Mohammed H. Sqalli

According to our database1, Mohammed H. Sqalli authored at least 28 papers between 1996 and 2014.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
Interdomain Traffic Engineering Techniques to Overcome Undesirable Connectivity Incidents.
Proceedings of the Network and Parallel Computing, 2014

2013
Classifying malicious activities in Honeynets using entropy and volume-based thresholds.
Secur. Commun. Networks, 2013

A scalable NAT-based solution to Internet access denial by higher-tier ISPs.
Secur. Commun. Networks, 2013

Impact of CPU Utilization Thresholds and Scaling Size on Autoscaling Cloud Resources.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

2012
Enhanced EDoS-Shield for Mitigating EDoS Attacks Originating from Spoofed IP Addresses.
Proceedings of the 11th IEEE International Conference on Trust, 2012

UCloud: A simulated Hybrid Cloud for a university environment.
Proceedings of the 1st IEEE International Conference on Cloud Networking, 2012

2011
A potential low-rate DoS attack against network firewalls.
Secur. Commun. Networks, 2011

OSPF Weight Setting Optimization for Single Link Failures
CoRR, 2011

EDoS-Shield - A Two-Steps Mitigation Technique against EDoS Attacks in Cloud Computing.
Proceedings of the IEEE 4th International Conference on Utility and Cloud Computing, 2011

A selective parameter-based evolutionary technique for network intrusion detection.
Proceedings of the 11th International Conference on Intelligent Systems Design and Applications, 2011

An Entropy and Volume-Based Approach for Identifying Malicious Activities in Honeynet Traffic.
Proceedings of the 2011 International Conference on Cyberworlds, 2011

Identifying Scanning Activities in Honeynet Data Using Data Mining.
Proceedings of the Third International Conference on Computational Intelligence, 2011

Identifying network traffic features suitable for honeynet data analysis.
Proceedings of the 24th Canadian Conference on Electrical and Computer Engineering, 2011

Internet access denial by higher-tier ISPS: A NAT-based solution.
Proceedings of the 24th Canadian Conference on Electrical and Computer Engineering, 2011

Dynamic peer-to-peer (P2P) solution to counter malicious higher Domain Name System (DNS) nameservers.
Proceedings of the 24th Canadian Conference on Electrical and Computer Engineering, 2011

2010
Discovering last-matching rules in popular open-source and commercial firewalls.
Int. J. Internet Protoc. Technol., 2010

A Distributed Honeynet at KFUPM: A Case Study.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

Towards Simulating a Virtual Distributed Honeynet at KFUPM: A Case Study.
Proceedings of the Fourth UKSim European Symposium on Computer Modeling and Simulation, 2010

2009
Resiliency of open-source firewalls against remote discovery of last-matching rules.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

An Entropy-Based Countermeasure against Intelligent DoS Attacks Targeting Firewalls.
Proceedings of the POLICY 2009, 2009

2006
Distributed XML-based network management using JPVM.
Int. J. Netw. Manag., 2006

Modeling and Formal Verification of DHCP Using SPIN.
Int. J. Comput. Sci. Appl., 2006

An Enhanced Estimator to Multi-objective OSPF Weight Setting Problem.
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006

Engineering Evolutionary Algorithm to Solve Multi-objective OSPF Weight Setting Problem.
Proceedings of the AI 2006: Advances in Artificial Intelligence, 2006

2005
Static Weighted Load-Balancing for XML-Based Network Management Using JPVM.
Proceedings of the Management of Multimedia Networks and Services, 2005

2002
Case-Based Reasoning Integrations.
AI Mag., 2002

2001
Constraint-Based Modeling of InterOperability Problems Using an Object-Oriented Approach.
Proceedings of the Thirteenth Innovative Applications of Artificial Intelligence Conference, 2001

1996
Inference-Based Constraint Satisfaction Supports Explanation.
Proceedings of the Thirteenth National Conference on Artificial Intelligence and Eighth Innovative Applications of Artificial Intelligence Conference, 1996


  Loading...