What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Ehab Al-Shaer
Google Scholar
47
publications in security and cryptology related venues
Year
Venue
Title
2023
conf/cns
VeriActor: Dynamic Generation of Challenge-Response Questions for Enhanced Email Sender Verification.
Basel Abdeen
Ehab Al-Shaer
Waseem G. Shadid
2023
conf/cns
Autonomous Cyber Defense Against Dynamic Multi-strategy Infrastructural DDoS Attacks.
Ashutosh Dutta
Ehab Al-Shaer
Samrat Chatterjee
Qi Duan
2021
conf/cns
CHIMERA: Autonomous Planning and Orchestration for Malware Deception.
Md. Mazharul Islam
Ashutosh Dutta
Md Sajidul Islam Sajid
Ehab Al-Shaer
Jinpeng Wei
Sadegh Farhang
2021
conf/acsac
SODA: A System for Cyber Deception Orchestration and Automation.
Md Sajidul Islam Sajid
Jinpeng Wei
Basel Abdeen
Ehab Al-Shaer
Md. Mazharul Islam
Walter Diong
Latifur Khan
2020
journals/istr
A game-theoretic analysis to defend against remote operating system fingerprinting.
Mohammad Ashiqur Rahman
Md. Golam Moula Mehedi Hasan
Mohammad Hossein Manshaei
Ehab Al-Shaer
2020
conf/ccs
Range and Topology Mutation Based Wireless Agility.
Qi Duan
Ehab Al-Shaer
Jiang Xie
2020
conf/cns
DodgeTron: Towards Autonomous Cyber Deception Using Dynamic Hybrid Analysis of Malware.
Md Sajidul Islam Sajid
Jinpeng Wei
Md Rabbi Alam
Ehsan Aghaei
Ehab Al-Shaer
2019
journals/compsec
Security design against stealthy attacks on power system state estimation: A formal approach.
Mohammad Ashiqur Rahman
Amarjit Datta
Ehab Al-Shaer
2019
conf/ccs
Specification-driven Moving Target Defense Synthesis.
Md. Mazharul Islam
Qi Duan
Ehab Al-Shaer
2019
conf/cns
"What", "Where", and "Why" Cybersecurity Controls to Enforce for Optimal Risk Mitigation.
Ashutosh Dutta
Ehab Al-Shaer
2018
conf/ccs
In-design Resilient SDN Control Plane and Elastic Forwarding Against Aggressive DDoS Attacks.
Fida Gillani
Ehab Al-Shaer
Qi Duan
2018
conf/esorics
A Poisoning Attack Against Cryptocurrency Mining Pools.
Mohiuddin Ahmed
Jinpeng Wei
Yongge Wang
Ehab Al-Shaer
2018
conf/cns
CONCEAL: A Strategy Composition for Resilient Cyber Deception-Framework, Metrics and Deployment.
Qi Duan
Ehab Al-Shaer
Mazharul Islam
Jafar Haadi Jafarian
2018
conf/acsac
gExtractor: Towards Automated Extraction of Malware Deception Parameters.
Mohammed Noraden Alsaleh
Jinpeng Wei
Ehab Al-Shaer
Mohiuddin Ahmed
2017
journals/compsec
IoTChecker: A data-driven framework for security analytics of Internet of Things configurations.
Mujahid Mohsin
Zahid Anwar
Farhat Zaman
Ehab Al-Shaer
2017
journals/compsec
Data-driven analytics for cyber-threat intelligence and information sharing.
Sara Qamar
Zahid Anwar
Mohammad Ashiqur Rahman
Ehab Al-Shaer
Bei-tseng Chu
2017
conf/acsac
TTPDrill: Automatic and Accurate Extraction of Threat Actions from Unstructured Text of CTI Sources.
Ghaith Husari
Ehab Al-Shaer
Mohiuddin Ahmed
Bill Chu
Xi Niu
2016
conf/ccs
Multi-dimensional Host Identity Anonymization for Defeating Skilled Attackers.
Jafar Haadi Jafarian
Amirreza Niakanlahiji
Ehab Al-Shaer
Qi Duan
2016
conf/ccs
Formal Approach for Resilient Reachability based on End-System Route Agility.
Usman Rauf
Fida Gillani
Ehab Al-Shaer
Mahantesh Halappanavar
Samrat Chatterjee
Christopher S. Oehmen
2016
conf/ccs
A Cyber Mutation: Metrics, Techniques and Future Directions.
Ehab Al-Shaer
2016
conf/cns
Automated synthesis of resiliency configurations for cyber networks.
Mohammad Ashiqur Rahman
Abdullah Al Farooq
Amarjit Datta
Ehab Al-Shaer
2016
conf/cns
IoTSAT: A formal framework for security analysis of the internet of things (IoT).
Mujahid Mohsin
Zahid Anwar
Ghaith Husari
Ehab Al-Shaer
Mohammad Ashiqur Rahman
2016
conf/dsn
Formal Analysis for Dependable Supervisory Control and Data Acquisition in Smart Grids.
Mohammad Ashiqur Rahman
A. H. M. Jakaria
Ehab Al-Shaer
2015
journals/tifs
An Effective Address Mutation Approach for Disrupting Reconnaissance Attacks.
Jafar Haadi Jafarian
Ehab Al-Shaer
Qi Duan
2015
conf/ccs
SafeConfig 2015: Workshop on Automated Decision Making for Active Cyber Defense.
Ehab Al-Shaer
Christopher S. Oehmen
Mohammad Ashiqur Rahman
2015
conf/cns
Towards a science of anomaly detection system evasion.
Muhammad Qasim Ali
Ayesha Binte Ashfaq
Ehab Al-Shaer
Qi Duan
2014
journals/tifs
Firewall Policy Reconnaissance: Techniques and Analysis.
Muhammad Qasim Ali
Ehab Al-Shaer
Taghrid Samak
2014
conf/ccs
Moving Target Defense for Hardening the Security of the Power System State Estimation.
Mohammad Ashiqur Rahman
Ehab Al-Shaer
Rakesh B. Bobba
2014
conf/ccs
Summary Abstract for the 7th ACM International Workshop on Cyber Security Analytics, Intelligence and Automation.
Ehab Al-Shaer
Krishna Kant
2014
conf/ccs
Spatio-temporal Address Mutation for Proactive Cyber Agility against Sophisticated Attackers.
Jafar Haadi Jafarian
Ehab Al-Shaer
Qi Duan
2014
conf/cns
Security configuration analytics using video games.
Mohammed Noraden Alsaleh
Ehab Al-Shaer
2014
conf/cns
Two-tier data-driven intrusion detection for automatic generation control in smart grid.
Muhammad Qasim Ali
Reza Yousefian
Ehab Al-Shaer
Sukumar Kamalasadan
Quanyan Zhu
2014
conf/dsn
Security Threat Analytics and Countermeasure Synthesis for Power System State Estimation.
Mohammad Ashiqur Rahman
Ehab Al-Shaer
Rajesh G. Kavasseri
2013
conf/ccs
Configuration-based IDS for advanced metering infrastructure.
Muhammad Qasim Ali
Ehab Al-Shaer
2013
conf/ccs
Revisiting anomaly detection system design philosophy.
Ayesha Binte Ashfaq
Muhammad Qasim Ali
Ehab Al-Shaer
Syed Ali Khayam
2013
conf/ccs
A formal model for sustainable vehicle-to-grid management.
Mohammad Ashiqur Rahman
Fadi Mohsen
Ehab Al-Shaer
2013
conf/esorics
Formal Approach for Route Agility against Persistent Attackers.
Jafar Haadi Jafarian
Ehab Al-Shaer
Qi Duan
2013
conf/cns
A game-theoretic approach for deceiving Remote Operating System Fingerprinting.
Mohammad Ashiqur Rahman
Mohammad Hossein Manshaei
Ehab Al-Shaer
2013
conf/cns
Efficient Random Route Mutation considering flow and network constraints.
Qi Duan
Ehab Al-Shaer
Jafar Haadi Jafarian
2013
conf/cns
Objective metrics for firewall security: A holistic view.
Mohammed Noraden Alsaleh
Saeed Al-Haj
Ehab Al-Shaer
2013
conf/ndss
Metrics for Automated Network Security Design.
Mohammad Ashiqur Rahman
Ehab Al-Shaer
2012
conf/ccs
Monetizing spambot activity and understanding its relation with spambot traffic features.
Syed Fida Gillani
Ehab Al-Shaer
Sardar Ali
Syed Ali Khayam
2010
conf/ccs
Synthetic security policy generation via network traffic clustering.
Taghrid Samak
Ehab Al-Shaer
2009
conf/ccs
TimeVM: a framework for online intrusion mitigation and fast recovery using multi-time-lag traffic replay.
Khalid Elbadawi
Ehab Al-Shaer
2009
conf/dsn
Sharing end-user negative symptoms for improving overlay network dependability.
Yongning Tang
Ehab Al-Shaer
2006
conf/ccs
Vulnerability analysis For evaluating quality of protection of security policies.
Muhammad Abedin
Syeda Nessa
Ehab Al-Shaer
Latifur Khan
2006
conf/ccs
Dynamic rule-ordering optimization for high-speed firewall filtering.
Hazem H. Hamed
Ehab Al-Shaer
Coauthors
A. H. M. Jakaria
(1)
Abdullah Al Farooq
(1)
Amarjit Datta
(2)
Amirreza Niakanlahiji
(1)
Ashutosh Dutta
(3)
Ayesha Binte Ashfaq
(2)
Basel Abdeen
(2)
Bei-tseng Chu
(1)
Bill Chu
(1)
Christopher S. Oehmen
(2)
Ehab Al-Shaer
(47)
Ehsan Aghaei
(1)
Fadi Mohsen
(1)
Farhat Zaman
(1)
Fida Gillani
(2)
Ghaith Husari
(2)
Hazem H. Hamed
(1)
Jafar Haadi Jafarian
(6)
Jiang Xie
(1)
Jinpeng Wei
(5)
Khalid Elbadawi
(1)
Krishna Kant
(1)
Latifur Khan
(2)
Mahantesh Halappanavar
(1)
Mazharul Islam
(1)
Md Rabbi Alam
(1)
Md Sajidul Islam Sajid
(3)
Md. Golam Moula Mehedi Hasan
(1)
Md. Mazharul Islam
(3)
Mohammad Ashiqur Rahman
(12)
Mohammad Hossein Manshaei
(2)
Mohammed Noraden Alsaleh
(3)
Mohiuddin Ahmed
(3)
Muhammad Abedin
(1)
Muhammad Qasim Ali
(5)
Mujahid Mohsin
(2)
Qi Duan
(11)
Quanyan Zhu
(1)
Rajesh G. Kavasseri
(1)
Rakesh B. Bobba
(1)
Reza Yousefian
(1)
Sadegh Farhang
(1)
Saeed Al-Haj
(1)
Samrat Chatterjee
(2)
Sara Qamar
(1)
Sardar Ali
(1)
Sukumar Kamalasadan
(1)
Syed Ali Khayam
(2)
Syed Fida Gillani
(1)
Syeda Nessa
(1)
Taghrid Samak
(2)
Usman Rauf
(1)
Walter Diong
(1)
Waseem G. Shadid
(1)
Xi Niu
(1)
Yongge Wang
(1)
Yongning Tang
(1)
Zahid Anwar
(3)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to