Youssif B. Al-Nashif

According to our database1, Youssif B. Al-Nashif authored at least 35 papers between 2007 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Autonomic Cross-Layer Management of Cloud Systems.
Proceedings of the 2nd IEEE International Workshops on Foundations and Applications of Self* Systems, 2017

2015
Wireless Anomaly Detection Based on IEEE 802.11 Behavior Analysis.
IEEE Trans. Inf. Forensics Secur., 2015

Anomaly Behavior Analysis of DNS Protocol.
J. Internet Serv. Inf. Secur., 2015

Teaching and Training Cybersecurity as a Cloud Service.
Proceedings of the 2015 International Conference on Cloud and Autonomic Computing, 2015

DNS-IDS: Securing DNS in the Cloud Era.
Proceedings of the 2015 International Conference on Cloud and Autonomic Computing, 2015

Resilient and Trustworthy Dynamic Data-driven Application Systems (DDDAS) Services for Crisis Management Environments.
Proceedings of the International Conference on Computational Science, 2015

Anomaly Behavior Analysis System for ZigBee in smart buildings.
Proceedings of the 12th IEEE/ACS International Conference of Computer Systems and Applications, 2015

2014
A fictitious play-based response strategy for multistage intrusion defense systems.
Secur. Commun. Networks, 2014

Autonomic Resilient Cloud Management (ARCM) Design and Evaluation.
Proceedings of the 2014 International Conference on Cloud and Autonomic Computing, 2014

Autonomic Workload and Resources Management of Cloud Computing Services.
Proceedings of the 2014 International Conference on Cloud and Autonomic Computing, 2014

Static Versus Dynamic Data Information Fusion Analysis Using DDDAS for Cyber Security Trust.
Proceedings of the International Conference on Computational Science, 2014

Improving Cyber Resiliency of Cloud Application Services by Applying Software Behavior Encryption (SBE).
Proceedings of the Conference on Systems Engineering Research, 2014

Anomaly based intrusion detection for Building Automation and Control networks.
Proceedings of the 11th IEEE/ACS International Conference on Computer Systems and Applications, 2014

A Network Protection Framework for DNP3 over TCP/IP protocol.
Proceedings of the 11th IEEE/ACS International Conference on Computer Systems and Applications, 2014

2013
Building resilient cloud services using DDDAS and moving target defence.
Int. J. Cloud Comput., 2013

IEEE 802.11 anomaly-based behavior analysis.
Proceedings of the International Conference on Computing, Networking and Communications, 2013

Resilient Dynamic Data Driven Application Systems (rDDDAS).
Proceedings of the International Conference on Computational Science, 2013

Resilient cloud data storage services.
Proceedings of the ACM Cloud and Autonomic Computing Conference, 2013

Autonomic performance-per-watt management (APM) of cloud resources and services.
Proceedings of the ACM Cloud and Autonomic Computing Conference, 2013

Autonomic Critical Infrastructure Protection (ACIP) system.
Proceedings of the ACS International Conference on Computer Systems and Applications, 2013

2011
BioRAC: biologically inspired resilient autonomic cloud.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

Application attack detection system (AADS): An anomaly based behavior analysis approach.
Proceedings of the 9th IEEE/ACS International Conference on Computer Systems and Applications, 2011

2010
Game Theory Based Network Security.
J. Information Security, 2010

Design and evaluation of a self-healing Kepler for scientific workflows.
Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing, 2010

AppFlow: Autonomic Performance-Per-Watt Management of Large-Scale Data Centers.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010

Plug & execute framework for network traffic generation.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

2009
A game theory based risk and impact analysis method for Intrusion Defense Systems.
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009

Accelerated discovery through integration of Kepler with data turbine for ecosystem research.
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009

2008
Multi-Level Anomaly based Autonomic Intrusion Detection System.
PhD thesis, 2008

Anomaly-based fault detection in pervasive computing system.
Proceedings of the 5th international conference on Pervasive services, 2008

A proactive wireless self-protection system.
Proceedings of the 5th international conference on Pervasive services, 2008

Multi-Level Intrusion Detection System (ML-IDS).
Proceedings of the 2008 International Conference on Autonomic Computing, 2008

2007
Application of autonomic agents for global information grid management and security.
Proceedings of the 2007 Summer Computer Simulation Conference, 2007

Anomaly-Based Behavior Analysis of Wireless Network Security.
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007

Self-Configuration of Network Security.
Proceedings of the 11th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2007), 2007


  Loading...