J.Comcom.2005.07.007  0.359
2005 Al-Shaer E, Hamed H, Boutaba R, Hasan M. Conflict classification and analysis of distributed firewall policies Ieee Journal On Selected Areas in Communications. 23: 2069-2083. DOI: 10.1109/Jsac.2005.854119  0.339
2005 Roychoudhuri L, Al-Shaer ES. Real-time audio quality evaluation for adaptive multimedia protocols Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3754: 133-144. DOI: 10.1007/11572831_12  0.776
2004 Roychoudhuri L, Al-Shaer ES. Real-time analysis of delay variation for packet loss prediction Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3271: 213-227. DOI: 10.1007/978-3-540-30189-9_18  0.773
2004 Roychoudhuri L, Al-Shaer ES. Adaptive rate control for real-time packet audio based on loss prediction Globecom - Ieee Global Telecommunications Conference. 2: 634-638.  0.787
2003 Roychoudhuri L, Al-Shaer E, Hamed H, Brewster GB. Audio transmission over the Internet: Experiments and observations Ieee International Conference On Communications. 1: 552-556.  0.762
2002 Roychoudhuri L, Al-Shaer E, Hamed H, Brewster GB. On studying the impact of the Internet delays on audio transmission 2002 Ieee Workshop On Ip Operations and Management, Ipom 2002. 208-213. DOI: 10.1109/IPOM.2002.1045781  0.785
2002 Al-Shaer E, Tang Y. QoS Path Monitoring for Multicast Networks Journal of Network and Systems Management. 10: 357-381. DOI: 10.1023/A:1019814627444  0.483
2002 Al-Shaer E, Tang Y. SMRM: SNMP-based multicast reachability monitoring Ieee Symposium Record On Network Operations and Management Symposium. 467-482.  0.352
2001 Al-Shaer E, Tang Y. Toward integrating IP multicasting in internet network management protocols Computer Communications. 24: 473-485. DOI: 10.1016/S0140-3664(00)00296-6  0.347
Show low-probability matches.