Sherif M. Khattab

Orcid: 0000-0002-0141-8543

According to our database1, Sherif M. Khattab authored at least 30 papers between 2003 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Laundry Overflow: Engaging Diverse Students in CyberSecurity using Interactive Analogies.
Proceedings of the SIGCSE 2022: The 53rd ACM Technical Symposium on Computer Science Education, 2022

The Effect of Animations Using Real-world Analogies on Diverse Computer Systems Students.
Proceedings of the SIGCSE 2022: The 53rd ACM Technical Symposium on Computer Science Education, 2022

Rethinking the Bottleneck in Diversifying the Cybersecurity Talent Pool: What Actions can We Take and How can We Measure Success?
Proceedings of the SIGCSE 2022: The 53rd ACM Technical Symposium on Computer Science Education, 2022

2021
STAGER: Semantic-Based Framework for Generating Adapters of Service-Based Generic-API for Portable Cloud Applications.
IEEE Trans. Serv. Comput., 2021

A linguistic steganography framework using Arabic calligraphy.
J. King Saud Univ. Comput. Inf. Sci., 2021

2017
Towards standard PaaS implementation APIs.
Int. J. Cloud Comput., 2017

A WoT Testbed for Research and Course Projects.
Proceedings of the Managing the Web of Things: Linking the Real World to the Web, 2017

2016
Prediction mechanisms for monitoring state of cloud resources using Markov chain model.
J. Parallel Distributed Comput., 2016

Implementing generic PaaS deployment API: repackaging and deploying applications on heterogeneous PaaS platforms.
Int. J. Big Data Intell., 2016

Poster: Web Service based Communication for Devices with Limited Resources.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

Poster: HeuristicIoT: A Framework for Augmenting Heuristic Search Algorithms by Internet-of-Things Data.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

WoTSF: A Framework for Searching in the Web of Things.
Proceedings of the 10th International Conference on Informatics and Systems, 2016

Semantic-based generation of generic-API adapters for portable cloud applications.
Proceedings of the 3rd Workshop on CrossCloud Infrastructures & Platforms, 2016

2015
A secure geographical routing protocol for highly-dynamic aeronautical networks.
Proceedings of the 34th IEEE Military Communications Conference, 2015

2014
Improving Detection Accuracy in Group Testing-Based Identification of Misbehaving Data Sources.
Proceedings of the 2014 International Conference on Future Internet of Things and Cloud, 2014

2013
GPSO: An improved search algorithm for resource allocation in cloud databases.
Proceedings of the ACS International Conference on Computer Systems and Applications, 2013

2011
OverCovert: Using Stack-Overflow Software Vulnerability to Create a Covert Channel.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

2010
A key-agreement protocol based on the stack-overflow software vulnerability.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

2009
Considering Link Qualities in Fault-Tolerant Aggregation in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
Jamming Mitigation in Multi-Radio Wireless Networks: Reactive or Proactive?
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

Modeling of the channel-hopping anti-jamming defense in multi-radio wireless networks.
Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2008

GroupBeat: Wireless sensor networks made reliable.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008

Live Baiting for Service-Level DoS Attackers.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

2006
Honeypot back-propagation for mitigating spoofing distributed Denial-of-Service attacks.
J. Parallel Distributed Comput., 2006

RideSharing: Fault Tolerant Aggregation in Sensor Networks Using Corrective Actions.
Proceedings of the Third Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, 2006

Honeybees: combining replication and evasion for mitigating base-station jamming in sensor networks.
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006

Integrated Scheduling of Application- and Network-Layer Tasks in Delay-Tolerant MANETs.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2004
Design and analysis of a replicated elusive server scheme for mitigating denial of service attacks.
J. Syst. Softw., 2004

Roaming Honeypots for Mitigating Service-Level Denial-of-Service Attacks.
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004

2003
A Simulation Study of the Proactive Server Roaming for Mitigating Denial of Service Attacks.
Proceedings of the Proceedings 36th Annual Simulation Symposium (ANSS-36 2003), Orlando, Florida, USA, March 30, 2003


  Loading...