Adel El-Atawy
TitleCited byYear
Network configuration in a box: Towards end-to-end verification of network reachability and security
E Al-Shaer, W Marrero, A El-Atawy, K Elbadawi
2009 17th IEEE International Conference on Network Protocols, 123-132, 2009
1982009
Adaptive Statistical Optimization Techniques for Firewall Packet Filtering.
HH Hamed, A El-Atawy, E Al-Shaer
INFOCOM 6, 1-12, 2006
1082006
Policy segmentation for intelligent firewall testing
A El-Atawy, K Ibrahim, H Hamed, E Al-Shaer
1st IEEE ICNP Workshop on Secure Network Protocols, 2005.(NPSec)., 67-72, 2005
732005
On dynamic optimization of packet matching in high-speed firewalls
H Hamed, A El-Atawy, E Al-Shaer
IEEE Journal on Selected Areas in Communications 24 (10), 1817-1830, 2006
722006
Using online traffic statistical matching for optimizing packet filtering performance
A El-Atawy, T Samak, E Al-Shaer, H Li
IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007
712007
Ranking-based optimal resource allocation in peer-to-peer networks
Y Yan, A El-Atawy, E Al-Shaer
IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007
562007
Adaptive early packet filtering for defending firewalls against DoS attacks
A El-Atawy, E Al-Shaer, T Tran, R Boutaba
IEEE INFOCOM 2009, 2437-2445, 2009
522009
An automated framework for validating firewall policy enforcement
A El-Atawy, T Samak, Z Wali, E Al-Shaer, F Lin, C Pham, S Li
Eighth IEEE International Workshop on Policies for Distributed Systems and …, 2007
502007
Building covert channels over the packet reordering phenomenon
A El-Atawy, E Al-Shaer
IEEE INFOCOM 2009, 2186-2194, 2009
442009
Automated pseudo-live testing of firewall configuration enforcement
E Al-Shaer, A El-Atawy, T Samak
IEEE Journal on Selected Areas in Communications 27 (3), 302-314, 2009
382009
Firecracker: A framework for inferring firewall policies using smart probing
T Samak, A El-Atawy, E Al-Shaer
2007 IEEE International Conference on Network Protocols, 294-303, 2007
352007
Adaptive early packet filtering for defending firewalls against DoS Attack
E Al-Shear, A El-Atawy, T Tran
Proceeding of IEEE INFOCOM, 1-9, 2009
192009
A collaborative approach for proactive detection of distributed denial of service attacks
J François, A El-Atawy, E Al Shaer, R Boutaba
162007
A novel class of robust covert channels using out-of-order packets
A El-Atawy, Q Duan, E Al-Shaer
IEEE Transactions on Dependable and Secure Computing 14 (2), 116-129, 2015
142015
Firewall policy reconstruction by active probing: An attacker's view
T Samak, A El-Atawy, E Al-Shaer, H Li
2006 2nd IEEE Workshop on Secure Network Protocols, 20-25, 2006
142006
Towards network security policy generation for configuration analysis and testing
T Samak, A El-Atawy, E Al-Shaer
Proceedings of the 2nd ACM workshop on Assurable and usable security …, 2009
82009
A novel visualization approach for efficient network-wide traffic monitoring
T Samak, A El-Atawy, E Al-Shaer, M Ismail
2007 Workshop on End-to-End Monitoring Techniques and Services, 1-7, 2007
72007
End-to-end verification of QoS policies
A El-Atawy, T Samak
2012 IEEE Network Operations and Management Symposium, 426-434, 2012
62012
Qos policy verification for diffserv networks
T Samak, A El-Atawy, E Al-Shaer
2011 IEEE Nineteenth IEEE International Workshop on Quality of Service, 1-3, 2011
62011
A game‐theoretic model for capacity‐constrained fair bandwidth allocation
Y Yan, A El‐Atawy, E Al‐Shaer
International Journal of Network Management 18 (6), 485-504, 2008
62008
The system can't perform the operation now. Try again later.
Articles 1–20