Openflow random host mutation: transparent moving target defense using software defined networking JH Jafarian, E Al-Shaer, Q Duan Proceedings of the first workshop on Hot topics in software defined networks …, 2012 | 637 | 2012 |
Discovery of policy anomalies in distributed firewalls ES Al-Shaer, HH Hamed Ieee Infocom 2004 4, 2605-2616, 2004 | 576 | 2004 |
Firewall policy advisor for anomaly discovery and rule editing ES Al-Shaer, HH Hamed International symposium on integrated network management, 17-30, 2003 | 412 | 2003 |
Conflict classification and analysis of distributed firewall policies E Al-Shaer, H Hamed, R Boutaba, M Hasan IEEE journal on selected areas in communications 23 (10), 2069-2084, 2005 | 403 | 2005 |
FlowChecker: Configuration analysis and verification of federated OpenFlow infrastructures E Al-Shaer, S Al-Haj Proceedings of the 3rd ACM workshop on Assurable and usable security …, 2010 | 381 | 2010 |
Modeling and management of firewall policies ES Al-Shaer, HH Hamed IEEE Transactions on network and service management 1 (1), 2-10, 2004 | 333 | 2004 |
Taxonomy of conflicts in network security policies H Hamed, E Al-Shaer IEEE Communications Magazine 44 (3), 134-141, 2006 | 257 | 2006 |
Randomizing AMI configuration for proactive defense in smart grid MQ Ali, E Al-Shaer, Q Duan 2013 IEEE International Conference on Smart Grid Communications …, 2013 | 237 | 2013 |
Network configuration in a box: Towards end-to-end verification of network reachability and security E Al-Shaer, W Marrero, A El-Atawy, K Elbadawi 2009 17th IEEE International Conference on Network Protocols, 123-132, 2009 | 232 | 2009 |
Modeling and verification of IPSec and VPN security policies H Hamed, E Al-Shaer, W Marrero 13th IEEE International Conference on Network Protocols (ICNP'05), 10 pp.-278, 2005 | 226 | 2005 |
Random host mutation for moving target defense E Al-Shaer, Q Duan, JH Jafarian International Conference on Security and Privacy in Communication Systems …, 2012 | 159 | 2012 |
Dynamic rule-ordering optimization for high-speed firewall filtering H Hamed, E Al-Shaer Proceedings of the 2006 ACM Symposium on Information, computer and …, 2006 | 154 | 2006 |
Object-Oriented Components for High-speed Network Programming. DC Schmidt, TH Harrison, E Al-Shaer COOTS 95, 3-3, 1995 | 146 | 1995 |
An effective address mutation approach for disrupting reconnaissance attacks JH Jafarian, E Al-Shaer, Q Duan IEEE Transactions on Information Forensics and Security 10 (12), 2562-2577, 2015 | 130 | 2015 |
Efficient random route mutation considering flow and network constraints Q Duan, E Al-Shaer, H Jafarian 2013 IEEE Conference on Communications and Network Security (CNS), 260-268, 2013 | 128 | 2013 |
Toward network configuration randomization for moving target defense E Al-Shaer Moving Target Defense, 153-159, 2011 | 126 | 2011 |
Analysis of firewall policy rules using data mining techniques K Golnabi, RK Min, L Khan, E Al-Shaer 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006, 305-315, 2006 | 125 | 2006 |
A novel quantitative approach for measuring network security MS Ahmed, E Al-Shaer, L Khan IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 1957-1965, 2008 | 121 | 2008 |
Interactive distance learning over intranets K Maly, H Abdel-Wahab, CM Overstreet, JC Wild, AK Gupta, A Youssef, ... IEEE Internet Computing 1 (1), 60-71, 1997 | 118 | 1997 |
Adaptive Statistical Optimization Techniques for Firewall Packet Filtering. HH Hamed, A El-Atawy, E Al-Shaer INFOCOM 6, 1-12, 2006 | 116 | 2006 |