Follow
Ehab Al-Shaer
Title
Cited by
Cited by
Year
Openflow random host mutation: transparent moving target defense using software defined networking
JH Jafarian, E Al-Shaer, Q Duan
Proceedings of the first workshop on Hot topics in software defined networks …, 2012
7212012
Discovery of policy anomalies in distributed firewalls
ES Al-Shaer, HH Hamed
Ieee Infocom 2004 4, 2605-2616, 2004
6032004
Firewall policy advisor for anomaly discovery and rule editing
ES Al-Shaer, HH Hamed
Integrated network management VIII: Managing it all, 17-30, 2003
4632003
Conflict classification and analysis of distributed firewall policies
E Al-Shaer, H Hamed, R Boutaba, M Hasan
IEEE journal on selected areas in communications 23 (10), 2069-2084, 2005
4332005
FlowChecker: Configuration analysis and verification of federated OpenFlow infrastructures
E Al-Shaer, S Al-Haj
Proceedings of the 3rd ACM workshop on Assurable and usable security …, 2010
4162010
Modeling and management of firewall policies
ES Al-Shaer, HH Hamed
IEEE Transactions on network and service management 1 (1), 2-10, 2004
3762004
Taxonomy of conflicts in network security policies
H Hamed, E Al-Shaer
IEEE Communications Magazine 44 (3), 134-141, 2006
2772006
Randomizing AMI configuration for proactive defense in smart grid
MQ Ali, E Al-Shaer, Q Duan
2013 IEEE International Conference on Smart Grid Communications …, 2013
2412013
Network configuration in a box: Towards end-to-end verification of network reachability and security
E Al-Shaer, W Marrero, A El-Atawy, K Elbadawi
2009 17th IEEE International Conference on Network Protocols, 123-132, 2009
2362009
Modeling and verification of IPSec and VPN security policies
H Hamed, E Al-Shaer, W Marrero
13th IEEE International Conference on Network Protocols (ICNP'05), 10 pp.-278, 2005
2302005
Random host mutation for moving target defense
E Al-Shaer, Q Duan, JH Jafarian
International Conference on Security and Privacy in Communication Systems …, 2012
2022012
Ttpdrill: Automatic and accurate extraction of threat actions from unstructured text of cti sources
G Husari, E Al-Shaer, M Ahmed, B Chu, X Niu
Proceedings of the 33rd annual computer security applications conference …, 2017
1892017
Dynamic rule-ordering optimization for high-speed firewall filtering
H Hamed, E Al-Shaer
Proceedings of the 2006 ACM Symposium on Information, computer and …, 2006
1652006
An effective address mutation approach for disrupting reconnaissance attacks
JH Jafarian, E Al-Shaer, Q Duan
IEEE Transactions on Information Forensics and Security 10 (12), 2562-2577, 2015
1622015
Efficient random route mutation considering flow and network constraints
Q Duan, E Al-Shaer, H Jafarian
2013 IEEE Conference on Communications and Network Security (CNS), 260-268, 2013
1482013
Object-Oriented Components for High-speed Network Programming.
DC Schmidt, TH Harrison, E Al-Shaer
COOTS 95, 3-3, 1995
1481995
Toward network configuration randomization for moving target defense
E Al-Shaer
Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats …, 2011
1422011
Analysis of firewall policy rules using data mining techniques
K Golnabi, RK Min, L Khan, E Al-Shaer
2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006, 305-315, 2006
1402006
Data-driven analytics for cyber-threat intelligence and information sharing
S Qamar, Z Anwar, MA Rahman, E Al-Shaer, BT Chu
Computers & Security 67, 35-58, 2017
1342017
Spatio-temporal address mutation for proactive cyber agility against sophisticated attackers
JHH Jafarian, E Al-Shaer, Q Duan
Proceedings of the First ACM Workshop on Moving Target Defense, 69-78, 2014
1222014
The system can't perform the operation now. Try again later.
Articles 1–20