Basheer Al-Duwairi

According to our database1, Basheer Al-Duwairi authored at least 23 papers between 2003 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
ISDSDN: Mitigating SYN Flood Attacks in Software Defined Networks.
J. Netw. Syst. Manag., 2020

PASSVM: A Highly Accurate Online Fast Flux Detection System.
CoRR, 2020

LogDos: A Novel Logging-based DDoS Prevention Mechanism in Path Identifier-Based Information Centric Networks.
CoRR, 2020

Preventing DDoS attacks in Path Identifiers-Based Information Centric Networks.
Proceedings of the NOMS 2020, 2020

2018
ReCAP: A distributed CAPTCHA service at the edge of the network to handle server overload.
Trans. Emerg. Telecommun. Technol., 2018

Defense Analysis Against Store and Forward Distributed Reflective Denial of Service Attacks.
Proceedings of the 2018 International Conference on Innovations in Information Technology (IIT), 2018

2015
Handling System Overload Resulting from DDoS Attacks and Flash Crowd Events.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

GFlux: A google-based system for Fast Flux detection.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
DDoS protection as a service: hiding behind the giants.
Int. J. Comput. Sci. Eng., 2014

2013
A Novel Scheme for Mitigating Botnet-Based DDoS Attacks.
J. Networks, 2013

A Model Curriculum for Undergraduate Program in IT SSME.
Int. J. Serv. Sci. Manag. Eng. Technol., 2013

2011
Texture Analysis-Based Image Spam Filtering.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

2010
Request diversion: a novel mechanism to counter P2P based DDoS attacks.
Int. J. Internet Protoc. Technol., 2010

2009
JUST-Google: A Search Engine-Based Defense Against Botnet-Based DDoS Attacks.
Proceedings of IEEE International Conference on Communications, 2009

2006
Novel Hybrid Schemes Employing Packet Marking and Logging for IP Traceback.
IEEE Trans. Parallel Distributed Syst., 2006

Distributed packet pairing for reflector based DDoS attack mitigation.
Comput. Commun., 2006

2005
Victim-Assisted Mitigation Technique for TCP-Based Reflector DDoS Attacks.
Proceedings of the NETWORKING 2005: Networking Technologies, 2005

Intentional dropping: a novel scheme for SYN flooding mitigation.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

Internet Infrastructure Security.
Proceedings of the 13th Annual IEEE Symposium on High Performance Interconnects (HOTIC 2005), 2005

2004
An Efficient Probabilistic Packet Marking Scheme for IP Traceback.
Proceedings of the NETWORKING 2004, 2004

A Novel Packet Marking Scheme for IP Traceback.
Proceedings of the 10th International Conference on Parallel and Distributed Systems, 2004

Topology Based Packet Marking.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 2004), 2004

2003
Combined Scheduling of Hard and Soft Real-Time Tasks in Multiprocessor Systems.
Proceedings of the High Performance Computing - HiPC 2003, 10th International Conference, 2003


  Loading...