Mohammed Noraden Alsaleh

Orcid: 0000-0001-5695-0556

According to our database1, Mohammed Noraden Alsaleh authored at least 16 papers between 2011 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Automated Cyber Risk Mitigation: Making Informed Cost-Effective Decisions.
Proceedings of the Adaptive Autonomous Secure Cyber Systems., 2020

2019
CLIPS/ActiveSDN for automated and safe cybersecurity course-of-actions orchestration.
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, 2019

2018
Verifying the Enforcement and Effectiveness of Network Lateral Movement Resistance Techniques.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

gExtractor: Towards Automated Extraction of Malware Deception Parameters.
Proceedings of the 8th Software Security, 2018

2017
ROI-Driven Cyber Risk Mitigation Using Host Compliance and Network Configuration.
J. Netw. Syst. Manag., 2017

Characterizing Scientific Reporting in Security Literature: An analysis of ACM CCS and IEEE S&P Papers.
Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp, HoTSoS 2017, 2017

2016
Towards Automated Verification of Active Cyber Defense Strategies on Software Defined Networks.
Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense, 2016

Optimizing the RoI of cyber risk mitigation.
Proceedings of the 12th International Conference on Network and Service Management, 2016

2014
CloudExp: A comprehensive cloud computing experimental framework.
Simul. Model. Pract. Theory, 2014

Enterprise Risk Assessment Based on Compliance Reports and Vulnerability Scoring Systems.
Proceedings of the 2014 Workshop on Cyber Security Analytics, 2014

Security configuration analytics using video games.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2013
TeachCloud: a cloud computing educational toolkit.
Int. J. Cloud Comput., 2013

Objective metrics for firewall security: A holistic view.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
Towards a Unified Modeling and Verification of Network and System Security Configurations.
Proceedings of the Automated Security Management [papers from SafeConfig 2012, 2012

2011
SCAP Based Configuration Analytics for Comprehensive Compliance Checking.
Proceedings of the 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31, 2011

ConfigChecker: A tool for comprehensive security configuration analytics.
Proceedings of the 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31, 2011


  Loading...