Ehab Al-Shaer
Cited by
Cited by
Openflow random host mutation: transparent moving target defense using software defined networking
JH Jafarian, E Al-Shaer, Q Duan
Proceedings of the first workshop on Hot topics in software defined networks …, 2012
Discovery of policy anomalies in distributed firewalls
ES Al-Shaer, HH Hamed
Ieee Infocom 2004 4, 2605-2616, 2004
Firewall policy advisor for anomaly discovery and rule editing
ES Al-Shaer, HH Hamed
International symposium on integrated network management, 17-30, 2003
Conflict classification and analysis of distributed firewall policies
E Al-Shaer, H Hamed, R Boutaba, M Hasan
IEEE journal on selected areas in communications 23 (10), 2069-2084, 2005
FlowChecker: Configuration analysis and verification of federated OpenFlow infrastructures
E Al-Shaer, S Al-Haj
Proceedings of the 3rd ACM workshop on Assurable and usable security …, 2010
Modeling and management of firewall policies
ES Al-Shaer, HH Hamed
IEEE Transactions on network and service management 1 (1), 2-10, 2004
Taxonomy of conflicts in network security policies
H Hamed, E Al-Shaer
IEEE Communications Magazine 44 (3), 134-141, 2006
Randomizing AMI configuration for proactive defense in smart grid
MQ Ali, E Al-Shaer, Q Duan
2013 IEEE International Conference on Smart Grid Communications …, 2013
Network configuration in a box: Towards end-to-end verification of network reachability and security
E Al-Shaer, W Marrero, A El-Atawy, K Elbadawi
2009 17th IEEE International Conference on Network Protocols, 123-132, 2009
Modeling and verification of IPSec and VPN security policies
H Hamed, E Al-Shaer, W Marrero
13th IEEE International Conference on Network Protocols (ICNP'05), 10 pp.-278, 2005
Random host mutation for moving target defense
E Al-Shaer, Q Duan, JH Jafarian
International Conference on Security and Privacy in Communication Systems …, 2012
Dynamic rule-ordering optimization for high-speed firewall filtering
H Hamed, E Al-Shaer
Proceedings of the 2006 ACM Symposium on Information, computer and …, 2006
Object-Oriented Components for High-speed Network Programming.
DC Schmidt, TH Harrison, E Al-Shaer
COOTS 95, 3-3, 1995
An effective address mutation approach for disrupting reconnaissance attacks
JH Jafarian, E Al-Shaer, Q Duan
IEEE Transactions on Information Forensics and Security 10 (12), 2562-2577, 2015
Efficient random route mutation considering flow and network constraints
Q Duan, E Al-Shaer, H Jafarian
2013 IEEE Conference on Communications and Network Security (CNS), 260-268, 2013
Toward network configuration randomization for moving target defense
E Al-Shaer
Moving Target Defense, 153-159, 2011
Analysis of firewall policy rules using data mining techniques
K Golnabi, RK Min, L Khan, E Al-Shaer
2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006, 305-315, 2006
A novel quantitative approach for measuring network security
MS Ahmed, E Al-Shaer, L Khan
IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 1957-1965, 2008
Interactive distance learning over intranets
K Maly, H Abdel-Wahab, CM Overstreet, JC Wild, AK Gupta, A Youssef, ...
IEEE Internet Computing 1 (1), 60-71, 1997
Adaptive Statistical Optimization Techniques for Firewall Packet Filtering.
HH Hamed, A El-Atawy, E Al-Shaer
INFOCOM 6, 1-12, 2006
The system can't perform the operation now. Try again later.
Articles 1–20