Network configuration in a box: Towards end-to-end verification of network reachability and security E Al-Shaer, W Marrero, A El-Atawy, K Elbadawi 2009 17th IEEE International Conference on Network Protocols, 123-132, 2009 | 236 | 2009 |
Performance modeling and analysis of network firewalls K Salah, K Elbadawi, R Boutaba IEEE Transactions on network and service management 9 (1), 12-21, 2011 | 126 | 2011 |
Automatic belief network modeling via policy inference for SDN fault localization Y Tang, G Cheng, Z Xu, F Chen, K Elmansor, Y Wu Journal of Internet Services and Applications 7 (1), 2016 | 123 | 2016 |
An analytical model for estimating cloud resources of elastic services K Salah, K Elbadawi, R Boutaba Journal of Network and Systems Management 24, 285-308, 2016 | 71 | 2016 |
Performance analysis and comparison of interrupt-handling schemes in gigabit networks K Salah, K El-Badawi, F Haidari Computer Communications 30 (17), 3425-3441, 2007 | 48 | 2007 |
Performance evaluation of interrupt-driven kernels in gigabit networks K Salah, K El-Badawi GLOBECOM'03. IEEE Global Telecommunications Conference (IEEE Cat. No …, 2003 | 22 | 2003 |
Evaluating system performance in gigabit networks K Salah, K El-Badawi 28th Annual IEEE International Conference on Local Computer Networks, 2003 …, 2003 | 20 | 2003 |
Analysis and simulation of interrupt overhead impact on OS throughput in high‐speed networks K Salah, K El‐Badawi International Journal of Communication Systems 18 (5), 501-526, 2005 | 13 | 2005 |
Improving network services configuration management K Elbadawi, J Yu 2011 Proceedings of 20th International Conference on Computer Communications …, 2011 | 12 | 2011 |
On modelling and analysis of receive livelock and CPU utilization in high-speed networks K Salah, K El-Badawi International Journal of Computers and Applications 28 (2), 162-169, 2006 | 9 | 2006 |
The analysis of MATE attack in SDN based on STRIDE model AEW Eldewahi, A Hassan, K Elbadawi, BIA Barry Advances in Internet, Data & Web Technologies: The 6th International …, 2018 | 7 | 2018 |
High level abstraction modeling for network configuration validation K Elbadawi, J Yu 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-6, 2010 | 5 | 2010 |
Information theoretic approach for characterizing spam botnets based on traffic properties K Smith, E Al-Shaer, K Elbadawi 2009 IEEE International Conference on Communications, 1-5, 2009 | 5 | 2009 |
TimeVM: A Framework for online intrusion mitigation and fast recovery using multi-time-lag traffic replay K Elbadawi, E Al-Shaer Proceedings of the 4th International Symposium on Information, Computer, and …, 2009 | 5 | 2009 |
Towards global verification and analysis of network access control configuration E Al-Shaer, W Marrero, A El-Atawy, K ElBadawi DePaul University, Chicago, IL, USA, Tech. Rep, 2008 | 5 | 2008 |
Modeling and analysis of interrupt disable-enable scheme K Salah, K Elbadawi 21st International Conference on Advanced Information Networking and …, 2007 | 5 | 2007 |
Theoretical validation of cohesion metrics in object oriented systems I Hermadi, K El-Badawi, J Al-Ghamdi International Arab Conference on Information Technology, 16-19, 2002 | 5 | 2002 |
Throughput and delay analysis of interrupt-driven kernels under poisson and bursty traffic K Salah, K Elbadawi International Journal of Computer Systems, Science and Engineering 22 (1-2 …, 2007 | 4 | 2007 |
Throughput-delay analysis of interrupt-driven kernels with DMA enabled and disabled in high-speed networks K Salah, K El-Badawi Journal of High Speed Networks 15 (2), 157-172, 2006 | 4 | 2006 |
Global Verification and Analysis of Network Access Control Configuration E Al-Shaer, W Marrero, A El-Atawy, K ElBadawi | 3 | 2008 |