A testbed for analyzing security of SCADA control systems (TASSCS) M Mallouhi, Y Al-Nashif, D Cox, T Chadaga, S Hariri Innovative Smart Grid Technologies (ISGT), 2011 IEEE PES, 1-7, 2011 | 222 | 2011 |
Wireless anomaly detection based on IEEE 802.11 behavior analysis H Alipour, YB Al-Nashif, P Satam, S Hariri IEEE transactions on information forensics and security 10 (10), 2158-2170, 2015 | 99 | 2015 |
Multi-level intrusion detection system (ML-IDS) Y Al-Nashif, AA Kumar, S Hariri, Y Luo, F Szidarovsky, G Qu 2008 International Conference on Autonomic Computing, 131-140, 2008 | 88 | 2008 |
Game theory based network security Y Luo, F Szidarovszky, Y Al-Nashif, S Hariri Journal of Information Security 1 (01), 41, 2010 | 60 | 2010 |
Anomaly-based behavior analysis of wireless network security S Fayssal, S Hariri, Y Al-Nashif 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems …, 2007 | 55 | 2007 |
Static versus dynamic data information fusion analysis using DDDAS for cyber security trust E Blasch, Y Al-Nashif, S Hariri Advances and Applications of DSmT for Information Fusion, Vol. IV: Collected …, 2015 | 54 | 2015 |
Static Versus Dynamic Data Information Fusion Analysis Using DDDAS for Cyber Security Trust E Blasch, Y Al-Nashif, S Hariri Procedia Computer Science 29, 1299-1313, 2014 | 54 | 2014 |
Anomaly behavior analysis of DNS protocol P Satam, H Alipour, Y Al-Nashif, S Hariri J. Internet Serv. Inf. Secur 5 (4), 85-97, 2015 | 38 | 2015 |
Anomaly based intrusion detection for building automation and control networks Z Pan, S Hariri, Y Al-Nashif 2014 IEEE/ACS 11th International Conference on Computer Systems and …, 2014 | 34 | 2014 |
Autonomic workload and resources management of cloud computing services F Fargo, C Tunc, Y Al-Nashif, A Akoglu, S Hariri 2014 International Conference on Cloud and Autonomic Computing, 101-110, 2014 | 31 | 2014 |
Self-configuration of network security H Chen, YB Al-Nashif, G Qu, S Hariri Enterprise Distributed Object Computing Conference, 2007. EDOC 2007. 11th …, 2007 | 29 | 2007 |
Anomaly behavior analysis system for ZigBee in smart buildings B Al Baalbaki, J Pacheco, C Tunc, S Hariri, Y Al-Nashif 2015 IEEE/ACS 12th International Conference of Computer Systems and …, 2015 | 28 | 2015 |
Autonomic Resilient Cloud Management (ARCM) Design and Evaluation C Tunc, F Fargo, Y Al-Nashif, S Hariri, J Hughes Cloud and Autonomic Computing (ICCAC), 2014 International Conference on, 44-49, 2014 | 26 | 2014 |
Resilient dynamic data driven application systems (rdddas) G Dsouza, S Hariri, Y Al-Nashif, G Rodriguez Procedia Computer Science 18, 1929-1938, 2013 | 26 | 2013 |
Teaching and Training Cybersecurity as a Cloud Service C Tunc, S Hariri, FDLP Montero, F Fargo, P Satam, Y Al-Nashif 2015 International Conference on Cloud and Autonomic Computing, 302-308, 2015 | 23 | 2015 |
A game theory based risk and impact analysis method for intrusion defense systems Y Luo, F Szidarovszky, Y Al-Nashif, S Hariri 2009 IEEE/ACS International Conference on Computer Systems and Applications …, 2009 | 23 | 2009 |
Autonomic performance-per-watt management (APM) of cloud resources and services F Fargo, C Tunc, Y Al-Nashif, S Hariri Proceedings of the 2013 ACM Cloud and Autonomic Computing Conference, 1-10, 2013 | 21 | 2013 |
Application of autonomic agents for global information grid management and security DP Cox, Y Al-Nashif, S Hariri Proceedings of the 2007 summer computer simulation conference, 1147-1154, 2007 | 19 | 2007 |
Dns-ids: Securing dns in the cloud era P Satam, H Alipour, Y Al-Nashif, S Hariri 2015 International Conference on Cloud and Autonomic Computing, 296-301, 2015 | 18 | 2015 |
Building resilient cloud services using DDDAS and moving target defence G Dsouza, G Rodriguez, Y Al-Nashif, S Hariri International Journal of Cloud Computing 1 2 (2-3), 171-190, 2013 | 18 | 2013 |