Ehab Al-Shaer
Orcid: 0000-0002-7665-8293
According to our database1,
Ehab Al-Shaer
authored at least 230 papers
between 1997 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, 2024
2023
symbSODA: Configurable and Verifiable Orchestration Automation for Active Malware Deception.
ACM Trans. Priv. Secur., November, 2023
CVE-driven Attack Technique Prediction with Semantic Information Extraction and a Domain-specific Language Model.
CoRR, 2023
Proceedings of the Data and Applications Security and Privacy XXXVII, 2023
Autonomous Cyber Defense Against Dynamic Multi-strategy Infrastructural DDoS Attacks.
Proceedings of the IEEE Conference on Communications and Network Security, 2023
VeriActor: Dynamic Generation of Challenge-Response Questions for Enhanced Email Sender Verification.
Proceedings of the IEEE Conference on Communications and Network Security, 2023
2022
Proceedings of the Security and Privacy in Communication Networks, 2022
Proceedings of the IEEE International Conference on Big Data, 2022
2021
EAI Endorsed Trans. Security Safety, 2021
Constraints Satisfiability Driven Reinforcement Learning for Autonomous Cyber Defense.
CoRR, 2021
V2W-BERT: A Framework for Effective Hierarchical Multiclass Classification of Software Vulnerabilities.
Proceedings of the 8th IEEE International Conference on Data Science and Advanced Analytics, 2021
Proceedings of the IEEE Conference on Communications and Network Security, 2021
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
J. Inf. Secur. Appl., 2020
A Formal Verification of Configuration-Based Mutation Techniques for Moving Target Defense.
Proceedings of the Security and Privacy in Communication Networks, 2020
Email Address Mutation for Proactive Deterrence Against Lateral Spear-Phishing Attacks.
Proceedings of the Security and Privacy in Communication Networks, 2020
Proceedings of the Security and Privacy in Communication Networks, 2020
Active Deception Framework: An Extensible Development Environment for Adaptive Cyber Deception.
Proceedings of the IEEE Secure Development, SecDev 2020, Atlanta, GA, USA, 2020
Proceedings of the Proceedings for the First International Workshop on Social Threats in Online Conversations: Understanding and Management, 2020
From Word Embedding to Cyber-Phrase Embedding: Comparison of Processing Cybersecurity Texts.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020
DodgeTron: Towards Autonomous Cyber Deception Using Dynamic Hybrid Analysis of Malware.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
Proceedings of the 7th ACM Workshop on Moving Target Defense, 2020
Proceedings of the Adaptive Autonomous Secure Cyber Systems., 2020
2019
A Formal Approach for Efficient Navigation Management of Hybrid Electric Vehicles on Long Trips.
CoRR, 2019
Security design against stealthy attacks on power system state estimation: A formal approach.
Comput. Secur., 2019
IoTC<sup>2</sup>: A Formal Method Approach for Detecting Conflicts in Large Scale IoT Systems.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2019
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, 2019
CLIPS/ActiveSDN for automated and safe cybersecurity course-of-actions orchestration.
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, 2019
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, 2019
Cyber defense matrix: a new model for optimal composition of cybersecurity controls to construct resilient risk mitigation.
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, 2019
Measures and metrics for the enforcement of critical security controls: a case study of boundary defense.
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, 2019
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, 2019
"What", "Where", and "Why" Cybersecurity Controls to Enforce for Optimal Risk Mitigation.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019
Proceedings of the 6th ACM Workshop on Moving Target Defense, 2019
Autonomous Cyber Deception - Reasoning, Adaptive Planning, and Evaluation of HoneyThings
Springer, ISBN: 978-3-030-02110-8, 2019
2018
CoRR, 2018
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018
Using Entropy and Mutual Information to Extract Threat Actions from Cyber Threat Intelligence.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018
Verifying the Enforcement and Effectiveness of Network Lateral Movement Resistance Techniques.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018
CONCEAL: A Strategy Composition for Resilient Cyber Deception-Framework, Metrics and Deployment.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
In-design Resilient SDN Control Plane and Elastic Forwarding Against Aggressive DDoS Attacks.
Proceedings of the 5th ACM Workshop on Moving Target Defense, 2018
Proceedings of the 8th Software Security, 2018
2017
Automated Synthesis of Distributed Network Access Controls: A Formal Framework with Refinement.
IEEE Trans. Parallel Distributed Syst., 2017
Secure and Private Data Aggregation for Energy Consumption Scheduling in Smart Grids.
IEEE Trans. Dependable Secur. Comput., 2017
IEEE Trans. Dependable Secur. Comput., 2017
J. Netw. Syst. Manag., 2017
Comput. Secur., 2017
IoTChecker: A data-driven framework for security analytics of Internet of Things configurations.
Comput. Secur., 2017
Proceedings of the 2017 Workshop on Automated Decision Making for Active Cyber Defense, 2017
Prioritized active learning for malicious URL detection using weighted text-based features.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017
Characterizing Scientific Reporting in Security Literature: An analysis of ACM CCS and IEEE S&P Papers.
Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp, HoTSoS 2017, 2017
TTPDrill: Automatic and Accurate Extraction of Threat Actions from Unstructured Text of CTI Sources.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
Advances in Information Security 67, Springer, ISBN: 978-3-319-32871-3, 2016
Towards Automated Verification of Active Cyber Defense Strategies on Software Defined Networks.
Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense, 2016
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016
Formal Analysis for Dependable Supervisory Control and Data Acquisition in Smart Grids.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016
Proceedings of the 12th International Conference on Network and Service Management, 2016
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 2016
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 2016
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 2016
Proceedings of the Cyber Deception, Building the Scientific Foundation, 2016
2015
Attribution, Temptation, and Expectation: A Formal Framework for Defense-by-Deception in Cyberwarfare.
Proceedings of the Cyber Warfare - Building the Scientific Foundation, 2015
ACM Trans. Inf. Syst. Secur., 2015
IEEE Trans. Inf. Forensics Secur., 2015
Secur. Commun. Networks, 2015
Formal integrated network security analysis tool: formal query-based network security configuration analysis.
IET Networks, 2015
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015
Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense, 2015
Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense, 2015
Adversary-aware IP address randomization for proactive agility against sophisticated attackers.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Problem Localization and Quantification Using Formal Evidential Reasoning for Virtual Networks.
IEEE Trans. Netw. Serv. Manag., 2014
IEEE Trans. Inf. Forensics Secur., 2014
J. Netw. Comput. Appl., 2014
Proceedings of the 2014 Workshop on Cyber Security Analytics, 2014
Enterprise Risk Assessment Based on Compliance Reports and Vulnerability Scoring Systems.
Proceedings of the 2014 Workshop on Cyber Security Analytics, 2014
Impact Analysis of Topology Poisoning Attacks on Economic Operation of the Smart Power Grid.
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014
A formal model for verifying the impact of stealthy attacks on optimal power flow in power grids.
Proceedings of the ACM/IEEE International Conference on Cyber-Physical Systems, 2014
Security Threat Analytics and Countermeasure Synthesis for Power System State Estimation.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
Two-tier data-driven intrusion detection for automatic generation control in smart grid.
Proceedings of the IEEE Conference on Communications and Network Security, 2014
Moving Target Defense for Hardening the Security of the Power System State Estimation.
Proceedings of the First ACM Workshop on Moving Target Defense, 2014
Spatio-temporal Address Mutation for Proactive Cyber Agility against Sophisticated Attackers.
Proceedings of the First ACM Workshop on Moving Target Defense, 2014
Summary Abstract for the 7th ACM International Workshop on Cyber Security Analytics, Intelligence and Automation.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Springer, ISBN: 978-3-319-10371-6, 2014
2013
IEEE Trans. Smart Grid, 2013
ACM Trans. Inf. Syst. Secur., 2013
Adaptive Information Coding for Secure and Reliable Wireless Telesurgery Communications.
Mob. Networks Appl., 2013
IEEE Commun. Mag., 2013
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the 2nd ACM annual international workshop on Mission-oriented wireless sensor networking, 2013
A formal approach for network security management based on qualitative risk analysis.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013
Proceedings of the ACM/IEEE 4th International Conference on Cyber-Physical Systems (with CPS Week 2013), 2013
Proceedings of the 2013 IEEE Global Communications Conference, 2013
Proceedings of the Computer Security - ESORICS 2013, 2013
Proceedings of the 9th International Conference on Network and Service Management, 2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013
Proceedings of the SEGS'13, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the 2013 IEEE International Conference on Services Computing, Santa Clara, CA, USA, June 28, 2013
Proceedings of the 2013 IEEE International Conference on Services Computing, Santa Clara, CA, USA, June 28, 2013
2012
IEEE Trans. Netw. Serv. Manag., 2012
IEEE Trans. Netw. Serv. Manag., 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Openflow random host mutation: transparent moving target defense using software defined networking.
Proceedings of the first workshop on Hot topics in software defined networks, 2012
Proceedings of the Security and Privacy in Communication Networks, 2012
A Declarative Logic-Based Approach for Threat Analysis of Advanced Metering Infrastructure.
Proceedings of the Automated Security Management [papers from SafeConfig 2012, 2012
Towards a Unified Modeling and Verification of Network and System Security Configurations.
Proceedings of the Automated Security Management [papers from SafeConfig 2012, 2012
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Proceedings of the Database and Expert Systems Applications, 2012
Fine-grain diagnosis of overlay performance anomalies using end-point network experiences.
Proceedings of the 8th International Conference on Network and Service Management, 2012
Proceedings of the 8th International Conference on Network and Service Management, 2012
Monetizing spambot activity and understanding its relation with spambot traffic features.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
2011
Proceedings of the Moving Target Defense, 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Secur. Commun. Networks, 2011
J. Netw. Syst. Manag., 2011
Proceedings of the Security and Privacy in Communication Networks, 2011
Proceedings of the 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31, 2011
Proceedings of the 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31, 2011
Proceedings of the 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31, 2011
Proceedings of the 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31, 2011
Proceedings of the 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31, 2011
Proceedings of the 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31, 2011
Proceedings of the 19th International Workshop on Quality of Service, 2011
A declarative approach for global network security configuration verification and evaluation.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011
On synthesizing distributed firewall configurations considering risk, usability and cost constraints.
Proceedings of the 7th International Conference on Network and Service Management, 2011
2010
Int. J. Internet Protoc. Technol., 2010
Autonomic QoS Optimization of Real-Time Internet Audio Using Loss Prediction and Stochastic Control.
Int. J. Adapt. Resilient Auton. Syst., 2010
FlowChecker: configuration analysis and verification of federated openflow infrastructures.
Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration, 2010
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
Proceedings of the 3rd ACM Workshop on Security and Artificial Intelligence, 2010
2009
IEEE J. Sel. Areas Commun., 2009
Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, 2009
Proceedings of the International Conference on Networking, Architecture, and Storage, 2009
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009
Optimizing correlation structure of event services considering time and capacity constraints.
Proceedings of the Integrated Network Management, 2009
Network Configuration in A Box: Towards End-to-End Verification of Network Reachability and Security.
Proceedings of the 17th annual IEEE International Conference on Network Protocols, 2009
Information Theoretic Approach for Characterizing Spam Botnets Based on Traffic Properties.
Proceedings of IEEE International Conference on Communications, 2009
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009
TimeVM: a framework for online intrusion mitigation and fast recovery using multi-time-lag traffic replay.
Proceedings of the 2009 ACM Symposium on Information, 2009
2008
Efficient fault diagnosis using incremental alarm correlation and active investigation for internet and overlay networks.
IEEE Trans. Netw. Serv. Manag., 2008
Int. J. Netw. Manag., 2008
Correlation-based load balancing for network intrusion detection and prevention systems.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008
A comprehensive objective network security metric framework for proactive security configuration.
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008
2007
Specifications of a high-level conflict-free firewall policy language for multi-domain networks.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007
Proceedings of the 21th Large Installation System Administration Conference, 2007
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007
Using Online Traffic Statistical Matching for Optimizing Packet Filtering Performance.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007
Toward Globally Optimal Event Monitoring & Aggregation For Large-scale Overlay Networks.
Proceedings of the Integrated Network Management, 2007
Proceedings of the IEEE International Conference on Network Protocols, 2007
Proceedings of the Fifth IEEE/IFIP Workshop on End-to-End Monitoring Techniques and Services, 2007
Proceedings of the Managing Virtualization of Networks and Services, 2007
2006
IEEE J. Sel. Areas Commun., 2006
J. High Speed Networks, 2006
Comput. Commun., 2006
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006
Proceedings of the Intelligence and Security Informatics, 2006
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
Proceedings of the 2nd ACM Workshop on Quality of Protection, 2006
2005
IEEE Trans. Netw. Serv. Manag., 2005
IEEE J. Sel. Areas Commun., 2005
Proceedings of the Management of Multimedia Networks and Services, 2005
Proceedings of the Integrated Network Management, 2005
Proceedings of the 13th IEEE International Conference on Network Protocols (ICNP 2005), 2005
2004
Proceedings of the Managing Next Generation Convergence Networks and Services, 2004
Proceedings of the Managing Next Generation Convergence Networks and Services, 2004
Proceedings of the Management of Multimedia Networks and Services: 7th IFIP/IEEE International Conference, 2004
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004
Proceedings of the Utility Computing: 15th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, 2004
2003
Proceedings of the Management of Multimedia Networks and Services, 2003
Firewall Policy Advisor for Anomaly Discovery and Rule Editing.
Proceedings of the Integrated Network Management VII, Managing It All, 2003
Proceedings of IEEE International Conference on Communications, 2003
Proceedings of IEEE International Conference on Communications, 2003
2002
Proceedings of the Management Solutions for the New Communications World, 2002
2001
Comput. Commun., 2001
Proceedings of the 2001 IEEE/IFIP International Symposium on Integrated Network Management, 2001
2000
J. Netw. Syst. Manag., 2000
ACM Comput. Surv., 2000
Integrating IP Multicasting in Standard Network Management Protocols.
Proceedings of the Managing QoS in Multimedia Networks and Services, IEEE/IFIP TC6, 2000
1999
Dynamic Monitoring Approach for Multi-poin Multimedia Systems.
Netw. Inf. Syst. J., 1999
Proceedings of the 19th International Conference on Distributed Computing Systems, Austin, TX, USA, May 31, 1999
Proceedings of the Active Technologies for Network and Service Management, 1999
1997
Proceedings of the 6th Workshop on Enabling Technologies (WET-ICE '97), 1997
A scalable monitoring architecture for managing distributed multimedia systems.
Proceedings of the Management of Multimedia Networks and Services, 1997
Application-Layer Group Communication Server for Extending Reliable Multicast Protocols Services.
Proceedings of the 1997 International Conference on Network Protocols (ICNP '97), 1997
Proceedings of the 21st International Computer Software and Applications Conference (COMPSAC '97), 1997