Ehab Al-Shaer

Ehab S. Al-Shaer

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

57EEKhalid Elbadawi, Ehab Al-Shaer: TimeVM: a framework for online intrusion mitigation and fast recovery using multi-time-lag traffic replay. ASIACCS 2009: 135-145
56EEEhab Al-Shaer, Adel El-Atawy, Taghrid Samak: Automated pseudo-live testing of firewall configuration enforcement. IEEE Journal on Selected Areas in Communications 27(3): 302-314 (2009)
55EEMohammad Salim Ahmed, Ehab Al-Shaer, Latifur Khan: A Novel Quantitative Approach For Measuring Network Security. INFOCOM 2008: 1957-1965
54EEYongning Tang, Ehab Al-Shaer: Towards Collaborative User-Level Overlay Fault Diagnosis. INFOCOM 2008: 2476-2484
53EEKhalid Alsubhi, Ehab Al-Shaer, Raouf Boutaba: Alert prioritization in Intrusion Detection Systems. NOMS 2008: 33-40
52EELopa Roychoudhuri, Ehab S. Al-Shaer: Autonomic QoS optimization of real-time internet audio using loss prediction and stochastic control. NOMS 2008: 73-80
51EEEhab Al-Shaer: Designing, optimizing, and evaluating network security configuration. NOMS 2008
50EEMohammad Salim Ahmed, Ehab Al-Shaer, M. M. Taibah, Muhammad Abedin, Latifur Khan: Towards autonomic risk-aware security configuration. NOMS 2008: 722-725
49EETaghrid Samak, Ehab Al-Shaer, Hong Li: QoS Policy Modeling and Conflict Analysis. POLICY 2008: 19-26
48EEYonghe Yan, Adel El-Atawy, Ehab Al-Shaer: A game-theoretic model for capacity-constrained fair bandwidth allocation. Int. Journal of Network Management 18(6): 485-504 (2008)
47EEEhab Al-Shaer, Charles R. Kalmanek, Felix Wu: Automated Security Configuration Management. J. Network Syst. Manage. 16(3): 231-233 (2008)
46EEBin Zhang, Ehab Al-Shaer: Self-organizing Monitoring Agents for Hierarchical Event Correlation. DSOM 2007: 13-24
45EETaghrid Samak, Adel El-Atawy, Ehab Al-Shaer: FireCracker: A Framework for Inferring Firewall Policies using Smart Probing. ICNP 2007: 294-303
44EEYonghe Yan, Adel El-Atawy, Ehab Al-Shaer: Ranking-Based Optimal Resource Allocation in Peer-to-Peer Networks. INFOCOM 2007: 1100-1108
43EEAdel El-Atawy, Taghrid Samak, Ehab Al-Shaer, Hong Li: Using Online Traffic Statistical Matching for Optimizing Packet Filtering Performance. INFOCOM 2007: 866-874
42EEYongning Tang, Ehab Al-Shaer, Bin Zhang: Toward Globally Optimal Event Monitoring & Aggregation For Large-scale Overlay Networks. Integrated Network Management 2007: 236-245
41EETung Tran, Ehab S. Al-Shaer, Raouf Boutaba: PolicyVis: Firewall Security Policy Visualization and Inspection. LISA 2007: 1-16
40EEAdel El-Atawy, Taghrid Samak, Zein Wali, Ehab Al-Shaer, Frank Lin, Christopher Pham, Sheng Li: An Automated Framework for Validating Firewall Policy Enforcement. POLICY 2007: 151-160
39EEBin Zhang, Ehab Al-Shaer, Radha Jagadeesan, James Riely, Corin Pitcher: Specifications of a high-level conflict-free firewall policy language for multi-domain networks. SACMAT 2007: 185-194
38 Ehab Al-Shaer, Aiko Pras, Nevil Brownlee: Fourth IEEE/IFIP Workshop on End-to-End Monitoring Techniques and Services, E2EMON'06, 3rd April, 2006, Vancouver, BC, Canada IEEE 2006
37 Dominique Gaïti, Guy Pujolle, Ehab S. Al-Shaer, Kenneth L. Calvert, Simon A. Dobson, Guy Leduc, Olli Martikainen: Autonomic Networking, First International IFIP TC6 Conference, AN 2006, Paris, France, September 27-29, 2006, Proceedings Springer 2006
36EEHazem Hamed, Ehab Al-Shaer: Dynamic rule-ordering optimization for high-speed firewall filtering. ASIACCS 2006: 332-342
35EEHazem Hamed, Adel El-Atawy, Ehab Al-Shaer: Adaptive Statistical Optimization Techniques for Firewall Packet Filtering. INFOCOM 2006
34EEMohammad M. Masud, Latifur Khan, Ehab Al-Shaer: Email Worm Detection Using Naïve Bayes and Support Vector Machine. ISI 2006: 733-734
33EEYonghe Yan, Adel El-Atawy, Ehab Al-Shaer: Fair Bandwidth Allocation under User Capacity Constraints. NOMS 2006: 138-149
32EEKorosh Golnabi, Richard K. Min, Latifur Khan, Ehab Al-Shaer: Analysis of Firewall Policy Rules Using Data Mining Techniques. NOMS 2006: 305-315
31EEMuhammad Abedin, Syeda Nessa, Ehab Al-Shaer, Latifur Khan: Vulnerability analysis For evaluating quality of protection of security policies. QoP 2006: 49-52
30EERaouf Boutaba, Ehab Al-Shaer, Kevin C. Almeroth: Special issue: monitoring and measurements of IP networks. Computer Communications 29(10): 1561-1563 (2006)
29EELopamudra Roychoudhuri, Ehab S. Al-Shaer, Gregory B. Brewster: On the impact of loss and delay variation on Internet packet audio transmission. Computer Communications 29(10): 1578-1589 (2006)
28EEHazem Hamed, Adel El-Atawy, Ehab Al-Shaer: On Dynamic Optimization of Packet Matching in High-Speed Firewalls. IEEE Journal on Selected Areas in Communications 24(10): 1817-1830 (2006)
27EEHazem Hamed, Ehab Al-Shaer: On autonomic optimization of firewall policy organization. J. High Speed Networks 15(3): 209-227 (2006)
26EEHazem H. Hamed, Ehab S. Al-Shaer, Will Marrero: Modeling and Verification of IPSec and VPN Security Policies. ICNP 2005: 259-278
25EEYongning Tang, Ehab S. Al-Shaer, Raouf Boutaba: Active integrated fault localization in communication networks. Integrated Network Management 2005: 543-556
24EELopamudra Roychoudhuri, Ehab S. Al-Shaer: Real-Time Audio Quality Evaluation for Adaptive Multimedia Protocols. MMNS 2005: 133-144
23EEEhab Al-Shaer, Hazem Hamed, Raouf Boutaba, M. Hasan: Conflict classification and analysis of distributed firewall policies. IEEE Journal on Selected Areas in Communications 23(10): 2069-2084 (2005)
22EEEhab S. Al-Shaer, Bin Zhang: HiFi+: A Monitoring Virtual Machine for Autonomic Distributed Management. DSOM 2004: 28-39
21EEEhab S. Al-Shaer, Hazem H. Hamed: Discovery of Policy Anomalies in Distributed Firewalls. INFOCOM 2004
20EELopamudra Roychoudhuri, Ehab S. Al-Shaer: Real-time Analysis of Delay Variation for Packet Loss Prediction. MMNS 2004: 213-227
19EEEhab Al-Shaer, Yongning Tang: MRMON: remote multicast monitoring. NOMS (1) 2004: 585-598
18EEEhab Al-Shaer: Managing firewall and network-edge security policies. NOMS (1) 2004: 926
17 Ehab S. Al-Shaer, Hazem H. Hamed: Firewall Policy Advisor for Anomaly Discovery and Rule Editing. Integrated Network Management 2003: 17-30
16EEMohamed F. Younis, Poonam Munshi, Ehab S. Al-Shaer: Architecture for Efficient Monitoring and Management of Sensor Networks. MMNS 2003: 488-502
15EEEhab Al-Shaer, Yongning Tang: SMRM: SNMP-based multicast reachability monitoring. NOMS 2002: 467-482
14EEEhab S. Al-Shaer, Yongning Tang: QoS Path Monitoring for Multicast Networks. J. Network Syst. Manage. 10(3): (2002)
13 Ehab S. Al-Shaer, Giovanni Pacifici: Management of Multimedia on the Internet, 4th IFIP/IEEE International Conference on Management of Multimedia Networks and Services, MMNS 2001, Chicago, IL, USA October 29 - November 1, 2001, Proceedings Springer 2001
12 Ehab S. Al-Shaer, Yongning Tang: Toward integrating IP multicasting in internet network management protocols. Computer Communications 24(5-6): 473-485 (2001)
11 Ehab S. Al-Shaer, Yongning Tang: Integrating IP Multicasting in Standard Network Management Protocols. MMNS 2000: 239-251
10EEEhab S. Al-Shaer, Mohamed Fayad, Hussein M. Abdel-Wahab: Adaptive object-oriented filtering framework for event management applications. ACM Comput. Surv. 32(1es): 37 (2000)
9EEEhab S. Al-Shaer: Active Management Framework for Distributed Multimedia Systems. J. Network Syst. Manage. 8(1): (2000)
8EEEhab S. Al-Shaer: Programmable Agents for Active Distributed Monitoring. DSOM 1999: 19-32
7EEEhab S. Al-Shaer, Hussein M. Abdel-Wahab, Kurt Maly: HiFi: A New Monitoring Architecture for Distributed Systems Management. ICDCS 1999: 171-178
6 Ehab S. Al-Shaer: Dynamic Monitoring Approach for Multi-poin Multimedia Systems. Networking and Information Systems 2(1): 75-88 (1999)
5EEEhab S. Al-Shaer: Event Filtering Framework: Key Criteria and Design Trade-offs. COMPSAC 1997: 88-
4EEEhab S. Al-Shaer, Hussein M. Abdel-Wahab, Kurt Maly: Application-Layer Group Communication Server for Extending Reliable Multicast Protocols Services. ICNP 1997: 267-
3 Ehab S. Al-Shaer, Hussein M. Abdel-Wahab, Kurt Maly: A scalable monitoring architecture for managing distributed multimedia systems. MMNS 1997: 237-248
2EEEhab S. Al-Shaer, Alaa Youssef, Hussein M. Abdel-Wahab, Kurt Maly, C. Michael Overstreet: Reliability, Scalability and Robustness Issues in IRI*. WETICE 1997: 320-326
1 Kurt Maly, Hussein M. Abdel-Wahab, C. Michael Overstreet, J. Christian Wild, Ajay K. Gupta, Alaa Youssef, Emilia Stoica, Ehab S. Al-Shaer: Interactive Distance Learning over Intranets. IEEE Internet Computing 1(1): 60-71 (1997)

Coauthor Index

1Hussein M. Abdel-Wahab [1] [2] [3] [4] [7] [10]
2Muhammad Abedin [31] [50]
3Mohammad Salim Ahmed [50] [55]
4Kevin C. Almeroth [30]
5Khalid Alsubhi [53]
6Raouf Boutaba [23] [25] [30] [41] [53]
7Gregory B. Brewster [29]
8Nevil Brownlee [38]
9Kenneth L. Calvert [37]
10Simon A. Dobson (Simon Dobson) [37]
11Adel El-Atawy [28] [33] [35] [40] [43] [44] [45] [48] [56]
12Khalid Elbadawi [57]
13Mohamed Fayad (Mohamed E. Fayad, M. E. Fayad) [10]
14Dominique Gaïti [37]
15Korosh Golnabi [32]
16Ajay K. Gupta [1]
17Hazem Hamed [23] [27] [28] [35] [36]
18Hazem H. Hamed [17] [21] [26]
19M. Hasan [23]
20Radha Jagadeesan [39]
21Charles R. Kalmanek [47]
22Latifur Khan [31] [32] [34] [50] [55]
23Guy Leduc [37]
24Hong Li [43] [49]
25Sheng Li [40]
26Frank Lin [40]
27Kurt Maly [1] [2] [3] [4] [7]
28Will Marrero [26]
29Olli Martikainen [37]
30Mohammad M. Masud [34]
31Richard K. Min [32]
32Poonam Munshi [16]
33Syeda Nessa [31]
34C. Michael Overstreet [1] [2]
35Giovanni Pacifici [13]
36Christopher Pham [40]
37Corin Pitcher [39]
38Aiko Pras [38]
39Guy Pujolle [37]
40James Riely [39]
41Lopa Roychoudhuri [52]
42Lopamudra Roychoudhuri [20] [24] [29]
43Taghrid Samak [40] [43] [45] [49] [56]
44Emilia Stoica [1]
45M. M. Taibah [50]
46Yongning Tang [11] [12] [14] [15] [19] [25] [42] [54]
47Tung Tran [41]
48Zein Wali [40]
49J. Christian Wild [1]
50Felix Wu [47]
51Yonghe Yan [33] [44] [48]
52Mohamed F. Younis [16]
53Alaa Youssef [1] [2]
54Bin Zhang [22] [39] [42] [46]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)