Mohammed Noraden Alsaleh
TitleCited byYear
Cloudexp: A comprehensive cloud computing experimental framework
Y Jararweh, M Jarrah, Z Alshara, MN Alsaleh, M Al-Ayyoub
Simulation Modelling Practice and Theory 49, 180-192, 2014
ConfigChecker: A tool for comprehensive security configuration analytics
E Al-Shaer, MN Alsaleh
2011 4th Symposium on Configuration Analytics and Automation (SAFECONFIG), 1-2, 2011
SCAP based configuration analytics for comprehensive compliance checking
MN Alsaleh, E Al-Shaer
2011 4th Symposium on Configuration Analytics and Automation (SAFECONFIG), 1-8, 2011
Characterizing scientific reporting in security literature: An analysis of ACM CCS and IEEE S&P papers
M Burcham, M Al-Zyoud, JC Carver, M Alsaleh, H Du, F Gilani, J Jiang, ...
Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp …, 2017
M. kharbutli, Z
Y Jararweh, M Jarrah
Alshara, MN Alsaleh, and M. Al-Ayyoub,“CloudExp: A comprehensive cloud …, 2014
Enterprise risk assessment based on compliance reports and vulnerability scoring systems
MN Alsaleh, E Al-Shaer
Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence …, 2014
Towards a unified modeling and verification of network and system security configurations
MN Alsaleh, E Al-Shaer, A El-Atawy
Automated Security Management, 3-19, 2013
Optimizing the roi of cyber risk mitigation
MN Alsaleh, G Husari, E Al-Shaer
2016 12th International Conference on Network and Service Management (CNSM …, 2016
Towards automated verification of active cyber defense strategies on software defined networks
MN Alsaleh, E Al-Shaer
Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active …, 2016
Objective metrics for firewall security: A holistic view
MN Alsaleh, S Al-Haj, E Al-Shaer
2013 IEEE Conference on Communications and Network Security (CNS), 470-477, 2013
ROI-driven cyber risk mitigation using host compliance and network configuration
MN Alsaleh, E Al-Shaer, G Husari
Journal of Network and Systems Management 25 (4), 759-783, 2017
CLIPS/ActiveSDN for automated and safe cybersecurity course-of-actions orchestration
MM Islam, E Al-Shaer, A Dutta, MN Alsaleh
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of …, 2019
gExtractor: Towards Automated Extraction of Malware Deception Parameters
MN Alsaleh, J Wei, E Al-Shaer, M Ahmed
Proceedings of the 8th Software Security, Protection, and Reverse …, 2018
Formal Techniques for Cyber Resilience: Modeling, Synthesis, and Verification
MN Alsaleh
The University of North Carolina at Charlotte, 2018
Security configuration analytics using video games
MN Alsaleh, EA Al-Shaer
2014 IEEE Conference on Communications and Network Security, 256-264, 2014
The system can't perform the operation now. Try again later.
Articles 1–15