The SCEAS System
Navigation Menu

Search the dblp DataBase


Ehab Al-Shaer: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Hazem Hamed, Ehab Al-Shaer
    Dynamic rule-ordering optimization for high-speed firewall filtering. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:332-342 [Conf]
  2. Mohammad M. Masud, Latifur Khan, Ehab Al-Shaer
    Email Worm Detection Using Naïve Bayes and Support Vector Machine. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:733-734 [Conf]
  3. Raouf Boutaba, Ehab Al-Shaer, Kevin C. Almeroth
    Special issue: monitoring and measurements of IP networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:10, pp:1561-1563 [Journal]
  4. Hazem Hamed, Ehab Al-Shaer
    On autonomic optimization of firewall policy organization. [Citation Graph (0, 0)][DBLP]
    J. High Speed Networks, 2006, v:15, n:3, pp:209-227 [Journal]
  5. Bin Zhang, Ehab Al-Shaer
    Self-organizing Monitoring Agents for Hierarchical Event Correlation. [Citation Graph (0, 0)][DBLP]
    DSOM, 2007, pp:13-24 [Conf]
  6. Yongning Tang, Ehab Al-Shaer, Bin Zhang
    Toward Globally Optimal Event Monitoring & Aggregation For Large-scale Overlay Networks. [Citation Graph (0, 0)][DBLP]
    Integrated Network Management, 2007, pp:236-245 [Conf]
  7. Yonghe Yan, Adel El-Atawy, Ehab Al-Shaer
    Ranking-Based Optimal Resource Allocation in Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2007, pp:1100-1108 [Conf]
  8. Adel El-Atawy, Taghrid Samak, Ehab Al-Shaer, H. Li
    Using Online Traffic Statistical Matching for Optimizing Packet Filtering Performance. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2007, pp:866-874 [Conf]
  9. Hazem Hamed, Adel El-Atawy, Ehab Al-Shaer
    Adaptive Statistical Optimization Techniques for Firewall Packet Filtering. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2006, pp:- [Conf]
  10. Adel El-Atawy, Taghrid Samak, Zein Wali, Ehab Al-Shaer, Frank Lin, Christopher Pham, Sheng Li
    An Automated Framework for Validating Firewall Policy Enforcement. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:151-160 [Conf]
  11. Bin Zhang, Ehab Al-Shaer, Radha Jagadeesan, James Riely, Corin Pitcher
    Specifications of a high-level conflict-free firewall policy language for multi-domain networks. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:185-194 [Conf]

  12. Vulnerability analysis For evaluating quality of protection of security policies. [Citation Graph (, )][DBLP]

  13. TimeVM: a framework for online intrusion mitigation and fast recovery using multi-time-lag traffic replay. [Citation Graph (, )][DBLP]

  14. Sharing end-user negative symptoms for improving overlay network dependability. [Citation Graph (, )][DBLP]

  15. Information Theoretic Approach for Characterizing Spam Botnets Based on Traffic Properties. [Citation Graph (, )][DBLP]

  16. FireCracker: A Framework for Inferring Firewall Policies using Smart Probing. [Citation Graph (, )][DBLP]

  17. Network Configuration in A Box: Towards End-to-End Verification of Network Reachability and Security. [Citation Graph (, )][DBLP]

  18. Optimizing correlation structure of event services considering time and capacity constraints. [Citation Graph (, )][DBLP]

  19. Towards Collaborative User-Level Overlay Fault Diagnosis. [Citation Graph (, )][DBLP]

  20. A Novel Quantitative Approach For Measuring Network Security. [Citation Graph (, )][DBLP]

  21. Building Covert Channels over the Packet Reordering Phenomenon. [Citation Graph (, )][DBLP]

  22. Adaptive Early Packet Filtering for Defending Firewalls Against DoS Attacks. [Citation Graph (, )][DBLP]

  23. Overlay Fault Diagnosis Based on Evidential Reasoning. [Citation Graph (, )][DBLP]

  24. Towards Automatic Creation of Usable Security Configuration. [Citation Graph (, )][DBLP]

  25. QoS Policy Modeling and Conflict Analysis. [Citation Graph (, )][DBLP]

  26. Automated management of network access control from design to enforcement. [Citation Graph (, )][DBLP]

  27. Analysis of Firewall Policy Rules Using Data Mining Techniques. [Citation Graph (, )][DBLP]

  28. Fair Bandwidth Allocation under User Capacity Constraints. [Citation Graph (, )][DBLP]

  29. SMRM: SNMP-based multicast reachability monitoring. [Citation Graph (, )][DBLP]

  30. Alert prioritization in Intrusion Detection Systems. [Citation Graph (, )][DBLP]

  31. MRMON: remote multicast monitoring. [Citation Graph (, )][DBLP]

  32. Towards autonomic risk-aware security configuration. [Citation Graph (, )][DBLP]

  33. Designing, optimizing, and evaluating network security configuration. [Citation Graph (, )][DBLP]

  34. Managing firewall and network-edge security policies. [Citation Graph (, )][DBLP]

  35. Community-base Fault Diagnosis Using Incremental Belief Revision. [Citation Graph (, )][DBLP]

  36. New frontiers in internet network management. [Citation Graph (, )][DBLP]

Search in 0.004secs, Finished in 0.005secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002