default search action
Ehab Al-Shaer
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2019
- [b3]Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang:
Autonomous Cyber Deception - Reasoning, Adaptive Planning, and Evaluation of HoneyThings. Springer 2019, ISBN 978-3-030-02109-2 - 2016
- [b2]Ehab Al-Shaer, Mohammad Ashiqur Rahman:
Security and Resiliency Analytics for Smart Grids - Static and Dynamic Approaches. Advances in Information Security 67, Springer 2016, ISBN 978-3-319-32870-6, pp. 3-134 - 2014
- [b1]Ehab Al-Shaer:
Automated Firewall Analytics - Design, Configuration and Optimization. Springer 2014, ISBN 978-3-319-10370-9, pp. 1-127
Journal Articles
- 2023
- [j47]Md Sajidul Islam Sajid, Jinpeng Wei, Ehab Al-Shaer, Qi Duan, Basel Abdeen, Latifur Khan:
symbSODA: Configurable and Verifiable Orchestration Automation for Active Malware Deception. ACM Trans. Priv. Secur. 26(4): 51:1-51:36 (2023) - 2021
- [j46]Mohammad Ashiqur Rahman, Amarjit Datta, Ehab Al-Shaer:
Automated Configuration Synthesis for Resilient Smart Metering Infrastructure. EAI Endorsed Trans. Security Safety 8(28): e4 (2021) - 2020
- [j45]Mohammad Ashiqur Rahman, Md. Golam Moula Mehedi Hasan, Mohammad Hossein Manshaei, Ehab Al-Shaer:
A game-theoretic analysis to defend against remote operating system fingerprinting. J. Inf. Secur. Appl. 52: 102456 (2020) - 2019
- [j44]Mohammad Ashiqur Rahman, Amarjit Datta, Ehab Al-Shaer:
Security design against stealthy attacks on power system state estimation: A formal approach. Comput. Secur. 84: 301-317 (2019) - 2017
- [j43]Sara Qamar, Zahid Anwar, Mohammad Ashiqur Rahman, Ehab Al-Shaer, Bei-tseng Chu:
Data-driven analytics for cyber-threat intelligence and information sharing. Comput. Secur. 67: 35-58 (2017) - [j42]Mujahid Mohsin, Zahid Anwar, Farhat Zaman, Ehab Al-Shaer:
IoTChecker: A data-driven framework for security analytics of Internet of Things configurations. Comput. Secur. 70: 199-223 (2017) - [j41]Mohammed Noraden Alsaleh, Ehab Al-Shaer, Ghaith Husari:
ROI-Driven Cyber Risk Mitigation Using Host Compliance and Network Configuration. J. Netw. Syst. Manag. 25(4): 759-783 (2017) - [j40]Adel El-Atawy, Qi Duan, Ehab Al-Shaer:
A Novel Class of Robust Covert Channels Using Out-of-Order Packets. IEEE Trans. Dependable Secur. Comput. 14(2): 116-129 (2017) - [j39]Mohammad Ashiqur Rahman, Mohammad Hossein Manshaei, Ehab Al-Shaer, Mohamed Shehab:
Secure and Private Data Aggregation for Energy Consumption Scheduling in Smart Grids. IEEE Trans. Dependable Secur. Comput. 14(2): 221-234 (2017) - [j38]Mohammad Ashiqur Rahman, Ehab Al-Shaer:
Automated Synthesis of Distributed Network Access Controls: A Formal Framework with Refinement. IEEE Trans. Parallel Distributed Syst. 28(2): 416-430 (2017) - 2016
- [j37]Fida Gillani, Ehab Al-Shaer, Basil AsSadhan:
Economic metric to improve spam detectors. J. Netw. Comput. Appl. 65: 131-143 (2016) - 2015
- [j36]Soumya Maity, Padmalochan Bera, S. K. Ghosh, Ehab Al-Shaer:
Formal integrated network security analysis tool: formal query-based network security configuration analysis. IET Networks 4(2): 137-147 (2015) - [j35]Soumya Maity, Soumya Kanti Ghosh, Ehab Al-Shaer:
PoliCon: a policy conciliation framework for heterogeneous mobile ad hoc networks. Secur. Commun. Networks 8(3): 418-430 (2015) - [j34]Jafar Haadi Jafarian, Ehab Al-Shaer, Qi Duan:
An Effective Address Mutation Approach for Disrupting Reconnaissance Attacks. IEEE Trans. Inf. Forensics Secur. 10(12): 2562-2577 (2015) - [j33]Muhammad Qasim Ali, Ehab Al-Shaer:
Randomization-Based Intrusion Detection System for Advanced Metering Infrastructure. ACM Trans. Inf. Syst. Secur. 18(2): 7:1-7:30 (2015) - 2014
- [j32]Ayesha Binte Ashfaq, Sajjad Rizvi, Mobin Javed, Syed Ali Khayam, Muhammad Qasim Ali, Ehab Al-Shaer:
Information theoretic feature space slicing for statistical anomaly detection. J. Netw. Comput. Appl. 41: 473-487 (2014) - [j31]Muhammad Qasim Ali, Ehab Al-Shaer, Taghrid Samak:
Firewall Policy Reconnaissance: Techniques and Analysis. IEEE Trans. Inf. Forensics Secur. 9(2): 296-308 (2014) - [j30]Syed Fida Gillani, Mehmet Demirci, Ehab Al-Shaer, Mostafa H. Ammar:
Problem Localization and Quantification Using Formal Evidential Reasoning for Virtual Networks. IEEE Trans. Netw. Serv. Manag. 11(3): 307-320 (2014) - 2013
- [j29]Qi Duan, Ehab Al-Shaer:
Traffic-aware dynamic firewall policy management: techniques and applications. IEEE Commun. Mag. 51(7) (2013) - [j28]Mehmet Engin Tozal, Yongge Wang, Ehab Al-Shaer, Kamil Saraç, Bhavani Thuraisingham, Bei-tseng Chu:
Adaptive Information Coding for Secure and Reliable Wireless Telesurgery Communications. Mob. Networks Appl. 18(5): 697-711 (2013) - [j27]Muhammad Qasim Ali, Ehab Al-Shaer, Hassan Khan, Syed Ali Khayam:
Automated Anomaly Detector Adaptation using Adaptive Threshold Tuning. ACM Trans. Inf. Syst. Secur. 15(4): 17:1-17:30 (2013) - [j26]Mohammad Ashiqur Rahman, Ehab Al-Shaer, Padmalochan Bera:
A Noninvasive Threat Analyzer for Advanced Metering Infrastructure in Smart Grid. IEEE Trans. Smart Grid 4(1): 273-287 (2013) - 2012
- [j25]Yongning Tang, Ehab Al-Shaer, Kaustubh R. Joshi:
Reasoning under Uncertainty for Overlay Fault Diagnosis. IEEE Trans. Netw. Serv. Manag. 9(1): 34-47 (2012) - [j24]Taghrid Samak, Ehab Al-Shaer:
Fuzzy Conflict Analysis for QoS Policy Parameters in DiffServ Networks. IEEE Trans. Netw. Serv. Manag. 9(4): 459-472 (2012) - 2011
- [j23]Mohammad Salim Ahmed, Ehab Al-Shaer, Mohamed Mahmoud Taibah, Latifur Khan:
Objective Risk Evaluation for Automated Security Management. J. Netw. Syst. Manag. 19(3): 343-366 (2011) - [j22]Khaled Salah, Karim Sattar, Mohammed H. Sqalli, Ehab Al-Shaer:
A potential low-rate DoS attack against network firewalls. Secur. Commun. Networks 4(2): 136-146 (2011) - 2010
- [j21]Lopamudra Roychoudhuri, Ehab S. Al-Shaer:
Autonomic QoS Optimization of Real-Time Internet Audio Using Loss Prediction and Stochastic Control. Int. J. Adapt. Resilient Auton. Syst. 1(3): 81-107 (2010) - [j20]Muhammad Abedin, Syeda Nessa, Latifur Khan, Ehab Al-Shaer, Mamoun Awad:
Analysis of firewall policy rules using traffic mining techniques. Int. J. Internet Protoc. Technol. 5(1/2): 3-22 (2010) - 2009
- [j19]Ehab Al-Shaer, Albert G. Greenberg, Charles R. Kalmanek, David A. Maltz, T. S. Eugene Ng, Geoffrey G. Xie:
New frontiers in internet network management. Comput. Commun. Rev. 39(5): 37-39 (2009) - [j18]Ehab Al-Shaer, Adel El-Atawy, Taghrid Samak:
Automated pseudo-live testing of firewall configuration enforcement. IEEE J. Sel. Areas Commun. 27(3): 302-314 (2009) - 2008
- [j17]Yonghe Yan, Adel El-Atawy, Ehab Al-Shaer:
A game-theoretic model for capacity-constrained fair bandwidth allocation. Int. J. Netw. Manag. 18(6): 485-504 (2008) - [j16]Ehab Al-Shaer, Charles R. Kalmanek, Felix Wu:
Automated Security Configuration Management. J. Netw. Syst. Manag. 16(3): 231-233 (2008) - [j15]Yongning Tang, Ehab Al-Shaer, Raouf Boutaba:
Efficient fault diagnosis using incremental alarm correlation and active investigation for internet and overlay networks. IEEE Trans. Netw. Serv. Manag. 5(1): 36-49 (2008) - 2006
- [j14]Hazem Hamed, Ehab Al-Shaer:
Taxonomy of conflicts in network security policies. IEEE Commun. Mag. 44(3): 134-141 (2006) - [j13]Raouf Boutaba, Ehab Al-Shaer, Kevin C. Almeroth:
Special issue: monitoring and measurements of IP networks. Comput. Commun. 29(10): 1561-1563 (2006) - [j12]Lopamudra Roychoudhuri, Ehab S. Al-Shaer, Gregory B. Brewster:
On the impact of loss and delay variation on Internet packet audio transmission. Comput. Commun. 29(10): 1578-1589 (2006) - [j11]Hazem H. Hamed, Ehab Al-Shaer:
On autonomic optimization of firewall policy organization. J. High Speed Networks 15(3): 209-227 (2006) - [j10]Hazem H. Hamed, Adel El-Atawy, Ehab Al-Shaer:
On Dynamic Optimization of Packet Matching in High-Speed Firewalls. IEEE J. Sel. Areas Commun. 24(10): 1817-1830 (2006) - 2005
- [j9]Ehab Al-Shaer, Hazem H. Hamed, Raouf Boutaba, Masum Hasan:
Conflict classification and analysis of distributed firewall policies. IEEE J. Sel. Areas Commun. 23(10): 2069-2084 (2005) - [j8]Lopamudra Roychoudhuri, Ehab S. Al-Shaer:
Real-time packet loss prediction based on end-to-end delay variation. IEEE Trans. Netw. Serv. Manag. 2(1): 29-38 (2005) - 2004
- [j7]Ehab S. Al-Shaer, Hazem H. Hamed:
Modeling and Management of Firewall Policies. IEEE Trans. Netw. Serv. Manag. 1(1): 2-10 (2004) - 2002
- [j6]Ehab S. Al-Shaer, Yongning Tang:
QoS Path Monitoring for Multicast Networks. J. Netw. Syst. Manag. 10(3): 357-381 (2002) - 2001
- [j5]Ehab S. Al-Shaer, Yongning Tang:
Toward integrating IP multicasting in internet network management protocols. Comput. Commun. 24(5-6): 473-485 (2001) - 2000
- [j4]Ehab S. Al-Shaer, Mohamed Fayad, Hussein M. Abdel-Wahab:
Adaptive object-oriented filtering framework for event management applications. ACM Comput. Surv. 32(1es): 37 (2000) - [j3]Ehab S. Al-Shaer:
Active Management Framework for Distributed Multimedia Systems. J. Netw. Syst. Manag. 8(1): 49-72 (2000) - 1999
- [j2]Ehab S. Al-Shaer:
Dynamic Monitoring Approach for Multi-poin Multimedia Systems. Netw. Inf. Syst. J. 2(1): 75-88 (1999) - 1997
- [j1]Kurt Maly, Hussein M. Abdel-Wahab, C. Michael Overstreet, J. Christian Wild, Ajay K. Gupta, Alaa Youssef, Emilia Stoica, Ehab S. Al-Shaer:
Interactive Distance Learning over Intranets. IEEE Internet Comput. 1(1): 60-71 (1997)
Conference and Workshop Papers
- 2024
- [c167]Mohiuddin Ahmed, Jinpeng Wei, Ehab Al-Shaer:
Prompting LLM to Enforce and Validate CIS Critical Security Control. SACMAT 2024 - 2023
- [c166]Basel Abdeen, Ehab Al-Shaer, Waseem G. Shadid:
VeriActor: Dynamic Generation of Challenge-Response Questions for Enhanced Email Sender Verification. CNS 2023: 1-9 - [c165]Ashutosh Dutta, Ehab Al-Shaer, Samrat Chatterjee, Qi Duan:
Autonomous Cyber Defense Against Dynamic Multi-strategy Infrastructural DDoS Attacks. CNS 2023: 1-9 - [c164]Basel Abdeen, Ehab Al-Shaer, Anoop Singhal, Latifur Khan, Kevin W. Hamlen:
SMET: Semantic Mapping of CVE to ATT&CK and Its Application to Cybersecurity. DBSec 2023: 243-260 - 2022
- [c163]Siddhartha Shankar Das, Mahantesh Halappanavar, Antonino Tumeo, Edoardo Serra, Alex Pothen, Ehab Al-Shaer:
VWC-BERT: Scaling Vulnerability-Weakness-Exploit Mapping on Modern AI Accelerators. IEEE Big Data 2022: 1224-1229 - [c162]Ehsan Aghaei, Xi Niu, Waseem G. Shadid, Ehab Al-Shaer:
SecureBERT: A Domain-Specific Language Model for Cybersecurity. SecureComm 2022: 39-56 - 2021
- [c161]Md Sajidul Islam Sajid, Jinpeng Wei, Basel Abdeen, Ehab Al-Shaer, Md. Mazharul Islam, Walter Diong, Latifur Khan:
SODA: A System for Cyber Deception Orchestration and Automation. ACSAC 2021: 675-689 - [c160]Md. Mazharul Islam, Ashutosh Dutta, Md Sajidul Islam Sajid, Ehab Al-Shaer, Jinpeng Wei, Sadegh Farhang:
CHIMERA: Autonomous Planning and Orchestration for Malware Deception. CNS 2021: 173-181 - [c159]Siddhartha Shankar Das, Edoardo Serra, Mahantesh Halappanavar, Alex Pothen, Ehab Al-Shaer:
V2W-BERT: A Framework for Effective Hierarchical Multiclass Classification of Software Vulnerabilities. DSAA 2021: 1-12 - 2020
- [c158]Qi Duan, Ehab Al-Shaer, Jiang Xie:
Range and Topology Mutation Based Wireless Agility. MTD@CCS 2020: 59-67 - [c157]Md Sajidul Islam Sajid, Jinpeng Wei, Md Rabbi Alam, Ehsan Aghaei, Ehab Al-Shaer:
DodgeTron: Towards Autonomous Cyber Deception Using Dynamic Hybrid Analysis of Malware. CNS 2020: 1-9 - [c156]Muhammad Abdul Basit Ur Rahim, Qi Duan, Ehab Al-Shaer:
A Formal Analysis of Moving Target Defense. COMPSAC 2020: 1802-1807 - [c155]Amirreza Niakanlahiji, Jafar Haadi Jafarian, Bei-Tseng Chu, Ehab Al-Shaer:
HoneyBug: Personalized Cyber Deception for Web Applications. HICSS 2020: 1-10 - [c154]Moumita Das Purba, Bill Chu, Ehab Al-Shaer:
From Word Embedding to Cyber-Phrase Embedding: Comparison of Processing Cybersecurity Texts. ISI 2020: 1-6 - [c153]Adam Dalton, Ehsan Aghaei, Ehab Al-Shaer, Archna Bhatia, Esteban Castillo, Zhuo Cheng, Sreekar Dhaduvai, Qi Duan, Bryanna Hebenstreit, Md. Mazharul Islam, Younes Karimi, Amir Masoumzadeh, Brodie Mather, Sashank Santhanam, Samira Shaikh, Alan Zemel, Tomek Strzalkowski, Bonnie J. Dorr:
Active Defense Against Social Engineering: The Case for Human Language Technology. STOC@LREC 2020: 1-8 - [c152]Md. Mazharul Islam, Ehab Al-Shaer:
Active Deception Framework: An Extensible Development Environment for Adaptive Cyber Deception. SecDev 2020: 41-48 - [c151]Md. Mazharul Islam, Ehab Al-Shaer, Muhammad Abdul Basit Ur Rahim:
Email Address Mutation for Proactive Deterrence Against Lateral Spear-Phishing Attacks. SecureComm (1) 2020: 1-22 - [c150]Ehsan Aghaei, Waseem G. Shadid, Ehab Al-Shaer:
ThreatZoom: Hierarchical Neural Network for CVEs to CWEs Classification. SecureComm (1) 2020: 23-41 - [c149]Muhammad Abdul Basit Ur Rahim, Ehab Al-Shaer, Qi Duan:
A Formal Verification of Configuration-Based Mutation Techniques for Moving Target Defense. SecureComm (1) 2020: 61-79 - 2019
- [c148]Md. Mazharul Islam, Qi Duan, Ehab Al-Shaer:
Specification-driven Moving Target Defense Synthesis. MTD@CCS 2019: 13-24 - [c147]Ashutosh Dutta, Ehab Al-Shaer:
"What", "Where", and "Why" Cybersecurity Controls to Enforce for Optimal Risk Mitigation. CNS 2019: 160-168 - [c146]Muhammad Abdul Basit Ur Rahim, Qi Duan, Ehab Al-Shaer:
A formal verification of mutation-based moving target defense. HotSoS 2019: 10:1-10:2 - [c145]Md. Mazharul Islam, Ehab Al-Shaer, Ashutosh Dutta, Mohammed Noraden Alsaleh:
CLIPS/ActiveSDN for automated and safe cybersecurity course-of-actions orchestration. HotSoS 2019: 13:1-13:3 - [c144]Ashutosh Dutta, Ehab Al-Shaer:
Cyber defense matrix: a new model for optimal composition of cybersecurity controls to construct resilient risk mitigation. HotSoS 2019: 14:1-14:2 - [c143]Ghaith Husari, Ehab Al-Shaer, Bill Chu, Ruhani Faiheem Rahman:
Learning APT chains from cyber threat intelligence. HotSoS 2019: 19:1-19:2 - [c142]Mohiuddin Ahmed, Ehab Al-Shaer:
Measures and metrics for the enforcement of critical security controls: a case study of boundary defense. HotSoS 2019: 21:1-21:3 - [c141]Ehsan Aghaei, Ehab Al-Shaer:
ThreatZoom: neural network for automated vulnerability mitigation. HotSoS 2019: 24:1-24:3 - [c140]Abdullah Al Farooq, Ehab Al-Shaer, Thomas Moyer, Krishna Kant:
IoTC2: A Formal Method Approach for Detecting Conflicts in Large Scale IoT Systems. IM 2019: 442-447 - 2018
- [c139]Mohammed Noraden Alsaleh, Jinpeng Wei, Ehab Al-Shaer, Mohiuddin Ahmed:
gExtractor: Towards Automated Extraction of Malware Deception Parameters. SSPREW@ACSAC 2018: 2:1-2:12 - [c138]Fida Gillani, Ehab Al-Shaer, Qi Duan:
In-design Resilient SDN Control Plane and Elastic Forwarding Against Aggressive DDoS Attacks. MTD@CCS 2018: 80-89 - [c137]Qi Duan, Ehab Al-Shaer, Mazharul Islam, Jafar Haadi Jafarian:
CONCEAL: A Strategy Composition for Resilient Cyber Deception-Framework, Metrics and Deployment. CNS 2018: 1-9 - [c136]Mohiuddin Ahmed, Jinpeng Wei, Yongge Wang, Ehab Al-Shaer:
A Poisoning Attack Against Cryptocurrency Mining Pools. DPM/CBT@ESORICS 2018: 140-154 - [c135]Mohammed Noraden Alsaleh, Ehab Al-Shaer, Qi Duan:
Verifying the Enforcement and Effectiveness of Network Lateral Movement Resistance Techniques. ICETE (2) 2018: 412-423 - [c134]Ghaith Husari, Xi Niu, Bill Chu, Ehab Al-Shaer:
Using Entropy and Mutual Information to Extract Threat Actions from Cyber Threat Intelligence. ISI 2018: 1-6 - [c133]Amirreza Niakanlahiji, Bei-Tseng Chu, Ehab Al-Shaer:
PhishMon: A Machine Learning Framework for Detecting Phishing Webpages. ISI 2018: 220-225 - 2017
- [c132]Ghaith Husari, Ehab Al-Shaer, Mohiuddin Ahmed, Bill Chu, Xi Niu:
TTPDrill: Automatic and Accurate Extraction of Threat Actions from Unstructured Text of CTI Sources. ACSAC 2017: 103-115 - [c131]Morgan Burcham, Mahran Al-Zyoud, Jeffrey C. Carver, Mohammed Noraden Alsaleh, Hongying Du, Fida Gillani, Jun Jiang, Akond Rahman, Özgür Kafali, Ehab Al-Shaer, Laurie A. Williams:
Characterizing Scientific Reporting in Security Literature: An analysis of ACM CCS and IEEE S&P Papers. HotSoS 2017: 13-23 - [c130]Sreyasee Das Bhattacharjee, Ashit Talukder, Ehab Al-Shaer, Pratik Doshi:
Prioritized active learning for malicious URL detection using weighted text-based features. ISI 2017: 107-112 - [c129]Amirreza Niakanlahiji, Mir Mehedi A. Pritom, Bei-tseng Chu, Ehab Al-Shaer:
Predicting Zero-day Malicious IP Addresses. SafeConfig@CCS 2017: 1-6 - 2016
- [c128]Ehab Al-Shaer:
A Cyber Mutation: Metrics, Techniques and Future Directions. MTD@CCS 2016: 1 - [c127]Jafar Haadi Jafarian, Amirreza Niakanlahiji, Ehab Al-Shaer, Qi Duan:
Multi-dimensional Host Identity Anonymization for Defeating Skilled Attackers. MTD@CCS 2016: 47-58 - [c126]Usman Rauf, Fida Gillani, Ehab Al-Shaer, Mahantesh Halappanavar, Samrat Chatterjee, Christopher S. Oehmen:
Formal Approach for Resilient Reachability based on End-System Route Agility. MTD@CCS 2016: 117-127 - [c125]Mujahid Mohsin, Zahid Anwar, Ghaith Husari, Ehab Al-Shaer, Mohammad Ashiqur Rahman:
IoTSAT: A formal framework for security analysis of the internet of things (IoT). CNS 2016: 180-188 - [c124]Mohammad Ashiqur Rahman, Abdullah Al Farooq, Amarjit Datta, Ehab Al-Shaer:
Automated synthesis of resiliency configurations for cyber networks. CNS 2016: 243-251 - [c123]Mohammed Noraden Alsaleh, Ghaith Husari, Ehab Al-Shaer:
Optimizing the RoI of cyber risk mitigation. CNSM 2016: 223-227 - [c122]Mohammad Ashiqur Rahman, A. H. M. Jakaria, Ehab Al-Shaer:
Formal Analysis for Dependable Supervisory Control and Data Acquisition in Smart Grids. DSN 2016: 263-274 - [c121]Spike E. Dog, Alex Tweed, LeRoy Rouse, Bill Chu, Duan Qi, Yueqi Hu, Jing Yang, Ehab Al-Shaer:
Strategic Cyber Threat Intelligence Sharing: A Case Study of IDS Logs. ICCCN 2016: 1-6 - [c120]Mohammed Noraden Alsaleh, Ehab Al-Shaer:
Towards Automated Verification of Active Cyber Defense Strategies on Software Defined Networks. SafeConfig@CCS 2016: 23-29 - 2015
- [c119]Ehab Al-Shaer, Christopher S. Oehmen, Mohammad Ashiqur Rahman:
SafeConfig 2015: Workshop on Automated Decision Making for Active Cyber Defense. CCS 2015: 1711-1712 - [c118]Muhammad Qasim Ali, Ayesha Binte Ashfaq, Ehab Al-Shaer, Qi Duan:
Towards a science of anomaly detection system evasion. CNS 2015: 460-468 - [c117]Fida Gillani, Ehab Al-Shaer, Samantha Lo, Qi Duan, Mostafa H. Ammar, Ellen W. Zegura:
Agile virtualized infrastructure to proactively defend against cyber attacks. INFOCOM 2015: 729-737 - [c116]Jafar Haadi Jafarian, Ehab Al-Shaer, Qi Duan:
Adversary-aware IP address randomization for proactive agility against sophisticated attackers. INFOCOM 2015: 738-746 - [c115]Yasir Imtiaz Khan, Ehab Al-Shaer, Usman Rauf:
Cyber Resilience-by-Construction: Modeling, Measuring & Verifying. SafeConfig@CCS 2015: 9-14 - [c114]Christopher S. Oehmen, Ehab Al-Shaer, Mohammad Ashiqur Rahman:
Automated Decision Making for Active Cyber Defense: Panel Discussion. SafeConfig@CCS 2015: 59 - [c113]Mohammad Ashiqur Rahman, Ehab Al-Shaer:
Formal synthesis of dependable configurations for advanced metering infrastructures. SmartGridComm 2015: 289-294 - 2014
- [c112]Mohammad Ashiqur Rahman, Ehab Al-Shaer, Rakesh B. Bobba:
Moving Target Defense for Hardening the Security of the Power System State Estimation. MTD@CCS 2014: 59-68 - [c111]Jafar Haadi Jafarian, Ehab Al-Shaer, Qi Duan:
Spatio-temporal Address Mutation for Proactive Cyber Agility against Sophisticated Attackers. MTD@CCS 2014: 69-78 - [c110]Ehab Al-Shaer, Krishna Kant:
Summary Abstract for the 7th ACM International Workshop on Cyber Security Analytics, Intelligence and Automation. CCS 2014: 1544-1545 - [c109]Mohammed Noraden Alsaleh, Ehab Al-Shaer:
Security configuration analytics using video games. CNS 2014: 256-264 - [c108]Muhammad Qasim Ali, Reza Yousefian, Ehab Al-Shaer, Sukumar Kamalasadan, Quanyan Zhu:
Two-tier data-driven intrusion detection for automatic generation control in smart grid. CNS 2014: 292-300 - [c107]Mohammad Ashiqur Rahman, Ehab Al-Shaer, Rajesh G. Kavasseri:
Security Threat Analytics and Countermeasure Synthesis for Power System State Estimation. DSN 2014: 156-167 - [c106]Mohammad Ashiqur Rahman, Ehab Al-Shaer, Rajesh G. Kavasseri:
A formal model for verifying the impact of stealthy attacks on optimal power flow in power grids. ICCPS 2014: 175-186 - [c105]Mohammad Ashiqur Rahman, Ehab Al-Shaer, Rajesh G. Kavasseri:
Impact Analysis of Topology Poisoning Attacks on Economic Operation of the Smart Power Grid. ICDCS 2014: 649-659 - [c104]Fida Gillani, Ehab Al-Shaer:
Improving Efficiency of Spam Detection using Economic Model. SafeConfig 2014: 11-18 - [c103]Mohammed Noraden Alsaleh, Ehab Al-Shaer:
Enterprise Risk Assessment Based on Compliance Reports and Vulnerability Scoring Systems. SafeConfig 2014: 25-28 - 2013
- [c102]Qi Duan, Yongge Wang, Fadi Mohsen, Ehab Al-Shaer:
Private and Anonymous Data Storage and Distribution in Cloud. IEEE SCC 2013: 264-271 - [c101]Saeed Al-Haj, Ehab Al-Shaer, HariGovind V. Ramasamy:
Security-Aware Resource Allocation in Clouds. IEEE SCC 2013: 400-407 - [c100]Mohammad Ashiqur Rahman, Fadi Mohsen, Ehab Al-Shaer:
A formal model for sustainable vehicle-to-grid management. SEGS@CCS 2013: 81-92 - [c99]Muhammad Qasim Ali, Ehab Al-Shaer:
Configuration-based IDS for advanced metering infrastructure. CCS 2013: 451-462 - [c98]Ayesha Binte Ashfaq, Muhammad Qasim Ali, Ehab Al-Shaer, Syed Ali Khayam:
Revisiting anomaly detection system design philosophy. CCS 2013: 1473-1476 - [c97]Mohammad Ashiqur Rahman, Mohammad Hossein Manshaei, Ehab Al-Shaer:
A game-theoretic approach for deceiving Remote Operating System Fingerprinting. CNS 2013: 73-81 - [c96]Qi Duan, Ehab Al-Shaer, Jafar Haadi Jafarian:
Efficient Random Route Mutation considering flow and network constraints. CNS 2013: 260-268 - [c95]Mohammed Noraden Alsaleh, Saeed Al-Haj, Ehab Al-Shaer:
Objective metrics for firewall security: A holistic view. CNS 2013: 470-477 - [c94]Saeed Al-Haj, Ehab Al-Shaer:
A formal approach for virtual machine migration planning. CNSM 2013: 51-58 - [c93]Jafar Haadi Jafarian, Ehab Al-Shaer, Qi Duan:
Formal Approach for Route Agility against Persistent Attackers. ESORICS 2013: 237-254 - [c92]Mehmet Demirci, Fida Gillani, Mostafa H. Ammar, Ehab Al-Shaer:
Overlay network placement for diagnosability. GLOBECOM 2013: 2236-2242 - [c91]Mohammad Ashiqur Rahman, Qi Duan, Ehab Al-Shaer:
Energy efficient navigation management for hybrid electric vehicles on highways. ICCPS 2013: 21-30 - [c90]Mohammad Ashiqur Rahman, Ehab Al-Shaer:
A Formal Framework for Network Security Design Synthesis. ICDCS 2013: 560-570 - [c89]Mohammad Ashiqur Rahman, Ehab Al-Shaer:
A formal approach for network security management based on qualitative risk analysis. IM 2013: 244-251 - [c88]Ehab Al-Shaer, Qi Duan, Saeed Al-Haj, Moustafa Youssef:
SensorChecker: reachability verification in mission-oriented sensor networks. MiSeNet@MobiCom 2013: 51-56 - [c87]Mohammad Ashiqur Rahman, Ehab Al-Shaer:
Metrics for Automated Network Security Design. NDSS 2013 - [c86]Mohammad Ashiqur Rahman, Ehab Al-Shaer, Md. Ashfaqur Rahman:
A formal model for verifying stealthy attacks on state estimation in power grids. SmartGridComm 2013: 414-419 - [c85]Muhammad Qasim Ali, Ehab Al-Shaer:
Probabilistic model checking for AMI intrusion detection. SmartGridComm 2013: 468-473 - [c84]Muhammad Qasim Ali, Ehab Al-Shaer, Qi Duan:
Randomizing AMI configuration for proactive defense in smart grid. SmartGridComm 2013: 618-623 - 2012
- [c83]Syed Fida Gillani, Ehab Al-Shaer, Sardar Ali, Syed Ali Khayam:
Monetizing spambot activity and understanding its relation with spambot traffic features. AsiaCCS 2012: 51-52 - [c82]Fida Gillani, Ehab Al-Shaer, Mostafa H. Ammar, Mehmet Demirci:
Fine-grain diagnosis of overlay performance anomalies using end-point network experiences. CNSM 2012: 91-99 - [c81]Qi Duan, Saeed Al-Haj, Ehab Al-Shaer:
Provable configuration planning for wireless sensor networks. CNSM 2012: 316-321 - [c80]Mohamed Shehab, Saeed Al-Haj, Salil Bhagurkar, Ehab Al-Shaer:
Anomaly Discovery and Resolution in MySQL Access Control Policies. DEXA (2) 2012: 514-522 - [c79]Mohammad Ashiqur Rahman, Padmalochan Bera, Ehab Al-Shaer:
SmartAnalyzer: A noninvasive security threat analyzer for AMI smart grid. INFOCOM 2012: 2255-2263 - [c78]Tung Tran, Issam Aib, Ehab Al-Shaer, Raouf Boutaba:
An evasive attack on SNORT flowbits. NOMS 2012: 351-358 - [c77]Mohamed Amezziane, Ehab Al-Shaer, Muhammad Qasim Ali:
On stochastic risk ordering of network services for proactive security management. NOMS 2012: 994-1000 - [c76]Mohammed Noraden Alsaleh, Ehab Al-Shaer, Adel El-Atawy:
Towards a Unified Modeling and Verification of Network and System Security Configurations. SafeConfig 2012: 3-19 - [c75]Mohammad Ashiqur Rahman, Ehab Al-Shaer:
A Declarative Logic-Based Approach for Threat Analysis of Advanced Metering Infrastructure. SafeConfig 2012: 59-77 - [c74]Ehab Al-Shaer, Qi Duan, Jafar Haadi Jafarian:
Random Host Mutation for Moving Target Defense. SecureComm 2012: 310-327 - [c73]Jafar Haadi Jafarian, Ehab Al-Shaer, Qi Duan:
Openflow random host mutation: transparent moving target defense using software defined networking. HotSDN@SIGCOMM 2012: 127-132 - [c72]Mohammad Ashiqur Rahman, Libin Bai, Mohamed Shehab, Ehab Al-Shaer:
Secure Distributed Solution for Optimal Energy Consumption Scheduling in Smart Grid. TrustCom 2012: 279-286 - 2011
- [c71]Bin Zhang, Ehab Al-Shaer:
On synthesizing distributed firewall configurations considering risk, usability and cost constraints. CNSM 2011: 1-8 - [c70]Mohammad Ashiqur Rahman, Ehab Al-Shaer:
A declarative approach for global network security configuration verification and evaluation. Integrated Network Management 2011: 531-538 - [c69]Taghrid Samak, Adel El-Atawy, Ehab Al-Shaer:
QoS policy verification for DiffServ networks. IWQoS 2011: 1-3 - [c68]Saeed Al-Haj, Ehab Al-Shaer:
CloudChecker: An imperative framework for cloud configuration management. SafeConfig 2011 - [c67]Saeed Al-Haj, Ehab Al-Shaer:
Measuring Firewall Security. SafeConfig 2011 - [c66]Ehab Al-Shaer, Mohammed Noraden Alsaleh:
ConfigChecker: A tool for comprehensive security configuration analytics. SafeConfig 2011 - [c65]Mohammed Noraden Alsaleh, Ehab Al-Shaer:
SCAP Based Configuration Analytics for Comprehensive Compliance Checking. SafeConfig 2011 - [c64]Sanjai Narain, Sharad Malik, Ehab Al-Shaer:
Towards Eliminating Configuration Errors in Cyber Infrastructure. SafeConfig 2011 - [c63]Mohammad Ashiqur Rahman, Ehab Al-Shaer:
AMIAnalyzer: Security analysis of AMI configurations. SafeConfig 2011 - [c62]Saeed Al-Haj, Padmalochan Bera, Ehab Al-Shaer:
Build and Test Your Own Network Configuration. SecureComm 2011: 522-532 - 2010
- [c61]Taghrid Samak, Ehab Al-Shaer:
Synthetic security policy generation via network traffic clustering. AISec 2010: 45-53 - [c60]Bin Zhang, Ehab Al-Shaer:
Towards Automatic Creation of Usable Security Configuration. INFOCOM 2010: 341-345 - [c59]Ehab Al-Shaer:
Automated management of network access control from design to enforcement. SACMAT 2010: 77 - [c58]Ehab Al-Shaer, Saeed Al-Haj:
FlowChecker: configuration analysis and verification of federated openflow infrastructures. SafeConfig 2010: 37-44 - 2009
- [c57]Khalid Elbadawi, Ehab Al-Shaer:
TimeVM: a framework for online intrusion mitigation and fast recovery using multi-time-lag traffic replay. AsiaCCS 2009: 135-145 - [c56]Yongning Tang, Ehab Al-Shaer:
Sharing end-user negative symptoms for improving overlay network dependability. DSN 2009: 275-284 - [c55]Kyle Smith, Ehab Al-Shaer, Khalid Elbadawi:
Information Theoretic Approach for Characterizing Spam Botnets Based on Traffic Properties. ICC 2009: 1-5 - [c54]Ehab Al-Shaer, Wilfredo Marrero, Adel El-Atawy, Khalid Elbadawi:
Network Configuration in A Box: Towards End-to-End Verification of Network Reachability and Security. ICNP 2009: 123-132 - [c53]Bin Zhang, Ehab Al-Shaer:
Optimizing correlation structure of event services considering time and capacity constraints. Integrated Network Management 2009: 203-210 - [c52]Adel El-Atawy, Ehab Al-Shaer:
Building Covert Channels over the Packet Reordering Phenomenon. INFOCOM 2009: 2186-2194 - [c51]Adel El-Atawy, Ehab Al-Shaer, Tung Tran, Raouf Boutaba:
Adaptive Early Packet Filtering for Defending Firewalls Against DoS Attacks. INFOCOM 2009: 2437-2445 - [c50]Yongning Tang, Ehab Al-Shaer:
Overlay Fault Diagnosis Based on Evidential Reasoning. INFOCOM 2009: 2596-2600 - [c49]Yongning Tang, Guang Cheng, Zhiwei Xu, Ehab Al-Shaer:
Community-base Fault Diagnosis Using Incremental Belief Revision. NAS 2009: 121-128 - [c48]Taghrid Samak, Adel El-Atawy, Ehab Al-Shaer:
Towards network security policy generation for configuration analysis and testing. SafeConfig 2009: 45-52 - 2008
- [c47]Ehab Al-Shaer, Latifur Khan, Mohammad Salim Ahmed:
A comprehensive objective network security metric framework for proactive security configuration. CSIIRW 2008: 42:1-42:3 - [c46]Mohammad Salim Ahmed, Ehab Al-Shaer, Latifur Khan:
A Novel Quantitative Approach For Measuring Network Security. INFOCOM 2008: 1957-1965 - [c45]Yongning Tang, Ehab Al-Shaer:
Towards Collaborative User-Level Overlay Fault Diagnosis. INFOCOM 2008: 2476-2484 - [c44]Ehab Al-Shaer:
Designing, optimizing, and evaluating network security configuration. NOMS 2008 - [c43]Khalid Alsubhi, Ehab Al-Shaer, Raouf Boutaba:
Alert prioritization in Intrusion Detection Systems. NOMS 2008: 33-40 - [c42]Lopamudra Roychoudhuri, Ehab S. Al-Shaer:
Autonomic QoS optimization of real-time internet audio using loss prediction and stochastic control. NOMS 2008: 73-80 - [c41]Mohammad Salim Ahmed, Ehab Al-Shaer, Mohamed Mahmoud Taibah, Muhammad Abedin, Latifur Khan:
Towards autonomic risk-aware security configuration. NOMS 2008: 722-725 - [c40]Taghrid Samak, Ehab Al-Shaer, Hong Li:
QoS Policy Modeling and Conflict Analysis. POLICY 2008: 19-26 - [c39]Anh Le, Raouf Boutaba, Ehab Al-Shaer:
Correlation-based load balancing for network intrusion detection and prevention systems. SecureComm 2008: 2 - 2007
- [c38]Bin Zhang, Ehab Al-Shaer:
Self-organizing Monitoring Agents for Hierarchical Event Correlation. DSOM 2007: 13-24 - [c37]Taghrid Samak, Adel El-Atawy, Ehab Al-Shaer, Mohamed A. Ismail:
A Novel Visualization Approach for Efficient Network-wide Traffic Monitoring. E2EMON 2007: 1-7 - [c36]Taghrid Samak, Adel El-Atawy, Ehab Al-Shaer:
FireCracker: A Framework for Inferring Firewall Policies using Smart Probing. ICNP 2007: 294-303 - [c35]Yongning Tang, Ehab Al-Shaer, Bin Zhang:
Toward Globally Optimal Event Monitoring & Aggregation For Large-scale Overlay Networks. Integrated Network Management 2007: 236-245 - [c34]Adel El-Atawy, Taghrid Samak, Ehab Al-Shaer, Hong Li:
Using Online Traffic Statistical Matching for Optimizing Packet Filtering Performance. INFOCOM 2007: 866-874 - [c33]Yonghe Yan, Adel El-Atawy, Ehab Al-Shaer:
Ranking-Based Optimal Resource Allocation in Peer-to-Peer Networks. INFOCOM 2007: 1100-1108 - [c32]Tung Tran, Ehab S. Al-Shaer, Raouf Boutaba:
PolicyVis: Firewall Security Policy Visualization and Inspection. LISA 2007: 1-16 - [c31]Adel El-Atawy, Taghrid Samak, Zein Wali, Ehab Al-Shaer, Frank Lin, Christopher Pham, Sheng Li:
An Automated Framework for Validating Firewall Policy Enforcement. POLICY 2007: 151-160 - [c30]Bin Zhang, Ehab Al-Shaer, Radha Jagadeesan, James Riely, Corin Pitcher:
Specifications of a high-level conflict-free firewall policy language for multi-domain networks. SACMAT 2007: 185-194 - 2006
- [c29]Muhammad Abedin, Syeda Nessa, Ehab Al-Shaer, Latifur Khan:
Vulnerability analysis For evaluating quality of protection of security policies. QoP 2006: 49-52 - [c28]Hazem H. Hamed, Ehab Al-Shaer:
Dynamic rule-ordering optimization for high-speed firewall filtering. AsiaCCS 2006: 332-342 - [c27]Hazem H. Hamed, Adel El-Atawy, Ehab Al-Shaer:
Adaptive Statistical Optimization Techniques for Firewall Packet Filtering. INFOCOM 2006 - [c26]Mohammad M. Masud, Latifur Khan, Ehab Al-Shaer:
Email Worm Detection Using Naïve Bayes and Support Vector Machine. ISI 2006: 733-734 - [c25]Yonghe Yan, Adel El-Atawy, Ehab Al-Shaer:
Fair Bandwidth Allocation under User Capacity Constraints. NOMS 2006: 138-149 - [c24]Korosh Golnabi, Richard K. Min, Latifur Khan, Ehab Al-Shaer:
Analysis of Firewall Policy Rules Using Data Mining Techniques. NOMS 2006: 305-315 - [c23]Mohamed Mahmoud Taibah, Ehab Al-Shaer, Raouf Boutaba:
An Architecture for an Email Worm Prevention System. SecureComm 2006: 1-9 - 2005
- [c22]Hazem H. Hamed, Ehab S. Al-Shaer, Will Marrero:
Modeling and Verification of IPSec and VPN Security Policies. ICNP 2005: 259-278 - [c21]Yongning Tang, Ehab S. Al-Shaer, Raouf Boutaba:
Active integrated fault localization in communication networks. Integrated Network Management 2005: 543-556 - [c20]Lopamudra Roychoudhuri, Ehab S. Al-Shaer:
Real-Time Audio Quality Evaluation for Adaptive Multimedia Protocols. MMNS 2005: 133-144 - 2004
- [c19]Ehab S. Al-Shaer, Bin Zhang:
HiFi+: A Monitoring Virtual Machine for Autonomic Distributed Management. DSOM 2004: 28-39 - [c18]Lopamudra Roychoudhuri, Ehab S. Al-Shaer:
Adaptive rate control for real-time packet audio based on loss prediction. GLOBECOM 2004: 634-638 - [c17]Ehab S. Al-Shaer, Hazem H. Hamed:
Discovery of Policy Anomalies in Distributed Firewalls. INFOCOM 2004: 2605-2616 - [c16]Lopamudra Roychoudhuri, Ehab S. Al-Shaer:
Real-time Analysis of Delay Variation for Packet Loss Prediction. MMNS 2004: 213-227 - [c15]Ehab Al-Shaer, Yongning Tang:
MRMON: remote multicast monitoring. NOMS (1) 2004: 585-598 - [c14]Ehab Al-Shaer:
Managing firewall and network-edge security policies. NOMS (1) 2004: 926 - 2003
- [c13]Ehab S. Al-Shaer, Hazem H. Hamed:
Management and translation of filtering security policies. ICC 2003: 256-260 - [c12]Lopamudra Roychoudhuri, Ehab Al-Shaer, Hazem Hamed, Gregory B. Brewster:
Audio transmission over the Internet: experiments and observations. ICC 2003: 552-556 - [c11]Ehab S. Al-Shaer, Hazem H. Hamed:
Firewall Policy Advisor for Anomaly Discovery and Rule Editing. Integrated Network Management 2003: 17-30 - [c10]Mohamed F. Younis, Poonam Munshi, Ehab S. Al-Shaer:
Architecture for Efficient Monitoring and Management of Sensor Networks. MMNS 2003: 488-502 - 2002
- [c9]Ehab Al-Shaer, Yongning Tang:
SMRM: SNMP-based multicast reachability monitoring. NOMS 2002: 467-482 - 2001
- [c8]Ehab Al-Shaer:
A Dynamic Group Management Framework for Large-scale Distributed Event Monitoring. Integrated Network Management 2001: 361-374 - 2000
- [c7]Ehab S. Al-Shaer, Yongning Tang:
Integrating IP Multicasting in Standard Network Management Protocols. MMNS 2000: 239-251 - 1999
- [c6]Ehab S. Al-Shaer:
Programmable Agents for Active Distributed Monitoring. DSOM 1999: 19-32 - [c5]Ehab S. Al-Shaer, Hussein M. Abdel-Wahab, Kurt Maly:
HiFi: A New Monitoring Architecture for Distributed Systems Management. ICDCS 1999: 171-178 - 1997
- [c4]Ehab S. Al-Shaer:
Event Filtering Framework: Key Criteria and Design Trade-offs. COMPSAC 1997: 88-93 - [c3]Ehab S. Al-Shaer, Hussein M. Abdel-Wahab, Kurt Maly:
Application-Layer Group Communication Server for Extending Reliable Multicast Protocols Services. ICNP 1997: 267- - [c2]Ehab S. Al-Shaer, Hussein M. Abdel-Wahab, Kurt Maly:
A scalable monitoring architecture for managing distributed multimedia systems. MMNS 1997: 237-248 - [c1]Ehab S. Al-Shaer, Alaa Youssef, Hussein M. Abdel-Wahab, Kurt Maly, C. Michael Overstreet:
Reliability, Scalability and Robustness Issues in IRI*. WETICE 1997: 320-326
Parts in Books or Collections
- 2020
- [p4]Mohammed Noraden Alsaleh, Ehab Al-Shaer:
Automated Cyber Risk Mitigation: Making Informed Cost-Effective Decisions. Adaptive Autonomous Secure Cyber Systems 2020: 131-157 - 2016
- [p3]Ehab Al-Shaer, Syed Fida Gillani:
Agile Virtual Infrastructure for Cyber Deception Against Stealthy DDoS Attacks. Cyber Deception 2016: 235-259 - 2015
- [p2]Ehab Al-Shaer, Mohammad Ashiqur Rahman:
Attribution, Temptation, and Expectation: A Formal Framework for Defense-by-Deception in Cyberwarfare. Cyber Warfare 2015: 57-80 - 2011
- [p1]Ehab Al-Shaer:
Toward Network Configuration Randomization for Moving Target Defense. Moving Target Defense 2011: 153-159
Editorship
- 2019
- [e17]Xenofon D. Koutsoukos, Alvaro A. Cárdenas, Ehab Al-Shaer:
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, HotSoS 2019, Nashville, TN, USA, April 1-3, 2019. ACM 2019, ISBN 978-1-4503-7147-6 [contents] - 2015
- [e16]Ehab Al-Shaer, Christopher S. Oehmen, Mohammad Ashiqur Rahman:
Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense, SafeConfig 2015, Denver, Colorado, USA, October 12, 2015. ACM 2015, ISBN 978-1-4503-3821-9 [contents] - 2014
- [e15]Ehab Al-Shaer, Krishna Kant:
Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence and Automation, SafeConfig '14, Scottsdale, Arizona, USA, November 3, 2014. ACM 2014, ISBN 978-1-4503-3147-0 [contents] - 2013
- [e14]Ehab Al-Shaer, Xinming Ou, Geoffrey G. Xie:
Automated Security Management [papers from SafeConfig 2012, Baltimore Inner Harbor, MD, USA]. Springer 2013, ISBN 978-3-319-01432-6 [contents] - 2011
- [e13]John Banghart, Ehab Al-Shaer, Tony Sager, HariGovind V. Ramasamy:
4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31 - November 1, 2011. IEEE 2011 [contents] - 2010
- [e12]Ehab Al-Shaer, Angelos D. Keromytis, Vitaly Shmatikov:
Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, Chicago, Illinois, USA, October 4-8, 2010. ACM 2010, ISBN 978-1-4503-0245-6 [contents] - [e11]Ehab Al-Shaer, Brent Lagesse, Craig A. Shue:
Proceedings of the 2010 ACM workshop on Insider threats, Insider Threats '10, Chicago, Illinois, USA, October 8, 2010. ACM 2010, ISBN 978-1-4503-0092-6 [contents] - [e10]Ehab Al-Shaer, Hongxia Jin, Marc Joye:
Proceedings of the 10th ACM Workshop on Digital Rights Management, Chicago, Illinois, USA, October 4, 2010. ACM 2010, ISBN 978-1-4503-0091-9 [contents] - [e9]Ehab Al-Shaer, Keith B. Frikken:
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, WPES 2010, Chicago, Illinois, USA, October 4, 2010. ACM 2010, ISBN 978-1-4503-0096-4 [contents] - 2009
- [e8]Ehab Al-Shaer, Somesh Jha, Angelos D. Keromytis:
Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. ACM 2009, ISBN 978-1-60558-894-0 [contents] - [e7]Ehab Al-Shaer, Hongxia Jin, Gregory L. Heileman:
Proceedings of the 9th ACM Workshop on Digital Rights Management, Chicago, Illinois, USA, November 9, 2009. ACM 2009, ISBN 978-1-60558-779-0 [contents] - [e6]Ehab Al-Shaer, Mohamed G. Gouda, Jorge Lobo, Sanjai Narain, Felix Wu:
Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig 2009, Chicago, IL, USA, November 9, 2009. ACM 2009, ISBN 978-1-60558-778-3 [contents] - [e5]Ehab Al-Shaer, Stefano Paraboschi:
Proceedings of the 2009 ACM Workshop on Privacy in the Electronic Society, WPES 2009, Chicago, Illinois, USA, November 9, 2009. ACM 2009, ISBN 978-1-60558-783-7 [contents] - 2006
- [e4]Ehab Al-Shaer, Aiko Pras, Nevil Brownlee:
Fourth IEEE/IFIP Workshop on End-to-End Monitoring Techniques and Services, E2EMON'06, 3rd April, 2006, Vancouver, BC, Canada. IEEE 2006, ISBN 1-4244-0145-3 [contents] - [e3]Dominique Gaïti, Guy Pujolle, Ehab S. Al-Shaer, Kenneth L. Calvert, Simon A. Dobson, Guy Leduc, Olli Martikainen:
Autonomic Networking, First International IFIP TC6 Conference, AN 2006, Paris, France, September 27-29, 2006, Proceedings. Lecture Notes in Computer Science 4195, Springer 2006, ISBN 3-540-45891-3 [contents] - 2005
- [e2]Ehab Al-Shaer, Aiko Pras, Philippe Owezarski:
Third IEEE/IFIP Workshop on End-to-End Monitoring Techniques and Services, E2EMON 2005, 15th May 2005, Nice, France. IEEE Computer Society 2005, ISBN 0-7803-9249-3 [contents] - 2001
- [e1]Ehab S. Al-Shaer, Giovanni Pacifici:
Management of Multimedia on the Internet, 4th IFIP/IEEE International Conference on Management of Multimedia Networks and Services, MMNS 2001, Chicago, IL, USA October 29 - November 1, 2001, Proceedings. Lecture Notes in Computer Science 2216, Springer 2001, ISBN 3-540-42786-4 [contents]
Reference Works
- 2011
- [r1]Ehab Al-Shaer:
Firewalls. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 474-482
Informal and Other Publications
- 2023
- [i10]Ehsan Aghaei, Ehab Al-Shaer:
CVE-driven Attack Technique Prediction with Semantic Information Extraction and a Domain-specific Language Model. CoRR abs/2309.02785 (2023) - [i9]Ehsan Aghaei, Ehab Al-Shaer, Waseem G. Shadid, Xi Niu:
Automated CVE Analysis for Threat Prioritization and Impact Prediction. CoRR abs/2309.03040 (2023) - 2022
- [i8]Ehsan Aghaei, Xi Niu, Waseem G. Shadid, Ehab Al-Shaer:
Language Model for Text Analytic in Cybersecurity. CoRR abs/2204.02685 (2022) - 2021
- [i7]Siddhartha Shankar Das, Edoardo Serra, Mahantesh Halappanavar, Alex Pothen, Ehab Al-Shaer:
V2W-BERT: A Framework for Effective Hierarchical Multiclass Classification of Software Vulnerabilities. CoRR abs/2102.11498 (2021) - [i6]Ashutosh Dutta, Ehab Al-Shaer, Samrat Chatterjee:
Constraints Satisfiability Driven Reinforcement Learning for Autonomous Cyber Defense. CoRR abs/2104.08994 (2021) - 2020
- [i5]Adam Dalton, Ehsan Aghaei, Ehab Al-Shaer, Archna Bhatia, Esteban Castillo, Zhuo Cheng, Sreekar Dhaduvai, Qi Duan, Md. Mazharul Islam, Younes Karimi, Amir Masoumzadeh, Brodie Mather, Sashank Santhanam, Samira Shaikh, Tomek Strzalkowski, Bonnie J. Dorr:
The Panacea Threat Intelligence and Active Defense Platform. CoRR abs/2004.09662 (2020) - [i4]Ehsan Aghaei, Waseem G. Shadid, Ehab Al-Shaer:
ThreatZoom: CVE2CWE using Hierarchical Neural Network. CoRR abs/2009.11501 (2020) - 2019
- [i3]Mohammad Ashiqur Rahman, Md Hasan Shahriar, Ehab Al-Shaer, Quanyan Zhu:
A Formal Approach for Efficient Navigation Management of Hybrid Electric Vehicles on Long Trips. CoRR abs/1907.00540 (2019) - 2018
- [i2]Abdullah Al Farooq, Ehab Al-Shaer, Thomas Moyer, Krishna Kant:
IoTC2: A Formal Method Approach for Detecting Conflicts in Large Scale IoT Systems. CoRR abs/1812.03966 (2018) - 2014
- [i1]Qi Duan, Jafar Haadi Jafarian, Ehab Al-Shaer, Jinhui Xu:
On DDoS Attack Related Minimum Cut Problems. CoRR abs/1412.3359 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint