Salim Hariri
Affiliations: | Electrical & Computer Engineering | University of Arizona, Tucson, AZ |
Area:
Computer ScienceGoogle:
"Salim Hariri"Children
Sign in to add traineeYeliang Zhang | grad student | 2007 | University of Arizona |
Youssif Al-Nashif | grad student | 2008 | University of Arizona |
Huoping Chen | grad student | 2008 | University of Arizona |
Samer Fayssal | grad student | 2008 | University of Arizona |
Bithika Khargharia | grad student | 2008 | University of Arizona |
Byoung U. Kim | grad student | 2008 | University of Arizona |
Yaser Jararweh | grad student | 2010 | University of Arizona |
Miguel A. Soto Santibanez | grad student | 2010 | University of Arizona |
Donald P. Cox | grad student | 2011 | University of Arizona |
Hamid R. Alipour | grad student | 2013 | University of Arizona |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Kholidy HA, Baiardi F, Hariri S. (2015) DDSGA: A data-driven semi-global alignment approach for detecting masquerade attacks Ieee Transactions On Dependable and Secure Computing. 12: 164-178 |
Badr Y, Hariri S, Al-Nashif Y, et al. (2015) Resilient and trustworthy dynamic data-driven application systems (DDDAS) services for crisis management environments Procedia Computer Science. 51: 2623-2627 |
Chung K, Boutaba R, Hariri S. (2015) Knowledge based decision support system Information Technology and Management |
Pan Z, Hariri S, Al-Nashif Y. (2014) Anomaly based intrusion detection for Building Automation and Control networks Proceedings of Ieee/Acs International Conference On Computer Systems and Applications, Aiccsa. 2014: 72-77 |
Bai J, Hariri S, Al-Nashif Y. (2014) A Network Protection Framework for DNP3 over TCP/IP protocol Proceedings of Ieee/Acs International Conference On Computer Systems and Applications, Aiccsa. 2014: 9-15 |
Blasch E, Al-Nashif Y, Hariri S. (2014) Static versus dynamic data information fusion analysis using DDDAS for cyber security trust Procedia Computer Science. 29: 1299-1313 |
Chung K, Boutaba R, Hariri S. (2014) Recent Trends in Digital Convergence Information System Wireless Personal Communications. 79: 2409-2413 |
Luo Y, Szidarovszky F, Al-Nashif Y, et al. (2014) A fictitious play-based response strategy for multistage intrusion defense systems Security and Communication Networks. 7: 473-491 |
Kurra H, Al-Nashif Y, Hariri S. (2013) Resilient cloud data storage services Acm International Conference Proceeding Series |
Alipour H, Al-Nashif YB, Hariri S. (2013) IEEE 802.11 anomaly-based behavior analysis 2013 International Conference On Computing, Networking and Communications, Icnc 2013. 369-373 |