Youssif Al-Nashif, Ph.D.

Affiliations: 
2008 Electrical & Computer Engineering University of Arizona, Tucson, AZ 
Area:
Electronics and Electrical Engineering, Computer Science
Google:
"Youssif Al-Nashif"

Parents

Sign in to add mentor
Salim Hariri grad student 2008 University of Arizona
 (Multi-level anomaly based autonomic intrusion detection system.)
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Blasch E, Badr Y, Hariri S, et al. (2016) Fusion trust service assessment for crisis management environments Fusion Methodologies in Crisis Management: Higher Level Fusion and Decision Making. 389-420
Alipour H, Al-Nashif YB, Satam P, et al. (2015) Wireless Anomaly Detection Based on IEEE 802.11 Behavior Analysis Ieee Transactions On Information Forensics and Security. 10: 2158-2170
Tunc C, Hariri S, Montero FDLP, et al. (2015) Teaching and Training Cybersecurity as a Cloud Service Proceedings - 2015 International Conference On Cloud and Autonomic Computing, Iccac 2015. 302-308
Satam P, Alipour H, Al-Nashif Y, et al. (2015) DNS-IDS: Securing DNS in the Cloud Era Proceedings - 2015 International Conference On Cloud and Autonomic Computing, Iccac 2015. 296-301
Fargo F, Tunc C, Al-Nashif Y, et al. (2015) Autonomic workload and resources management of cloud computing services Proceedings - 2014 International Conference On Cloud and Autonomic Computing, Iccac 2014. 101-110
Tunc C, Fargo F, Al-Nashif Y, et al. (2015) Autonomic Resilient Cloud Management (ARCM) design and evaluation Proceedings - 2014 International Conference On Cloud and Autonomic Computing, Iccac 2014. 44-49
Badr Y, Hariri S, Al-Nashif Y, et al. (2015) Resilient and trustworthy dynamic data-driven application systems (DDDAS) services for crisis management environments Procedia Computer Science. 51: 2623-2627
Pan Z, Hariri S, Al-Nashif Y. (2014) Anomaly based intrusion detection for Building Automation and Control networks Proceedings of Ieee/Acs International Conference On Computer Systems and Applications, Aiccsa. 2014: 72-77
Bai J, Hariri S, Al-Nashif Y. (2014) A Network Protection Framework for DNP3 over TCP/IP protocol Proceedings of Ieee/Acs International Conference On Computer Systems and Applications, Aiccsa. 2014: 9-15
Blasch E, Al-Nashif Y, Hariri S. (2014) Static versus dynamic data information fusion analysis using DDDAS for cyber security trust Procedia Computer Science. 29: 1299-1313
See more...