Openflow random host mutation: transparent moving target defense using software defined networking JH Jafarian, E Al-Shaer, Q Duan Proceedings of the first workshop on Hot topics in software defined networks …, 2012 | 739 | 2012 |
Discovery of policy anomalies in distributed firewalls ES Al-Shaer, HH Hamed Ieee Infocom 2004 4, 2605-2616, 2004 | 608 | 2004 |
Firewall policy advisor for anomaly discovery and rule editing ES Al-Shaer, HH Hamed Integrated network management VIII: Managing it all, 17-30, 2003 | 473 | 2003 |
Conflict classification and analysis of distributed firewall policies E Al-Shaer, H Hamed, R Boutaba, M Hasan IEEE journal on selected areas in communications 23 (10), 2069-2084, 2005 | 438 | 2005 |
FlowChecker: Configuration analysis and verification of federated OpenFlow infrastructures E Al-Shaer, S Al-Haj Proceedings of the 3rd ACM workshop on Assurable and usable security …, 2010 | 419 | 2010 |
Modeling and management of firewall policies ES Al-Shaer, HH Hamed IEEE Transactions on network and service management 1 (1), 2-10, 2004 | 382 | 2004 |
Taxonomy of conflicts in network security policies H Hamed, E Al-Shaer IEEE Communications Magazine 44 (3), 134-141, 2006 | 280 | 2006 |
Randomizing AMI configuration for proactive defense in smart grid MQ Ali, E Al-Shaer, Q Duan 2013 IEEE International Conference on Smart Grid Communications …, 2013 | 243 | 2013 |
Network configuration in a box: Towards end-to-end verification of network reachability and security E Al-Shaer, W Marrero, A El-Atawy, K Elbadawi 2009 17th IEEE International Conference on Network Protocols, 123-132, 2009 | 235 | 2009 |
Modeling and verification of IPSec and VPN security policies H Hamed, E Al-Shaer, W Marrero 13th IEEE International Conference on Network Protocols (ICNP'05), 10 pp.-278, 2005 | 235 | 2005 |
Ttpdrill: Automatic and accurate extraction of threat actions from unstructured text of cti sources G Husari, E Al-Shaer, M Ahmed, B Chu, X Niu Proceedings of the 33rd annual computer security applications conference …, 2017 | 210 | 2017 |
Random host mutation for moving target defense E Al-Shaer, Q Duan, JH Jafarian International Conference on Security and Privacy in Communication Systems …, 2012 | 201 | 2012 |
Dynamic rule-ordering optimization for high-speed firewall filtering H Hamed, E Al-Shaer Proceedings of the 2006 ACM Symposium on Information, computer and …, 2006 | 167 | 2006 |
An effective address mutation approach for disrupting reconnaissance attacks JH Jafarian, E Al-Shaer, Q Duan IEEE Transactions on Information Forensics and Security 10 (12), 2562-2577, 2015 | 166 | 2015 |
Efficient random route mutation considering flow and network constraints Q Duan, E Al-Shaer, H Jafarian 2013 IEEE Conference on Communications and Network Security (CNS), 260-268, 2013 | 148 | 2013 |
Object-Oriented Components for High-speed Network Programming. DC Schmidt, TH Harrison, E Al-Shaer COOTS 95, 3-3, 1995 | 144 | 1995 |
Toward network configuration randomization for moving target defense E Al-Shaer Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats …, 2011 | 143 | 2011 |
Analysis of firewall policy rules using data mining techniques K Golnabi, RK Min, L Khan, E Al-Shaer 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006, 305-315, 2006 | 142 | 2006 |
Data-driven analytics for cyber-threat intelligence and information sharing S Qamar, Z Anwar, MA Rahman, E Al-Shaer, BT Chu Computers & Security 67, 35-58, 2017 | 140 | 2017 |
Spatio-temporal address mutation for proactive cyber agility against sophisticated attackers JHH Jafarian, E Al-Shaer, Q Duan Proceedings of the First ACM Workshop on Moving Target Defense, 69-78, 2014 | 125 | 2014 |