Mohammed H. Sqalli, Ph.D.

Affiliations: 
2002 University of New Hampshire, Durham, NH, United States 
Area:
Computer Science, System Science Engineering
Google:
"Mohammed Sqalli"

Parents

Sign in to add mentor
Eugene Freuder grad student 2002 UNH
 (Diagnosing interoperability problems and debugging models by enhancing constraint satisfaction with case -based reasoning.)
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Sattar K, Salah K, Sqalli M, et al. (2017) A Delay-Based Countermeasure Against the Discovery of Default Rules in Firewalls Arabian Journal For Science and Engineering. 42: 833-844
Al-Haidari F, Salah K, Sqalli M, et al. (2017) Performance Modeling and Analysis of the EDoS-Shield Mitigation Arabian Journal For Science and Engineering. 42: 793-804
Alsowail S, Sqalli MH, Abu-Amara MH, et al. (2016) An Experimental Evaluation of the EDoS-Shield Mitigation Technique for Securing the Cloud Arabian Journal For Science and Engineering. 41: 5037-5047
Al-Haidari F, Sqalli M, Salah K. (2015) Evaluation of the Impact of EDoS Attacks Against Cloud Computing Services Arabian Journal For Science and Engineering. 40: 773-785
Sqalli MH, Firdous SN, Salah K, et al. (2013) Classifying malicious activities in Honeynets using entropy and volume-based thresholds Security and Communication Networks. 6: 567-583
Abu-Amara M, Al-Baiz A, Mahmoud AS, et al. (2013) A scalable NAT-based solution to Internet access denial by higher-tier ISPs Security and Communication Networks. 6: 194-209
Mahmoud AS, Alrefai AS, Abu-Amara M, et al. (2012) Qualitative Analysis of Methods for Circumventing Malicious ISP Blocking Arabian Journal For Science and Engineering. 37: 1911-1928
Sqalli MH, Sait SM, Asadullah S. (2011) Ospf Weight Setting Optimization For Single Link Failures International Journal of Computer Networks & Communications. 3: 168-183
Sqalli MH, Al-Haidari F, Salah K. (2011) EDoS-shield - A two-steps mitigation technique against EDoS attacks in cloud computing Proceedings - 2011 4th Ieee International Conference On Utility and Cloud Computing, Ucc 2011. 49-56
Baig ZA, Khan S, Ahmed S, et al. (2011) A selective parameter-based evolutionary technique for network intrusion detection International Conference On Intelligent Systems Design and Applications, Isda. 65-71
See more...