Follow
Syed Fida Hussain Gillani
Syed Fida Hussain Gillani
Senior Software Engineer, Optym
Verified email at optym.com
Title
Cited by
Cited by
Year
Cyber deception
S Jajodia, VS Subrahmanian, V Swarup, C Wang
Springer, 2016
872016
Agile virtualized infrastructure to proactively defend against cyber attacks
F Gillani, E Al-Shaer, S Lo, Q Duan, M Ammar, E Zegura
2015 IEEE Conference on Computer Communications (INFOCOM), 729-737, 2015
842015
Formal approach for resilient reachability based on end-system route agility
U Rauf, F Gillani, E Al-Shaer, M Halappanavar, S Chatterjee, C Oehmen
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 117-127, 2016
192016
In-design Resilient SDN Control Plane and Elastic Forwarding Against Aggressive DDoS Attacks
F Gillani, E Al-Shaer, Q Duan
Proceedings of the 5th ACM Workshop on Moving Target Defense, 80-89, 2018
172018
Economic metric to improve spam detectors
F Gillani, E Al-Shaer, B AsSadhan
Journal of Network and Computer Applications 65, 131-143, 2016
132016
Characterizing scientific reporting in security literature: An analysis of ACM CCS and IEEE S&P papers
M Burcham, M Al-Zyoud, JC Carver, M Alsaleh, H Du, F Gilani, J Jiang, ...
Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp …, 2017
112017
Problem localization and quantification using formal evidential reasoning for virtual networks
SF Gillani, M Demirci, E Al-Shaer, MH Ammar
IEEE Transactions on Network and Service Management 11 (3), 307-320, 2014
102014
Overlay network placement for diagnosability
M Demirci, F Gillani, M Ammar, E Al-Shaer
2013 IEEE Global Communications Conference (GLOBECOM), 2236-2242, 2013
62013
Agile virtual infrastructure for cyber deception against stealthy ddos attacks
E Al-Shaer, SF Gillani
Cyber Deception, 233-257, 2016
52016
Decision theoretic approach to detect anomalies beyond enterprise boundaries
S Fida, U Kalim, N Latif, SA Khayam
2011 4th Symposium on Configuration Analytics and Automation (SAFECONFIG), 1-9, 2011
42011
Fine-grain diagnosis of overlay performance anomalies using end-point network experiences
F Gillani, E Al-Shaer, M Ammar, M Demirci
Proceedings of the 8th International Conference on Network and Service …, 2012
32012
Improving efficiency of spam detection using economic model
F Gillani, E Al-Shaer
Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence …, 2014
22014
A Performance Evaluation of Anomaly Detection Algorithms for Internet Paths
F Hussain, U Kalim, N Latif, SA Khayam
Tech. Rep., 2009.[Online]. Available: https://confluence. slac. stanford …, 0
2
Using End-to-End Bandwidth Estimates for Anomaly Detection beyond Enterprise Boundaries
F Hussain, I NUST, U Kalim, I NUST, N Latif, A Khayam, I NUST
SLAC National Accelerator Lab., Menlo Park, CA (United States), 2010
12010
Monetizing spambot activity and understanding its relation with spambot traffic features
SF Gillani, E Al-Shaer, S Ali, SA Khayam
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
2012
Evaluation of IP Geolocation Algorithms on PingER and Planet-Lab Infrastructures
F Hussain, R Les Cottrell, Q Lone, F Batool, Z Gilani, A Hussain, U Kalim
The system can't perform the operation now. Try again later.
Articles 1–16