Mohammed H. Sqalli, Ph.D.
Affiliations: | 2002 | University of New Hampshire, Durham, NH, United States |
Area:
Computer Science, System Science EngineeringGoogle:
"Mohammed Sqalli"Parents
Sign in to add mentorEugene Freuder | grad student | 2002 | UNH | |
(Diagnosing interoperability problems and debugging models by enhancing constraint satisfaction with case -based reasoning.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Sattar K, Salah K, Sqalli M, et al. (2017) A Delay-Based Countermeasure Against the Discovery of Default Rules in Firewalls Arabian Journal For Science and Engineering. 42: 833-844 |
Al-Haidari F, Salah K, Sqalli M, et al. (2017) Performance Modeling and Analysis of the EDoS-Shield Mitigation Arabian Journal For Science and Engineering. 42: 793-804 |
Alsowail S, Sqalli MH, Abu-Amara MH, et al. (2016) An Experimental Evaluation of the EDoS-Shield Mitigation Technique for Securing the Cloud Arabian Journal For Science and Engineering. 41: 5037-5047 |
Al-Haidari F, Sqalli M, Salah K. (2015) Evaluation of the Impact of EDoS Attacks Against Cloud Computing Services Arabian Journal For Science and Engineering. 40: 773-785 |
Sqalli MH, Firdous SN, Salah K, et al. (2013) Classifying malicious activities in Honeynets using entropy and volume-based thresholds Security and Communication Networks. 6: 567-583 |
Abu-Amara M, Al-Baiz A, Mahmoud AS, et al. (2013) A scalable NAT-based solution to Internet access denial by higher-tier ISPs Security and Communication Networks. 6: 194-209 |
Mahmoud AS, Alrefai AS, Abu-Amara M, et al. (2012) Qualitative Analysis of Methods for Circumventing Malicious ISP Blocking Arabian Journal For Science and Engineering. 37: 1911-1928 |
Sqalli MH, Sait SM, Asadullah S. (2011) Ospf Weight Setting Optimization For Single Link Failures International Journal of Computer Networks & Communications. 3: 168-183 |
Sqalli MH, Al-Haidari F, Salah K. (2011) EDoS-shield - A two-steps mitigation technique against EDoS attacks in cloud computing Proceedings - 2011 4th Ieee International Conference On Utility and Cloud Computing, Ucc 2011. 49-56 |
Baig ZA, Khan S, Ahmed S, et al. (2011) A selective parameter-based evolutionary technique for network intrusion detection International Conference On Intelligent Systems Design and Applications, Isda. 65-71 |