CS Store Search
Displaying 1-10 out of 10 total
A Queueing Model to Achieve Proper Elasticity for Cloud Cluster Jobs
2013 IEEE 6th International Conference on Cloud Computing (CLOUD)
By Khaled Salah
Issue Date:June 2013
Achieving proper elasticity for cloud jobs is a challenging research problem and far from being solved. In this paper, we focus on how to achieve proper elasticity for highly parallelized jobs which run on cloud clusters. In particular, we present an analy...
Using Cloud Computing to Implement a Security Overlay Network
IEEE Security & Privacy
By Khaled Salah,Jose M. Alcaraz Calero,Sherali Zeadally,Sameera Al-Mulla,Mohammed Alzaabi
Issue Date:January 2013
This article proposes and analyzes a general cloud-based security overlay network that can be used as a transparent overlay network to provide services such as intrusion detection systems, antivirus and antispam software, and distributed denial-of-service ...
Enhanced EDoS-Shield for Mitigating EDoS Attacks Originating from Spoofed IP Addresses
2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Fahd Al-Haidari,Mohammed H. Sqalli,Khaled Salah
Issue Date:June 2012
Cloud computing has become one of the fastest growing segments in IT industry. A cloud introduces resource-rich computing platforms, where adopters are charged based on the usage of the cloud's resources, known as "pay-as-you-use" or utility comp...
EDoS-Shield - A Two-Steps Mitigation Technique against EDoS Attacks in Cloud Computing
Utility and Cloud Computing, IEEE Internatonal Conference on
By Mohammed H. Sqalli,Fahd Al-Haidari,Khaled Salah
Issue Date:December 2011
Cloud computing is currently one of the most hyped information technology fields and it has become one of the fastest growing segments of IT. Cloud computing allows us to scale our servers in magnitude and availability in order to provide services to a gre...
Identifying Scanning Activities in Honeynet Data Using Data Mining
Computational Intelligence, Communication Systems and Networks, International Conference on
By Mohammed H. Sqalli,Shoieb Arshad,Mohammad Khalaf,Khaled Salah
Issue Date:July 2011
Businesses attract different types of attacks mostly due to the financial benefits associated with gaining unauthorized access. As a first step to launching attacks, attackers scan production networks looking for open services and vulnerable software. Thes...
Periodic Route Optimization for Handed-Off Connections in Wireless ATM Networks
Local Computer Networks, Annual IEEE Conference on
By Khaled Salah, Elias Drakopoulos, Tzilla Elrad
Issue Date:October 1999
In Wireless ATM networks, user connections need to be rerouted during handoff as mobile users move among base stations. The rerouting of connections must be done quickly with minimal disruption to traffic. In addition, the resulting routes must be optimal....
A Two-Phase Inter-Switch Handoff Scheme for Wireless ATM Networks
Computer Communications and Networks, International Conference on
By Khaled Salah, Elias Drakopoulos
Issue Date:October 1998
Supporting mobility in Wireless ATM networks poses a number of technical issues. An important issue is the ability to reroute on-going virtual connections during handoff as mobile users move among base stations. We propose a two-phase inter-switch handoff ...
An Analytical Model for Evaluating Interrupt-Driven System Performance of Gigabit Ethernet Hosts with Finite Buffer
Computers and Communications, IEEE Symposium on
By Khaled Salah
Issue Date:June 2005
A novel analytical model based on Markov processes is developed to study the impact of interrupt overhead on operating system performance of network hosts such as PC-based routers, servers, and end hosts when subjected to Gigabit network traffic. Under hea...
Harnessing the cloud for teaching cybersecurity
Found in: Proceedings of the 45th ACM technical symposium on Computer science education (SIGCSE '14)
By Khaled Salah
Issue Date:March 2014
Cloud computing has become an attractive paradigm for many organizations in government, industry as well as academia. In academia, the cloud can offer instructors and students (whether local or at a distance) on-demand, dedicated, isolated, unlimited, and ...
Resiliency of open-source firewalls against remote discovery of last-matching rules
Found in: Proceedings of the 2nd international conference on Security of information and networks (SIN '09)
By Karim Sattar, Khaled Salah, Mohammed Sqalli, Prasad Calyam, Zubair Baig
Issue Date:October 2009
In today's networks, firewalls act as the first line of defense against unwanted and malicious traffics. Firewalls themselves can become targets of DoS attacks, thus jeopardizing their primary operation to filter traffic. Typically, packets are checked aga...
Original Search Engine
Need a Web Account?
Become a Member
This site and all contents (unless otherwise noted) are Copyright ©2008, IEEE, Inc. All rights reserved.