Mohammed Noraden Alsaleh
Mohammed Noraden Alsaleh
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα emich.edu
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
CloudExp: A comprehensive cloud computing experimental framework
Y Jararweh, M Jarrah, Z Alshara, MN Alsaleh, M Al-Ayyoub
Simulation Modelling Practice and Theory 49, 180-192, 2014
812014
ConfigChecker: A tool for comprehensive security configuration analytics
E Al-Shaer, MN Alsaleh
2011 4th Symposium on Configuration Analytics and Automation (SAFECONFIG), 1-2, 2011
182011
SCAP based configuration analytics for comprehensive compliance checking
MN Alsaleh, E Al-Shaer
2011 4th Symposium on Configuration Analytics and Automation (SAFECONFIG), 1-8, 2011
112011
Characterizing scientific reporting in security literature: An analysis of ACM CCS and IEEE S&P papers
M Burcham, M Al-Zyoud, JC Carver, M Alsaleh, H Du, F Gilani, J Jiang, ...
Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp …, 2017
102017
Moath Jarrah, Mazen kharbutli, Zakarea Alshara, Mohammed Noraden Alsaleh, Mahmoud Al-Ayyoub, CloudExp: A comprehensive cloud computing experimental framework
Y Jararweh
Simulation Modelling Practice and Theory 49, 180-192, 2014
82014
Enterprise risk assessment based on compliance reports and vulnerability scoring systems
MN Alsaleh, E Al-Shaer
Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence …, 2014
62014
Roi-driven cyber risk mitigation using host compliance and network configuration
MN Alsaleh, E Al-Shaer, G Husari
Journal of Network and Systems Management 25 (4), 759-783, 2017
52017
Optimizing the roi of cyber risk mitigation
MN Alsaleh, G Husari, E Al-Shaer
2016 12th International Conference on Network and Service Management (CNSM …, 2016
42016
Towards automated verification of active cyber defense strategies on software defined networks
MN Alsaleh, E Al-Shaer
Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active …, 2016
42016
Towards a unified modeling and verification of network and system security configurations
MN Alsaleh, E Al-Shaer, A El-Atawy
Automated Security Management, 3-19, 2013
42013
Objective metrics for firewall security: A holistic view
MN Alsaleh, S Al-Haj, E Al-Shaer
2013 IEEE Conference on Communications and Network Security (CNS), 470-477, 2013
32013
CLIPS/ActiveSDN for automated and safe cybersecurity course-of-actions orchestration
MM Islam, E Al-Shaer, A Dutta, MN Alsaleh
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of …, 2019
12019
gExtractor: Towards Automated Extraction of Malware Deception Parameters
MN Alsaleh, J Wei, E Al-Shaer, M Ahmed
Proceedings of the 8th Software Security, Protection, and Reverse …, 2018
12018
Verifying the Enforcement and Effectiveness of Network Lateral Movement Resistance Techniques.
MN Alsaleh, E Al-Shaer, Q Duan
ICETE (2), 412-423, 2018
12018
Automated Cyber Risk Mitigation: Making Informed Cost-Effective Decisions
MN Alsaleh, E Al-Shaer
Adaptive Autonomous Secure Cyber Systems, 131-157, 2020
2020
gExtractor: Automated Extraction of Malware Deception Parameters
MN Alsaleh, J Wei, E Al-Shaer, M Ahmed
Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of …, 2019
2019
gExtractor: Automated Extraction of Malware Deception Parameters for Autonomous Cyber Deception
MN Alsaleh, J Wei, E Al-Shaer, M Ahmed
Autonomous Cyber Deception, 185-207, 2019
2019
Formal Techniques for Cyber Resilience: Modeling, Synthesis, and Verification
MN Alsaleh
The University of North Carolina at Charlotte, 2018
2018
Security configuration analytics using video games
MN Alsaleh, EA Al-Shaer
2014 IEEE Conference on Communications and Network Security, 256-264, 2014
2014
Comprehensive Risk Analytics: Augmenting Host Compliance with Network Configuration
MN Alsaleh, E Al-Shaer, G Husari
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20