Adel El-Atawy

Orcid: 0000-0002-6471-178X

According to our database1, Adel El-Atawy authored at least 20 papers between 2006 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2017
A Novel Class of Robust Covert Channels Using Out-of-Order Packets.
IEEE Trans. Dependable Secur. Comput., 2017

2012
Towards a Unified Modeling and Verification of Network and System Security Configurations.
Proceedings of the Automated Security Management [papers from SafeConfig 2012, 2012

End-to-end verification of QoS policies.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

2011
QoS policy verification for DiffServ networks.
Proceedings of the 19th International Workshop on Quality of Service, 2011

2010
An introduction to data structures and algorithms by James A. Storer Birhauser.
SIGACT News, 2010

2009
Review of An introduction to difference equations: third edition by Saber Elaydi.
SIGACT News, 2009

Automated pseudo-live testing of firewall configuration enforcement.
IEEE J. Sel. Areas Commun., 2009

Towards network security policy generation for configuration analysis and testing.
Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, 2009

Adaptive Early Packet Filtering for Defending Firewalls Against DoS Attacks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Building Covert Channels over the Packet Reordering Phenomenon.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Network Configuration in A Box: Towards End-to-End Verification of Network Reachability and Security.
Proceedings of the 17th annual IEEE International Conference on Network Protocols, 2009

2008
A game-theoretic model for capacity-constrained fair bandwidth allocation.
Int. J. Netw. Manag., 2008

2007
An Automated Framework for Validating Firewall Policy Enforcement.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007

Ranking-Based Optimal Resource Allocation in Peer-to-Peer Networks.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Using Online Traffic Statistical Matching for Optimizing Packet Filtering Performance.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

FireCracker: A Framework for Inferring Firewall Policies using Smart Probing.
Proceedings of the IEEE International Conference on Network Protocols, 2007

A Novel Visualization Approach for Efficient Network-wide Traffic Monitoring.
Proceedings of the Fifth IEEE/IFIP Workshop on End-to-End Monitoring Techniques and Services, 2007

2006
On Dynamic Optimization of Packet Matching in High-Speed Firewalls.
IEEE J. Sel. Areas Commun., 2006

Fair Bandwidth Allocation under User Capacity Constraints.
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006

Adaptive Statistical Optimization Techniques for Firewall Packet Filtering.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006


  Loading...