Follow
Youssif Al-Nashif
Youssif Al-Nashif
Florida Polytechnic University
Verified email at floridapoly.edu
Title
Cited by
Cited by
Year
A testbed for analyzing security of SCADA control systems (TASSCS)
M Mallouhi, Y Al-Nashif, D Cox, T Chadaga, S Hariri
Innovative Smart Grid Technologies (ISGT), 2011 IEEE PES, 1-7, 2011
2222011
Wireless anomaly detection based on IEEE 802.11 behavior analysis
H Alipour, YB Al-Nashif, P Satam, S Hariri
IEEE transactions on information forensics and security 10 (10), 2158-2170, 2015
992015
Multi-level intrusion detection system (ML-IDS)
Y Al-Nashif, AA Kumar, S Hariri, Y Luo, F Szidarovsky, G Qu
2008 International Conference on Autonomic Computing, 131-140, 2008
882008
Game theory based network security
Y Luo, F Szidarovszky, Y Al-Nashif, S Hariri
Journal of Information Security 1 (01), 41, 2010
602010
Anomaly-based behavior analysis of wireless network security
S Fayssal, S Hariri, Y Al-Nashif
2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems …, 2007
552007
Static versus dynamic data information fusion analysis using DDDAS for cyber security trust
E Blasch, Y Al-Nashif, S Hariri
Advances and Applications of DSmT for Information Fusion, Vol. IV: Collected …, 2015
542015
Static Versus Dynamic Data Information Fusion Analysis Using DDDAS for Cyber Security Trust
E Blasch, Y Al-Nashif, S Hariri
Procedia Computer Science 29, 1299-1313, 2014
542014
Anomaly behavior analysis of DNS protocol
P Satam, H Alipour, Y Al-Nashif, S Hariri
J. Internet Serv. Inf. Secur 5 (4), 85-97, 2015
382015
Anomaly based intrusion detection for building automation and control networks
Z Pan, S Hariri, Y Al-Nashif
2014 IEEE/ACS 11th International Conference on Computer Systems and …, 2014
342014
Autonomic workload and resources management of cloud computing services
F Fargo, C Tunc, Y Al-Nashif, A Akoglu, S Hariri
2014 International Conference on Cloud and Autonomic Computing, 101-110, 2014
312014
Self-configuration of network security
H Chen, YB Al-Nashif, G Qu, S Hariri
Enterprise Distributed Object Computing Conference, 2007. EDOC 2007. 11th …, 2007
292007
Anomaly behavior analysis system for ZigBee in smart buildings
B Al Baalbaki, J Pacheco, C Tunc, S Hariri, Y Al-Nashif
2015 IEEE/ACS 12th International Conference of Computer Systems and …, 2015
282015
Autonomic Resilient Cloud Management (ARCM) Design and Evaluation
C Tunc, F Fargo, Y Al-Nashif, S Hariri, J Hughes
Cloud and Autonomic Computing (ICCAC), 2014 International Conference on, 44-49, 2014
262014
Resilient dynamic data driven application systems (rdddas)
G Dsouza, S Hariri, Y Al-Nashif, G Rodriguez
Procedia Computer Science 18, 1929-1938, 2013
262013
Teaching and Training Cybersecurity as a Cloud Service
C Tunc, S Hariri, FDLP Montero, F Fargo, P Satam, Y Al-Nashif
2015 International Conference on Cloud and Autonomic Computing, 302-308, 2015
232015
A game theory based risk and impact analysis method for intrusion defense systems
Y Luo, F Szidarovszky, Y Al-Nashif, S Hariri
2009 IEEE/ACS International Conference on Computer Systems and Applications …, 2009
232009
Autonomic performance-per-watt management (APM) of cloud resources and services
F Fargo, C Tunc, Y Al-Nashif, S Hariri
Proceedings of the 2013 ACM Cloud and Autonomic Computing Conference, 1-10, 2013
212013
Application of autonomic agents for global information grid management and security
DP Cox, Y Al-Nashif, S Hariri
Proceedings of the 2007 summer computer simulation conference, 1147-1154, 2007
192007
Dns-ids: Securing dns in the cloud era
P Satam, H Alipour, Y Al-Nashif, S Hariri
2015 International Conference on Cloud and Autonomic Computing, 296-301, 2015
182015
Building resilient cloud services using DDDAS and moving target defence
G Dsouza, G Rodriguez, Y Al-Nashif, S Hariri
International Journal of Cloud Computing 1 2 (2-3), 171-190, 2013
182013
The system can't perform the operation now. Try again later.
Articles 1–20