|
Search the dblp DataBase
Ehab Al-Shaer:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Hazem Hamed, Ehab Al-Shaer
Dynamic rule-ordering optimization for high-speed firewall filtering. [Citation Graph (0, 0)][DBLP] ASIACCS, 2006, pp:332-342 [Conf]
- Mohammad M. Masud, Latifur Khan, Ehab Al-Shaer
Email Worm Detection Using Naïve Bayes and Support Vector Machine. [Citation Graph (0, 0)][DBLP] ISI, 2006, pp:733-734 [Conf]
- Raouf Boutaba, Ehab Al-Shaer, Kevin C. Almeroth
Special issue: monitoring and measurements of IP networks. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:10, pp:1561-1563 [Journal]
- Hazem Hamed, Ehab Al-Shaer
On autonomic optimization of firewall policy organization. [Citation Graph (0, 0)][DBLP] J. High Speed Networks, 2006, v:15, n:3, pp:209-227 [Journal]
- Bin Zhang, Ehab Al-Shaer
Self-organizing Monitoring Agents for Hierarchical Event Correlation. [Citation Graph (0, 0)][DBLP] DSOM, 2007, pp:13-24 [Conf]
- Yongning Tang, Ehab Al-Shaer, Bin Zhang
Toward Globally Optimal Event Monitoring & Aggregation For Large-scale Overlay Networks. [Citation Graph (0, 0)][DBLP] Integrated Network Management, 2007, pp:236-245 [Conf]
- Yonghe Yan, Adel El-Atawy, Ehab Al-Shaer
Ranking-Based Optimal Resource Allocation in Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP] INFOCOM, 2007, pp:1100-1108 [Conf]
- Adel El-Atawy, Taghrid Samak, Ehab Al-Shaer, H. Li
Using Online Traffic Statistical Matching for Optimizing Packet Filtering Performance. [Citation Graph (0, 0)][DBLP] INFOCOM, 2007, pp:866-874 [Conf]
- Hazem Hamed, Adel El-Atawy, Ehab Al-Shaer
Adaptive Statistical Optimization Techniques for Firewall Packet Filtering. [Citation Graph (0, 0)][DBLP] INFOCOM, 2006, pp:- [Conf]
- Adel El-Atawy, Taghrid Samak, Zein Wali, Ehab Al-Shaer, Frank Lin, Christopher Pham, Sheng Li
An Automated Framework for Validating Firewall Policy Enforcement. [Citation Graph (0, 0)][DBLP] POLICY, 2007, pp:151-160 [Conf]
- Bin Zhang, Ehab Al-Shaer, Radha Jagadeesan, James Riely, Corin Pitcher
Specifications of a high-level conflict-free firewall policy language for multi-domain networks. [Citation Graph (0, 0)][DBLP] SACMAT, 2007, pp:185-194 [Conf]
Vulnerability analysis For evaluating quality of protection of security policies. [Citation Graph (, )][DBLP]
TimeVM: a framework for online intrusion mitigation and fast recovery using multi-time-lag traffic replay. [Citation Graph (, )][DBLP]
Sharing end-user negative symptoms for improving overlay network dependability. [Citation Graph (, )][DBLP]
Information Theoretic Approach for Characterizing Spam Botnets Based on Traffic Properties. [Citation Graph (, )][DBLP]
FireCracker: A Framework for Inferring Firewall Policies using Smart Probing. [Citation Graph (, )][DBLP]
Network Configuration in A Box: Towards End-to-End Verification of Network Reachability and Security. [Citation Graph (, )][DBLP]
Optimizing correlation structure of event services considering time and capacity constraints. [Citation Graph (, )][DBLP]
Towards Collaborative User-Level Overlay Fault Diagnosis. [Citation Graph (, )][DBLP]
A Novel Quantitative Approach For Measuring Network Security. [Citation Graph (, )][DBLP]
Building Covert Channels over the Packet Reordering Phenomenon. [Citation Graph (, )][DBLP]
Adaptive Early Packet Filtering for Defending Firewalls Against DoS Attacks. [Citation Graph (, )][DBLP]
Overlay Fault Diagnosis Based on Evidential Reasoning. [Citation Graph (, )][DBLP]
Towards Automatic Creation of Usable Security Configuration. [Citation Graph (, )][DBLP]
QoS Policy Modeling and Conflict Analysis. [Citation Graph (, )][DBLP]
Automated management of network access control from design to enforcement. [Citation Graph (, )][DBLP]
Analysis of Firewall Policy Rules Using Data Mining Techniques. [Citation Graph (, )][DBLP]
Fair Bandwidth Allocation under User Capacity Constraints. [Citation Graph (, )][DBLP]
SMRM: SNMP-based multicast reachability monitoring. [Citation Graph (, )][DBLP]
Alert prioritization in Intrusion Detection Systems. [Citation Graph (, )][DBLP]
MRMON: remote multicast monitoring. [Citation Graph (, )][DBLP]
Towards autonomic risk-aware security configuration. [Citation Graph (, )][DBLP]
Designing, optimizing, and evaluating network security configuration. [Citation Graph (, )][DBLP]
Managing firewall and network-edge security policies. [Citation Graph (, )][DBLP]
Community-base Fault Diagnosis Using Incremental Belief Revision. [Citation Graph (, )][DBLP]
New frontiers in internet network management. [Citation Graph (, )][DBLP]
Search in 0.004secs, Finished in 0.005secs
|