Ehab Al-Shaer

According to our database1, Ehab Al-Shaer authored at least 200 papers between 1997 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
A Formal Approach for Efficient Navigation Management of Hybrid Electric Vehicles on Long Trips.
CoRR, 2019

Security design against stealthy attacks on power system state estimation: A formal approach.
Computers & Security, 2019

IoTC2: A Formal Method Approach for Detecting Conflicts in Large Scale IoT Systems.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019

A formal verification of mutation-based moving target defense.
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, 2019

CLIPS/ActiveSDN for automated and safe cybersecurity course-of-actions orchestration.
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, 2019

Learning APT chains from cyber threat intelligence.
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, 2019

Cyber defense matrix: a new model for optimal composition of cybersecurity controls to construct resilient risk mitigation.
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, 2019

Measures and metrics for the enforcement of critical security controls: a case study of boundary defense.
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, 2019

ThreatZoom: neural network for automated vulnerability mitigation.
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, 2019

"What", "Where", and "Why" Cybersecurity Controls to Enforce for Optimal Risk Mitigation.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

Autonomous Cyber Deception - Reasoning, Adaptive Planning, and Evaluation of HoneyThings
Springer, ISBN: 978-3-030-02110-8, 2019

2018
IoTC2: A Formal Method Approach for Detecting Conflicts in Large Scale IoT Systems.
CoRR, 2018

PhishMon: A Machine Learning Framework for Detecting Phishing Webpages.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

Using Entropy and Mutual Information to Extract Threat Actions from Cyber Threat Intelligence.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

Verifying the Enforcement and Effectiveness of Network Lateral Movement Resistance Techniques.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

A Poisoning Attack Against Cryptocurrency Mining Pools.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018

CONCEAL: A Strategy Composition for Resilient Cyber Deception-Framework, Metrics and Deployment.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

In-design Resilient SDN Control Plane and Elastic Forwarding Against Aggressive DDoS Attacks.
Proceedings of the 5th ACM Workshop on Moving Target Defense, 2018

gExtractor: Towards Automated Extraction of Malware Deception Parameters.
Proceedings of the 8th Software Security, 2018

2017
Automated Synthesis of Distributed Network Access Controls: A Formal Framework with Refinement.
IEEE Trans. Parallel Distrib. Syst., 2017

Secure and Private Data Aggregation for Energy Consumption Scheduling in Smart Grids.
IEEE Trans. Dependable Sec. Comput., 2017

A Novel Class of Robust Covert Channels Using Out-of-Order Packets.
IEEE Trans. Dependable Sec. Comput., 2017

ROI-Driven Cyber Risk Mitigation Using Host Compliance and Network Configuration.
J. Network Syst. Manage., 2017

Data-driven analytics for cyber-threat intelligence and information sharing.
Computers & Security, 2017

IoTChecker: A data-driven framework for security analytics of Internet of Things configurations.
Computers & Security, 2017

Predicting Zero-day Malicious IP Addresses.
Proceedings of the 2017 Workshop on Automated Decision Making for Active Cyber Defense, 2017

Prioritized active learning for malicious URL detection using weighted text-based features.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017

Characterizing Scientific Reporting in Security Literature: An analysis of ACM CCS and IEEE S&P Papers.
Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp, HoTSoS 2017, 2017

TTPDrill: Automatic and Accurate Extraction of Threat Actions from Unstructured Text of CTI Sources.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Security and Resiliency Analytics for Smart Grids - Static and Dynamic Approaches
Advances in Information Security 67, Springer, ISBN: 978-3-319-32871-3, 2016

Economic metric to improve spam detectors.
J. Network and Computer Applications, 2016

Towards Automated Verification of Active Cyber Defense Strategies on Software Defined Networks.
Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense, 2016

Strategic Cyber Threat Intelligence Sharing: A Case Study of IDS Logs.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

Formal Analysis for Dependable Supervisory Control and Data Acquisition in Smart Grids.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

Optimizing the RoI of cyber risk mitigation.
Proceedings of the 12th International Conference on Network and Service Management, 2016

Automated synthesis of resiliency configurations for cyber networks.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

IoTSAT: A formal framework for security analysis of the internet of things (IoT).
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

Formal Approach for Resilient Reachability based on End-System Route Agility.
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 2016

Multi-dimensional Host Identity Anonymization for Defeating Skilled Attackers.
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 2016

A Cyber Mutation: Metrics, Techniques and Future Directions.
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 2016

Agile Virtual Infrastructure for Cyber Deception Against Stealthy DDoS Attacks.
Proceedings of the Cyber Deception, Building the Scientific Foundation, 2016

2015
Attribution, Temptation, and Expectation: A Formal Framework for Defense-by-Deception in Cyberwarfare.
Proceedings of the Cyber Warfare - Building the Scientific Foundation, 2015

Randomization-Based Intrusion Detection System for Advanced Metering Infrastructure.
ACM Trans. Inf. Syst. Secur., 2015

An Effective Address Mutation Approach for Disrupting Reconnaissance Attacks.
IEEE Trans. Information Forensics and Security, 2015

PoliCon: a policy conciliation framework for heterogeneous mobile ad hoc networks.
Security and Communication Networks, 2015

Formal integrated network security analysis tool: formal query-based network security configuration analysis.
IET Networks, 2015

Formal synthesis of dependable configurations for advanced metering infrastructures.
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015

Automated Decision Making for Active Cyber Defense: Panel Discussion.
Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense, 2015

Cyber Resilience-by-Construction: Modeling, Measuring & Verifying.
Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense, 2015

Adversary-aware IP address randomization for proactive agility against sophisticated attackers.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Agile virtualized infrastructure to proactively defend against cyber attacks.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Towards a science of anomaly detection system evasion.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

SafeConfig 2015: Workshop on Automated Decision Making for Active Cyber Defense.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Problem Localization and Quantification Using Formal Evidential Reasoning for Virtual Networks.
IEEE Trans. Network and Service Management, 2014

Firewall Policy Reconnaissance: Techniques and Analysis.
IEEE Trans. Information Forensics and Security, 2014

Information theoretic feature space slicing for statistical anomaly detection.
J. Network and Computer Applications, 2014

On DDoS Attack Related Minimum Cut Problems.
CoRR, 2014

Improving Efficiency of Spam Detection using Economic Model.
Proceedings of the 2014 Workshop on Cyber Security Analytics, 2014

Enterprise Risk Assessment Based on Compliance Reports and Vulnerability Scoring Systems.
Proceedings of the 2014 Workshop on Cyber Security Analytics, 2014

Impact Analysis of Topology Poisoning Attacks on Economic Operation of the Smart Power Grid.
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014

A formal model for verifying the impact of stealthy attacks on optimal power flow in power grids.
Proceedings of the ACM/IEEE International Conference on Cyber-Physical Systems, 2014

Security Threat Analytics and Countermeasure Synthesis for Power System State Estimation.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

Security configuration analytics using video games.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Two-tier data-driven intrusion detection for automatic generation control in smart grid.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Moving Target Defense for Hardening the Security of the Power System State Estimation.
Proceedings of the First ACM Workshop on Moving Target Defense, 2014

Spatio-temporal Address Mutation for Proactive Cyber Agility against Sophisticated Attackers.
Proceedings of the First ACM Workshop on Moving Target Defense, 2014

Summary Abstract for the 7th ACM International Workshop on Cyber Security Analytics, Intelligence and Automation.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Automated Firewall Analytics - Design, Configuration and Optimization
Springer, ISBN: 978-3-319-10371-6, 2014

2013
A Noninvasive Threat Analyzer for Advanced Metering Infrastructure in Smart Grid.
IEEE Trans. Smart Grid, 2013

Automated Anomaly Detector Adaptation using Adaptive Threshold Tuning.
ACM Trans. Inf. Syst. Secur., 2013

Adaptive Information Coding for Secure and Reliable Wireless Telesurgery Communications.
MONET, 2013

Traffic-aware dynamic firewall policy management: techniques and applications.
IEEE Communications Magazine, 2013

A formal model for verifying stealthy attacks on state estimation in power grids.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013

Randomizing AMI configuration for proactive defense in smart grid.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013

Probabilistic model checking for AMI intrusion detection.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013

Metrics for Automated Network Security Design.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

SensorChecker: reachability verification in mission-oriented sensor networks.
Proceedings of the 2nd ACM annual international workshop on Mission-oriented wireless sensor networking, 2013

A formal approach for network security management based on qualitative risk analysis.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

A Formal Framework for Network Security Design Synthesis.
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013

Energy efficient navigation management for hybrid electric vehicles on highways.
Proceedings of the ACM/IEEE 4th International Conference on Cyber-Physical Systems (with CPS Week 2013), 2013

Overlay network placement for diagnosability.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Formal Approach for Route Agility against Persistent Attackers.
Proceedings of the Computer Security - ESORICS 2013, 2013

A formal approach for virtual machine migration planning.
Proceedings of the 9th International Conference on Network and Service Management, 2013

A game-theoretic approach for deceiving Remote Operating System Fingerprinting.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Efficient Random Route Mutation considering flow and network constraints.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Objective metrics for firewall security: A holistic view.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

A formal model for sustainable vehicle-to-grid management.
Proceedings of the SEGS'13, 2013

Revisiting anomaly detection system design philosophy.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Configuration-based IDS for advanced metering infrastructure.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Private and Anonymous Data Storage and Distribution in Cloud.
Proceedings of the 2013 IEEE International Conference on Services Computing, Santa Clara, CA, USA, June 28, 2013

Security-Aware Resource Allocation in Clouds.
Proceedings of the 2013 IEEE International Conference on Services Computing, Santa Clara, CA, USA, June 28, 2013

2012
Reasoning under Uncertainty for Overlay Fault Diagnosis.
IEEE Trans. Network and Service Management, 2012

Fuzzy Conflict Analysis for QoS Policy Parameters in DiffServ Networks.
IEEE Trans. Network and Service Management, 2012

Secure Distributed Solution for Optimal Energy Consumption Scheduling in Smart Grid.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Openflow random host mutation: transparent moving target defense using software defined networking.
Proceedings of the first workshop on Hot topics in software defined networks, 2012

Random Host Mutation for Moving Target Defense.
Proceedings of the Security and Privacy in Communication Networks, 2012

A Declarative Logic-Based Approach for Threat Analysis of Advanced Metering Infrastructure.
Proceedings of the Automated Security Management [papers from SafeConfig 2012, 2012

Towards a Unified Modeling and Verification of Network and System Security Configurations.
Proceedings of the Automated Security Management [papers from SafeConfig 2012, 2012

An evasive attack on SNORT flowbits.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

On stochastic risk ordering of network services for proactive security management.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

SmartAnalyzer: A noninvasive security threat analyzer for AMI smart grid.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Anomaly Discovery and Resolution in MySQL Access Control Policies.
Proceedings of the Database and Expert Systems Applications, 2012

Fine-grain diagnosis of overlay performance anomalies using end-point network experiences.
Proceedings of the 8th International Conference on Network and Service Management, 2012

Provable configuration planning for wireless sensor networks.
Proceedings of the 8th International Conference on Network and Service Management, 2012

Monetizing spambot activity and understanding its relation with spambot traffic features.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
Toward Network Configuration Randomization for Moving Target Defense.
Proceedings of the Moving Target Defense, 2011

Firewalls.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

A potential low-rate DoS attack against network firewalls.
Security and Communication Networks, 2011

Objective Risk Evaluation for Automated Security Management.
J. Network Syst. Manage., 2011

Build and Test Your Own Network Configuration.
Proceedings of the Security and Privacy in Communication Networks, 2011

AMIAnalyzer: Security analysis of AMI configurations.
Proceedings of the 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31, 2011

Towards Eliminating Configuration Errors in Cyber Infrastructure.
Proceedings of the 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31, 2011

SCAP Based Configuration Analytics for Comprehensive Compliance Checking.
Proceedings of the 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31, 2011

ConfigChecker: A tool for comprehensive security configuration analytics.
Proceedings of the 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31, 2011

Measuring Firewall Security.
Proceedings of the 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31, 2011

CloudChecker: An imperative framework for cloud configuration management.
Proceedings of the 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31, 2011

QoS policy verification for DiffServ networks.
Proceedings of the 19th International Workshop on Quality of Service, 2011

A declarative approach for global network security configuration verification and evaluation.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

On synthesizing distributed firewall configurations considering risk, usability and cost constraints.
Proceedings of the 7th International Conference on Network and Service Management, 2011

2010
Analysis of firewall policy rules using traffic mining techniques.
IJIPT, 2010

Autonomic QoS Optimization of Real-Time Internet Audio Using Loss Prediction and Stochastic Control.
IJARAS, 2010

FlowChecker: configuration analysis and verification of federated openflow infrastructures.
Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration, 2010

Automated management of network access control from design to enforcement.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

Towards Automatic Creation of Usable Security Configuration.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Synthetic security policy generation via network traffic clustering.
Proceedings of the 3rd ACM Workshop on Security and Artificial Intelligence, 2010

2009
Automated pseudo-live testing of firewall configuration enforcement.
IEEE Journal on Selected Areas in Communications, 2009

New frontiers in internet network management.
Computer Communication Review, 2009

Towards network security policy generation for configuration analysis and testing.
Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, 2009

Community-base Fault Diagnosis Using Incremental Belief Revision.
Proceedings of the International Conference on Networking, Architecture, and Storage, 2009

Overlay Fault Diagnosis Based on Evidential Reasoning.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Adaptive Early Packet Filtering for Defending Firewalls Against DoS Attacks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Building Covert Channels over the Packet Reordering Phenomenon.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Optimizing correlation structure of event services considering time and capacity constraints.
Proceedings of the Integrated Network Management, 2009

Network Configuration in A Box: Towards End-to-End Verification of Network Reachability and Security.
Proceedings of the 17th annual IEEE International Conference on Network Protocols, 2009

Information Theoretic Approach for Characterizing Spam Botnets Based on Traffic Properties.
Proceedings of IEEE International Conference on Communications, 2009

Sharing end-user negative symptoms for improving overlay network dependability.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

TimeVM: a framework for online intrusion mitigation and fast recovery using multi-time-lag traffic replay.
Proceedings of the 2009 ACM Symposium on Information, 2009

2008
Efficient fault diagnosis using incremental alarm correlation and active investigation for internet and overlay networks.
IEEE Trans. Network and Service Management, 2008

Automated Security Configuration Management.
J. Network Syst. Manage., 2008

A game-theoretic model for capacity-constrained fair bandwidth allocation.
Int. Journal of Network Management, 2008

Correlation-based load balancing for network intrusion detection and prevention systems.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

QoS Policy Modeling and Conflict Analysis.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008

Autonomic QoS optimization of real-time internet audio using loss prediction and stochastic control.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

Alert prioritization in Intrusion Detection Systems.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

Designing, optimizing, and evaluating network security configuration.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

Towards autonomic risk-aware security configuration.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

Towards Collaborative User-Level Overlay Fault Diagnosis.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

A Novel Quantitative Approach For Measuring Network Security.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

2007
Specifications of a high-level conflict-free firewall policy language for multi-domain networks.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

An Automated Framework for Validating Firewall Policy Enforcement.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007

PolicyVis: Firewall Security Policy Visualization and Inspection.
Proceedings of the 21th Large Installation System Administration Conference, 2007

Ranking-Based Optimal Resource Allocation in Peer-to-Peer Networks.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Using Online Traffic Statistical Matching for Optimizing Packet Filtering Performance.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Toward Globally Optimal Event Monitoring & Aggregation For Large-scale Overlay Networks.
Proceedings of the Integrated Network Management, 2007

FireCracker: A Framework for Inferring Firewall Policies using Smart Probing.
Proceedings of the IEEE International Conference on Network Protocols, 2007

A Novel Visualization Approach for Efficient Network-wide Traffic Monitoring.
Proceedings of the Fifth IEEE/IFIP Workshop on End-to-End Monitoring Techniques and Services, 2007

Self-organizing Monitoring Agents for Hierarchical Event Correlation.
Proceedings of the Managing Virtualization of Networks and Services, 2007

2006
On Dynamic Optimization of Packet Matching in High-Speed Firewalls.
IEEE Journal on Selected Areas in Communications, 2006

On autonomic optimization of firewall policy organization.
J. High Speed Networks, 2006

On the impact of loss and delay variation on Internet packet audio transmission.
Computer Communications, 2006

Special issue: monitoring and measurements of IP networks.
Computer Communications, 2006

Taxonomy of conflicts in network security policies.
IEEE Communications Magazine, 2006

An Architecture for an Email Worm Prevention System.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

Fair Bandwidth Allocation under User Capacity Constraints.
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006

Analysis of Firewall Policy Rules Using Data Mining Techniques.
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006

Email Worm Detection Using Naïve Bayes and Support Vector Machine.
Proceedings of the Intelligence and Security Informatics, 2006

Adaptive Statistical Optimization Techniques for Firewall Packet Filtering.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

Dynamic rule-ordering optimization for high-speed firewall filtering.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

Vulnerability analysis For evaluating quality of protection of security policies.
Proceedings of the 2nd ACM Workshop on Quality of Protection, 2006

2005
Real-time packet loss prediction based on end-to-end delay variation.
IEEE Trans. Network and Service Management, 2005

Conflict classification and analysis of distributed firewall policies.
IEEE Journal on Selected Areas in Communications, 2005

Real-Time Audio Quality Evaluation for Adaptive Multimedia Protocols.
Proceedings of the Management of Multimedia Networks and Services, 2005

Active integrated fault localization in communication networks.
Proceedings of the Integrated Network Management, 2005

Modeling and Verification of IPSec and VPN Security Policies.
Proceedings of the 13th IEEE International Conference on Network Protocols (ICNP 2005), 2005

2004
Modeling and Management of Firewall Policies.
IEEE Trans. Network and Service Management, 2004

MRMON: remote multicast monitoring.
Proceedings of the Managing Next Generation Convergence Networks and Services, 2004

Managing firewall and network-edge security policies.
Proceedings of the Managing Next Generation Convergence Networks and Services, 2004

Real-time Analysis of Delay Variation for Packet Loss Prediction.
Proceedings of the Management of Multimedia Networks and Services: 7th IFIP/IEEE International Conference, 2004

Discovery of Policy Anomalies in Distributed Firewalls.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

Adaptive rate control for real-time packet audio based on loss prediction.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

HiFi+: A Monitoring Virtual Machine for Autonomic Distributed Management.
Proceedings of the Utility Computing: 15th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, 2004

2003
Architecture for Efficient Monitoring and Management of Sensor Networks.
Proceedings of the Management of Multimedia Networks and Services, 2003

Firewall Policy Advisor for Anomaly Discovery and Rule Editing.
Proceedings of the Integrated Network Management VII, Managing It All, 2003

Audio transmission over the Internet: experiments and observations.
Proceedings of IEEE International Conference on Communications, 2003

Management and translation of filtering security policies.
Proceedings of IEEE International Conference on Communications, 2003

2002
QoS Path Monitoring for Multicast Networks.
J. Network Syst. Manage., 2002

SMRM: SNMP-based multicast reachability monitoring.
Proceedings of the Management Solutions for the New Communications World, 2002

2001
Toward integrating IP multicasting in internet network management protocols.
Computer Communications, 2001

A Dynamic Group Management Framework for Large-scale Distributed Event Monitoring.
Proceedings of the 2001 IEEE/IFIP International Symposium on Integrated Network Management, 2001

2000
Active Management Framework for Distributed Multimedia Systems.
J. Network Syst. Manage., 2000

Adaptive object-oriented filtering framework for event management applications.
ACM Comput. Surv., 2000

Integrating IP Multicasting in Standard Network Management Protocols.
Proceedings of the Managing QoS in Multimedia Networks and Services, IEEE/IFIP TC6, 2000

1999
Dynamic Monitoring Approach for Multi-poin Multimedia Systems.
Networking and Information Systems, 1999

HiFi: A New Monitoring Architecture for Distributed Systems Management.
Proceedings of the 19th International Conference on Distributed Computing Systems, Austin, TX, USA, May 31, 1999

Programmable Agents for Active Distributed Monitoring.
Proceedings of the Active Technologies for Network and Service Management, 1999

1997
Interactive Distance Learning over Intranets.
IEEE Internet Computing, 1997

Reliability, Scalability and Robustness Issues in IRI*.
Proceedings of the 6th Workshop on Enabling Technologies (WET-ICE '97), 1997

A scalable monitoring architecture for managing distributed multimedia systems.
Proceedings of the Management of Multimedia Networks and Services, 1997

Application-Layer Group Communication Server for Extending Reliable Multicast Protocols Services.
Proceedings of the 1997 International Conference on Network Protocols (ICNP '97), 1997

Event Filtering Framework: Key Criteria and Design Trade-offs.
Proceedings of the 21st International Computer Software and Applications Conference (COMPSAC '97), 1997


  Loading...