Follow
Saeed Al-Haj
Title
Cited by
Cited by
Year
FlowChecker: Configuration analysis and verification of federated OpenFlow infrastructures
E Al-Shaer, S Al-Haj
Proceedings of the 3rd ACM workshop on Assurable and usable security …, 2010
4222010
Recognition of on-line arabic handwritten characters using structural features
AT Al-Taani, S Al-Haj
Journal of Pattern Recognition Research 5 (1), 23-37, 2010
672010
Security-aware resource allocation in clouds
S Al-Haj, E Al-Shaer, HGV Ramasamy
2013 IEEE International Conference on Services Computing, 400-407, 2013
392013
A formal approach for virtual machine migration planning
S Al-Haj, E Al-Shaer
Proceedings of the 9th International Conference on Network and Service …, 2013
312013
Measuring firewall security
S Al-Haj, E Al-Shaer
2011 4th Symposium on Configuration Analytics and Automation (SAFECONFIG), 1-4, 2011
202011
Provable configuration planning for wireless sensor networks
Q Duan, S Al-Haj, E Al-Shaer
2012 8th international conference on network and service management (cnsm …, 2012
152012
Flowtable pipeline misconfigurations in software defined networks
S Al-Haj, WJ Tolone
2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2017
112017
Objective metrics for firewall security: A holistic view
MN Alsaleh, S Al-Haj, E Al-Shaer
2013 IEEE Conference on Communications and Network Security (CNS), 470-477, 2013
62013
Anomaly discovery and resolution in MySQL access control policies
M Shehab, S Al-Haj, S Bhagurkar, E Al-Shaer
Database and Expert Systems Applications: 23rd International Conference …, 2012
42012
SensorChecker: reachability verification in mission-oriented sensor networks
E Al-Shaer, Q Duan, S Al-Haj, M Youssef
Proceedings of the 2nd ACM annual international workshop on Mission-oriented …, 2013
12013
Build and test your own network configuration
S Al-Haj, P Bera, E Al-Shaer
Security and Privacy in Communication Networks: 7th International ICST …, 2012
12012
Using formal methods towards improving cloud IaaS environments
S Al-Haj
The University of North Carolina at Charlotte, 2016
2016
CloudChecker: An imperative framework for cloud configuration management
S Al-Haj, E Al-Shaer
2011 4th Symposium on Configuration Analytics and Automation (SAFECONFIG), 1-1, 2011
2011
ON-LINE RECOGNITION OF ARABIC HANDWRITTEN CHARACTERS
AT Al-Taani, SM Al-Haj
9 th International Conference on Network and Service Management (CNSM 2013)
H Moens, F De Turck, D Breitgand, A Epstein, A Glikson, A Israel, D Raz, ...
2011 Symposium on Configuration Analytics and Automation (SAFECONFIG)
WM Fitzgerald, SN Foley
The system can't perform the operation now. Try again later.
Articles 1–16