Cyber deception S Jajodia, VS Subrahmanian, V Swarup, C Wang Springer, 2016 | 87 | 2016 |
Agile virtualized infrastructure to proactively defend against cyber attacks F Gillani, E Al-Shaer, S Lo, Q Duan, M Ammar, E Zegura 2015 IEEE Conference on Computer Communications (INFOCOM), 729-737, 2015 | 84 | 2015 |
Formal approach for resilient reachability based on end-system route agility U Rauf, F Gillani, E Al-Shaer, M Halappanavar, S Chatterjee, C Oehmen Proceedings of the 2016 ACM Workshop on Moving Target Defense, 117-127, 2016 | 19 | 2016 |
In-design Resilient SDN Control Plane and Elastic Forwarding Against Aggressive DDoS Attacks F Gillani, E Al-Shaer, Q Duan Proceedings of the 5th ACM Workshop on Moving Target Defense, 80-89, 2018 | 17 | 2018 |
Economic metric to improve spam detectors F Gillani, E Al-Shaer, B AsSadhan Journal of Network and Computer Applications 65, 131-143, 2016 | 13 | 2016 |
Characterizing scientific reporting in security literature: An analysis of ACM CCS and IEEE S&P papers M Burcham, M Al-Zyoud, JC Carver, M Alsaleh, H Du, F Gilani, J Jiang, ... Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp …, 2017 | 11 | 2017 |
Problem localization and quantification using formal evidential reasoning for virtual networks SF Gillani, M Demirci, E Al-Shaer, MH Ammar IEEE Transactions on Network and Service Management 11 (3), 307-320, 2014 | 10 | 2014 |
Overlay network placement for diagnosability M Demirci, F Gillani, M Ammar, E Al-Shaer 2013 IEEE Global Communications Conference (GLOBECOM), 2236-2242, 2013 | 6 | 2013 |
Agile virtual infrastructure for cyber deception against stealthy ddos attacks E Al-Shaer, SF Gillani Cyber Deception, 233-257, 2016 | 5 | 2016 |
Decision theoretic approach to detect anomalies beyond enterprise boundaries S Fida, U Kalim, N Latif, SA Khayam 2011 4th Symposium on Configuration Analytics and Automation (SAFECONFIG), 1-9, 2011 | 4 | 2011 |
Fine-grain diagnosis of overlay performance anomalies using end-point network experiences F Gillani, E Al-Shaer, M Ammar, M Demirci Proceedings of the 8th International Conference on Network and Service …, 2012 | 3 | 2012 |
Improving efficiency of spam detection using economic model F Gillani, E Al-Shaer Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence …, 2014 | 2 | 2014 |
A Performance Evaluation of Anomaly Detection Algorithms for Internet Paths F Hussain, U Kalim, N Latif, SA Khayam Tech. Rep., 2009.[Online]. Available: https://confluence. slac. stanford …, 0 | 2 | |
Using End-to-End Bandwidth Estimates for Anomaly Detection beyond Enterprise Boundaries F Hussain, I NUST, U Kalim, I NUST, N Latif, A Khayam, I NUST SLAC National Accelerator Lab., Menlo Park, CA (United States), 2010 | 1 | 2010 |
Monetizing spambot activity and understanding its relation with spambot traffic features SF Gillani, E Al-Shaer, S Ali, SA Khayam Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012 | | 2012 |
Evaluation of IP Geolocation Algorithms on PingER and Planet-Lab Infrastructures F Hussain, R Les Cottrell, Q Lone, F Batool, Z Gilani, A Hussain, U Kalim | | |