Follow
Khalid Elbadawi
Title
Cited by
Cited by
Year
Network configuration in a box: Towards end-to-end verification of network reachability and security
E Al-Shaer, W Marrero, A El-Atawy, K Elbadawi
2009 17th IEEE International Conference on Network Protocols, 123-132, 2009
2362009
Performance modeling and analysis of network firewalls
K Salah, K Elbadawi, R Boutaba
IEEE Transactions on network and service management 9 (1), 12-21, 2011
1262011
Automatic belief network modeling via policy inference for SDN fault localization
Y Tang, G Cheng, Z Xu, F Chen, K Elmansor, Y Wu
Journal of Internet Services and Applications 7 (1), 2016
1232016
An analytical model for estimating cloud resources of elastic services
K Salah, K Elbadawi, R Boutaba
Journal of Network and Systems Management 24, 285-308, 2016
712016
Performance analysis and comparison of interrupt-handling schemes in gigabit networks
K Salah, K El-Badawi, F Haidari
Computer Communications 30 (17), 3425-3441, 2007
482007
Performance evaluation of interrupt-driven kernels in gigabit networks
K Salah, K El-Badawi
GLOBECOM'03. IEEE Global Telecommunications Conference (IEEE Cat. No …, 2003
222003
Evaluating system performance in gigabit networks
K Salah, K El-Badawi
28th Annual IEEE International Conference on Local Computer Networks, 2003 …, 2003
202003
Analysis and simulation of interrupt overhead impact on OS throughput in high‐speed networks
K Salah, K El‐Badawi
International Journal of Communication Systems 18 (5), 501-526, 2005
132005
Improving network services configuration management
K Elbadawi, J Yu
2011 Proceedings of 20th International Conference on Computer Communications …, 2011
122011
On modelling and analysis of receive livelock and CPU utilization in high-speed networks
K Salah, K El-Badawi
International Journal of Computers and Applications 28 (2), 162-169, 2006
92006
The analysis of MATE attack in SDN based on STRIDE model
AEW Eldewahi, A Hassan, K Elbadawi, BIA Barry
Advances in Internet, Data & Web Technologies: The 6th International …, 2018
72018
High level abstraction modeling for network configuration validation
K Elbadawi, J Yu
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-6, 2010
52010
Information theoretic approach for characterizing spam botnets based on traffic properties
K Smith, E Al-Shaer, K Elbadawi
2009 IEEE International Conference on Communications, 1-5, 2009
52009
TimeVM: A Framework for online intrusion mitigation and fast recovery using multi-time-lag traffic replay
K Elbadawi, E Al-Shaer
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
52009
Towards global verification and analysis of network access control configuration
E Al-Shaer, W Marrero, A El-Atawy, K ElBadawi
DePaul University, Chicago, IL, USA, Tech. Rep, 2008
52008
Modeling and analysis of interrupt disable-enable scheme
K Salah, K Elbadawi
21st International Conference on Advanced Information Networking and …, 2007
52007
Theoretical validation of cohesion metrics in object oriented systems
I Hermadi, K El-Badawi, J Al-Ghamdi
International Arab Conference on Information Technology, 16-19, 2002
52002
Throughput and delay analysis of interrupt-driven kernels under poisson and bursty traffic
K Salah, K Elbadawi
International Journal of Computer Systems, Science and Engineering 22 (1-2 …, 2007
42007
Throughput-delay analysis of interrupt-driven kernels with DMA enabled and disabled in high-speed networks
K Salah, K El-Badawi
Journal of High Speed Networks 15 (2), 157-172, 2006
42006
Global Verification and Analysis of Network Access Control Configuration
E Al-Shaer, W Marrero, A El-Atawy, K ElBadawi
32008
The system can't perform the operation now. Try again later.
Articles 1–20