FlowChecker: Configuration analysis and verification of federated OpenFlow infrastructures E Al-Shaer, S Al-Haj Proceedings of the 3rd ACM workshop on Assurable and usable security …, 2010 | 422 | 2010 |
Recognition of on-line arabic handwritten characters using structural features AT Al-Taani, S Al-Haj Journal of Pattern Recognition Research 5 (1), 23-37, 2010 | 67 | 2010 |
Security-aware resource allocation in clouds S Al-Haj, E Al-Shaer, HGV Ramasamy 2013 IEEE International Conference on Services Computing, 400-407, 2013 | 39 | 2013 |
A formal approach for virtual machine migration planning S Al-Haj, E Al-Shaer Proceedings of the 9th International Conference on Network and Service …, 2013 | 31 | 2013 |
Measuring firewall security S Al-Haj, E Al-Shaer 2011 4th Symposium on Configuration Analytics and Automation (SAFECONFIG), 1-4, 2011 | 20 | 2011 |
Provable configuration planning for wireless sensor networks Q Duan, S Al-Haj, E Al-Shaer 2012 8th international conference on network and service management (cnsm …, 2012 | 15 | 2012 |
Flowtable pipeline misconfigurations in software defined networks S Al-Haj, WJ Tolone 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2017 | 11 | 2017 |
Objective metrics for firewall security: A holistic view MN Alsaleh, S Al-Haj, E Al-Shaer 2013 IEEE Conference on Communications and Network Security (CNS), 470-477, 2013 | 6 | 2013 |
Anomaly discovery and resolution in MySQL access control policies M Shehab, S Al-Haj, S Bhagurkar, E Al-Shaer Database and Expert Systems Applications: 23rd International Conference …, 2012 | 4 | 2012 |
SensorChecker: reachability verification in mission-oriented sensor networks E Al-Shaer, Q Duan, S Al-Haj, M Youssef Proceedings of the 2nd ACM annual international workshop on Mission-oriented …, 2013 | 1 | 2013 |
Build and test your own network configuration S Al-Haj, P Bera, E Al-Shaer Security and Privacy in Communication Networks: 7th International ICST …, 2012 | 1 | 2012 |
Using formal methods towards improving cloud IaaS environments S Al-Haj The University of North Carolina at Charlotte, 2016 | | 2016 |
CloudChecker: An imperative framework for cloud configuration management S Al-Haj, E Al-Shaer 2011 4th Symposium on Configuration Analytics and Automation (SAFECONFIG), 1-1, 2011 | | 2011 |
ON-LINE RECOGNITION OF ARABIC HANDWRITTEN CHARACTERS AT Al-Taani, SM Al-Haj | | |
9 th International Conference on Network and Service Management (CNSM 2013) H Moens, F De Turck, D Breitgand, A Epstein, A Glikson, A Israel, D Raz, ... | | |
2011 Symposium on Configuration Analytics and Automation (SAFECONFIG) WM Fitzgerald, SN Foley | | |