Year |
Citation |
Score |
2019 |
Rahman MA, Datta A, Al-Shaer E. Security design against stealthy attacks on power system state estimation: A formal approach Computers & Security. 84: 301-317. DOI: 10.1016/J.Cose.2019.03.022 |
0.323 |
|
2018 |
Kernicky T, Whelan M, Al-Shaer E. Vibration-based damage detection with uncertainty quantification by structural identification using nonlinear constraint satisfaction with interval arithmetic Structural Health Monitoring. 18: 1569-1589. DOI: 10.1177/1475921718806476 |
0.31 |
|
2017 |
Rahman MA, Al-Shaer E. Automated Synthesis of Distributed Network Access Controls: A Formal Framework with Refinement Ieee Transactions On Parallel and Distributed Systems. 28: 416-430. DOI: 10.1109/Tpds.2016.2585108 |
0.377 |
|
2017 |
Rahman MA, Manshaei MH, Al-Shaer E, Shehab M. Secure and Private Data Aggregation for Energy Consumption Scheduling in Smart Grids Ieee Transactions On Dependable and Secure Computing. 14: 221-234. DOI: 10.1109/Tdsc.2015.2446492 |
0.371 |
|
2017 |
El-Atawy A, Duan Q, Al-Shaer E. A Novel Class of Robust Covert Channels Using Out-of-Order Packets Ieee Transactions On Dependable and Secure Computing. 14: 116-129. DOI: 10.1109/Tdsc.2015.2443779 |
0.38 |
|
2017 |
Mohsin M, Anwar Z, Zaman F, Al-Shaer E. IoTChecker: A data-driven framework for security analytics of Internet of Things configurations Computers & Security. 70: 199-223. DOI: 10.1016/J.Cose.2017.05.012 |
0.373 |
|
2017 |
Qamar S, Anwar Z, Rahman MA, Al-Shaer E, Chu B. Data-driven analytics for cyber-threat intelligence and information sharing Computers & Security. 67: 35-58. DOI: 10.1016/J.Cose.2017.02.005 |
0.386 |
|
2017 |
Alsaleh MN, Al-Shaer E, Husari G. ROI-Driven Cyber Risk Mitigation Using Host Compliance and Network Configuration Journal of Network and Systems Management. 25: 759-783. DOI: 10.1007/S10922-017-9428-X |
0.38 |
|
2015 |
Kernicky TP, Whelan MJ, Rauf U, Al-Shaer E. Damage detection in a laboratory model using a nonlinear constraint satisfaction processor for finite element model updating Structural Health Monitoring 2015: System Reliability For Verification and Implementation - Proceedings of the 10th International Workshop On Structural Health Monitoring, Iwshm 2015. 2: 1403-1410. DOI: 10.12783/Shm2015/175 |
0.31 |
|
2015 |
Ali MQ, Al-Shaer E. Randomization-based intrusion detection system for advanced metering infrastructure Acm Transactions On Information and System Security. 18. DOI: 10.1145/2814936 |
0.338 |
|
2015 |
Jafarian JH, Al-Shaer E, Duan Q. An Effective Address Mutation Approach for Disrupting Reconnaissance Attacks Ieee Transactions On Information Forensics and Security. 10: 2562-2577. DOI: 10.1109/Tifs.2015.2467358 |
0.392 |
|
2015 |
Jafarian JH, Al-Shaer E, Duan Q. Adversary-aware IP address randomization for proactive agility against sophisticated attackers Proceedings - Ieee Infocom. 26: 738-746. DOI: 10.1109/INFOCOM.2015.7218443 |
0.302 |
|
2015 |
Maity S, Ghosh SK, Al-Shaer E. PoliCon: A policy conciliation framework for heterogeneous mobile ad hoc networks Security and Communication Networks. 8: 418-430. DOI: 10.1002/Sec.990 |
0.329 |
|
2014 |
Jafarian JH, Al-Shaer E, Duan Q. Spatio-temporal address mutation for proactive cyber agility against sophisticated attackers Proceedings of the Acm Conference On Computer and Communications Security. 2014: 69-78. DOI: 10.1145/2663474.2663483 |
0.318 |
|
2014 |
Gillani SF, Demirci M, Al-Shaer E, Ammar MH. Problem localization and quantification using formal evidential reasoning for virtual networks Ieee Transactions On Network and Service Management. 11: 307-320. DOI: 10.1109/Tnsm.2014.2326297 |
0.453 |
|
2014 |
Ali MQ, Al-Shaer E, Samak T. Firewall policy reconnaissance: Techniques and analysis Ieee Transactions On Information Forensics and Security. 9: 296-308. DOI: 10.1109/Tifs.2013.2296874 |
0.366 |
|
2014 |
Ashfaq AB, Rizvi S, Javed M, Khayam SA, Ali MQ, Al-Shaer E. Information theoretic feature space slicing for statistical anomaly detection Journal of Network and Computer Applications. 41: 473-487. DOI: 10.1016/J.Jnca.2014.01.002 |
0.314 |
|
2013 |
Ali MQ, Al-Shaer E, Khan H, Khayam SA. Automated anomaly detector adaptation using adaptive threshold tuning Acm Transactions On Information and System Security. 15. DOI: 10.1145/2445566.2445569 |
0.431 |
|
2013 |
Rahman MA, Al-Shaer E, Bera P. A noninvasive threat analyzer for advanced metering infrastructure in smart grid Ieee Transactions On Smart Grid. 4: 273-287. DOI: 10.1109/Tsg.2012.2228283 |
0.323 |
|
2013 |
Duan Q, Al-Shaer E. Traffic-aware dynamic firewall policy management: Techniques and applications Ieee Communications Magazine. 51: 73-79. DOI: 10.1109/Mcom.2013.6553681 |
0.388 |
|
2013 |
Duan Q, Al-Shaer E, Jafarian H. Efficient random route mutation considering flow and network constraints 2013 Ieee Conference On Communications and Network Security, Cns 2013. 260-268. DOI: 10.1109/CNS.2013.6682715 |
0.311 |
|
2013 |
Tozal ME, Wang Y, Al-Shaer E, Sarac K, Thuraisingham B, Chu BT. Adaptive information coding for secure and reliable wireless telesurgery communications Mobile Networks and Applications. 18: 697-711. DOI: 10.1007/S11036-011-0333-3 |
0.41 |
|
2013 |
Jafarian JH, Al-Shaer E, Duan Q. Formal approach for route agility against persistent attackers Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8134: 237-254. DOI: 10.1007/978-3-642-40203-6_14 |
0.335 |
|
2012 |
Samak T, Al-Shaer E. Fuzzy conflict analysis for QoS policy parameters in DiffServ networks Ieee Transactions On Network and Service Management. 9: 459-472. DOI: 10.1109/Tnsm.2012.062512.120308 |
0.378 |
|
2012 |
Gillani F, Al-Shaer E, Ammar M, Demirci M. Fine-grain diagnosis of overlay performance anomalies using end-point network experiences Proceedings of the 2012 8th International Conference On Network and Service Management, Cnsm 2012. 91-99. |
0.371 |
|
2011 |
Al-Shaer E, Alsaleh MN. ConfigChecker: A tool for comprehensive security configuration analytics 2011 4th Symposium On Configuration Analytics and Automation, Safeconfig 2011. DOI: 10.1109/SafeConfig.2011.6111667 |
0.318 |
|
2011 |
Ahmed MS, Al-Shaer E, Taibah M, Khan L. Objective risk evaluation for automated security management Journal of Network and Systems Management. 19: 343-366. DOI: 10.1007/S10922-010-9177-6 |
0.369 |
|
2011 |
Salah K, Sattar K, Sqalli M, Al-Shaer E. A potential low-rate DoS attack against network firewalls Security and Communication Networks. 4: 136-146. DOI: 10.1002/Sec.118 |
0.41 |
|
2010 |
Abedin M, Nessa S, Khan L, Al-Shaer E, Awad M. Analysis of firewall policy rules using traffic mining techniques International Journal of Internet Protocol Technology. 5: 3-22. DOI: 10.1504/Ijipt.2010.032611 |
0.406 |
|
2009 |
Al-Shaer E, Marrero W, El-Atawy A, ElBadawi K. Network configuration in a box: Towards end-to-end verification of network reachability and security Proceedings - International Conference On Network Protocols, Icnp. 123-132. DOI: 10.1109/ICNP.2009.5339690 |
0.312 |
|
2009 |
Smith K, Al-Shaer E, Elbadawi K. Information theoretic approach for characterizing spam botnets based on traffic properties Ieee International Conference On Communications. DOI: 10.1109/ICC.2009.5199083 |
0.335 |
|
2008 |
Roychoudhuri L, Al-Shaer ES. Autonomic QoS optimization of real-time internet audio using loss prediction and stochastic control Noms 2008 - Ieee/Ifip Network Operations and Management Symposium: Pervasive Management For Ubiquitous Networks and Services. 73-80. DOI: 10.1109/NOMS.2008.4575119 |
0.772 |
|
2008 |
Al-Shaer E, Kalmanek CR, Wu F. Automated security configuration management Journal of Network and Systems Management. 16: 231-233. DOI: 10.1007/S10922-008-9105-1 |
0.335 |
|
2008 |
Yan Y, El-Atawy A, Al-Shaer E. A game-theoretic model for capacity-constrained fair bandwidth allocation International Journal of Network Management. 18: 485-504. DOI: 10.1002/Nem.709 |
0.425 |
|
2007 |
Tang Y, Al-Shaer E, Zhang B. Toward globally optimal event monitoring & aggregation for large-scale overlay networks 10th Ifip/Ieee International Symposium On Integrated Network Management 2007, Im '07. 236-245. DOI: 10.1109/INM.2007.374788 |
0.303 |
|
2007 |
El-Atawy A, Samak T, Al-Shaer E, Hong L. Using online traffic statistical matching for optimizing packet filtering performance Proceedings - Ieee Infocom. 866-874. DOI: 10.1109/INFCOM.2007.106 |
0.308 |
|
2006 |
Taibah MM, Al-Shaer E, Boutaba R. An architecture for an email worm prevention system 2006 Securecomm and Workshops. DOI: 10.1109/SECCOMW.2006.359559 |
0.311 |
|
2006 |
Hamed H, Al-Shaer E. Taxonomy of conflicts in network security policies Ieee Communications Magazine. 44: 134-141. DOI: 10.1109/Mcom.2006.1607877 |
0.357 |
|
2006 |
Hamed H, El-Atawy A, Al-Shaer E. On dynamic optimization of packet matching in high-speed firewalls Ieee Journal On Selected Areas in Communications. 24: 1817-1830. DOI: 10.1109/Jsac.2006.877140 |
0.445 |
|
2006 |
Hamed H, El-Atawy A, Al-Shaer E. Adaptive statistical optimization techniques for firewall packet filtering Proceedings - Ieee Infocom. DOI: 10.1109/INFOCOM.2006.129 |
0.31 |
|
2006 |
Roychoudhuri L, Al-Shaer E, Brewster GB. On the impact of loss and delay variation on Internet packet audio transmission Computer Communications. 29: 1578-1589. DOI: 10.1016/J.Comcom.2006.04.004 |
0.783 |
|
2006 |
Boutaba R, Al-Shaer E, Almeroth K. Special issue: monitoring and measurements of IP networks Computer Communications. 29: 1561-1563. DOI: 10.1016/J.Comcom.2005.07.007 |
0.359 |
|
2005 |
Al-Shaer E, Hamed H, Boutaba R, Hasan M. Conflict classification and analysis of distributed firewall policies Ieee Journal On Selected Areas in Communications. 23: 2069-2083. DOI: 10.1109/Jsac.2005.854119 |
0.339 |
|
2005 |
Roychoudhuri L, Al-Shaer ES. Real-time audio quality evaluation for adaptive multimedia protocols Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3754: 133-144. DOI: 10.1007/11572831_12 |
0.776 |
|
2004 |
Roychoudhuri L, Al-Shaer ES. Real-time analysis of delay variation for packet loss prediction Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3271: 213-227. DOI: 10.1007/978-3-540-30189-9_18 |
0.773 |
|
2004 |
Roychoudhuri L, Al-Shaer ES. Adaptive rate control for real-time packet audio based on loss prediction Globecom - Ieee Global Telecommunications Conference. 2: 634-638. |
0.787 |
|
2003 |
Roychoudhuri L, Al-Shaer E, Hamed H, Brewster GB. Audio transmission over the Internet: Experiments and observations Ieee International Conference On Communications. 1: 552-556. |
0.762 |
|
2002 |
Roychoudhuri L, Al-Shaer E, Hamed H, Brewster GB. On studying the impact of the Internet delays on audio transmission 2002 Ieee Workshop On Ip Operations and Management, Ipom 2002. 208-213. DOI: 10.1109/IPOM.2002.1045781 |
0.785 |
|
2002 |
Al-Shaer E, Tang Y. QoS Path Monitoring for Multicast Networks Journal of Network and Systems Management. 10: 357-381. DOI: 10.1023/A:1019814627444 |
0.483 |
|
2002 |
Al-Shaer E, Tang Y. SMRM: SNMP-based multicast reachability monitoring Ieee Symposium Record On Network Operations and Management Symposium. 467-482. |
0.352 |
|
2001 |
Al-Shaer E, Tang Y. Toward integrating IP multicasting in internet network management protocols Computer Communications. 24: 473-485. DOI: 10.1016/S0140-3664(00)00296-6 |
0.347 |
|
Show low-probability matches. |