default search action
Youssif B. Al-Nashif
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [c29]Cihan Tunc, Farah Fargo, Youssif B. Al-Nashif, Salim Hariri:
Autonomic Cross-Layer Management of Cloud Systems. FAS*W@SASO/ICCAC 2017: 160-165 - 2015
- [j5]Pratik Satam, Hamid Reza Alipour, Youssif B. Al-Nashif, Salim Hariri:
Anomaly Behavior Analysis of DNS Protocol. J. Internet Serv. Inf. Secur. 5(4): 85-97 (2015) - [j4]Hamid Reza Alipour, Youssif B. Al-Nashif, Pratik Satam, Salim Hariri:
Wireless Anomaly Detection Based on IEEE 802.11 Behavior Analysis. IEEE Trans. Inf. Forensics Secur. 10(10): 2158-2170 (2015) - [c28]Bilal Al Baalbaki, Jesus Pacheco, Cihan Tunc, Salim Hariri, Youssif B. Al-Nashif:
Anomaly Behavior Analysis System for ZigBee in smart buildings. AICCSA 2015: 1-4 - [c27]Youakim Badr, Salim Hariri, Youssif B. Al-Nashif, Erik Blasch:
Resilient and Trustworthy Dynamic Data-driven Application Systems (DDDAS) Services for Crisis Management Environments. ICCS 2015: 2623-2637 - [c26]Pratik Satam, Hamid Reza Alipour, Youssif B. Al-Nashif, Salim Hariri:
DNS-IDS: Securing DNS in the Cloud Era. ICCAC 2015: 296-301 - [c25]Cihan Tunc, Salim Hariri, Fabian De La Pena Montero, Farah Fargo, Pratik Satam, Youssif B. Al-Nashif:
Teaching and Training Cybersecurity as a Cloud Service. ICCAC 2015: 302-308 - 2014
- [j3]Yi Luo, Ferenc Szidarovszky, Youssif B. Al-Nashif, Salim Hariri:
A fictitious play-based response strategy for multistage intrusion defense systems. Secur. Commun. Networks 7(3): 473-491 (2014) - [c24]Jin Bai, Salim Hariri, Youssif B. Al-Nashif:
A Network Protection Framework for DNP3 over TCP/IP protocol. AICCSA 2014: 9-15 - [c23]Zhiwen Pan, Salim Hariri, Youssif B. Al-Nashif:
Anomaly based intrusion detection for Building Automation and Control networks. AICCSA 2014: 72-77 - [c22]Danny Thebeau II, Benjamin Reidy, Ricardo Valerdi, Avinash Gudagi, Hemayamini Kurra, Youssif B. Al-Nashif, Salim Hariri, Frederick T. Sheldon:
Improving Cyber Resiliency of Cloud Application Services by Applying Software Behavior Encryption (SBE). CSER 2014: 62-70 - [c21]Erik Blasch, Youssif B. Al-Nashif, Salim Hariri:
Static Versus Dynamic Data Information Fusion Analysis Using DDDAS for Cyber Security Trust. ICCS 2014: 1299-1313 - [c20]Cihan Tunc, Farah Fargo, Youssif B. Al-Nashif, Salim Hariri, John Hughes:
Autonomic Resilient Cloud Management (ARCM) Design and Evaluation. ICCAC 2014: 44-49 - [c19]Farah Fargo, Cihan Tunc, Youssif B. Al-Nashif, Ali Akoglu, Salim Hariri:
Autonomic Workload and Resources Management of Cloud Computing Services. ICCAC 2014: 101-110 - 2013
- [j2]Glynis Dsouza, Gabriel Rodríguez, Youssif B. Al-Nashif, Salim Hariri:
Building resilient cloud services using DDDAS and moving target defence. Int. J. Cloud Comput. 2(2/3): 171-190 (2013) - [c18]Bilal Al Baalbaki, Youssif B. Al-Nashif, Salim Hariri, Douglas Kelly:
Autonomic Critical Infrastructure Protection (ACIP) system. AICCSA 2013: 1-4 - [c17]Farah Fargo, Cihan Tunc, Youssif B. Al-Nashif, Salim Hariri:
Autonomic performance-per-watt management (APM) of cloud resources and services. CAC 2013: 2:1-2:10 - [c16]Hemayamini Kurra, Youssif B. Al-Nashif, Salim Hariri:
Resilient cloud data storage services. CAC 2013: 17:1-17:9 - [c15]Glynis Dsouza, Salim Hariri, Youssif B. Al-Nashif, Gabriel Rodríguez:
Resilient Dynamic Data Driven Application Systems (rDDDAS). ICCS 2013: 1929-1938 - [c14]Hamid Reza Alipour, Youssif B. Al-Nashif, Salim Hariri:
IEEE 802.11 anomaly-based behavior analysis. ICNC 2013: 369-373 - 2011
- [c13]Ram Prasad Viswanathan, Youssif B. Al-Nashif, Salim Hariri:
Application attack detection system (AADS): An anomaly based behavior analysis approach. AICCSA 2011: 150-156 - [c12]Salim Hariri, Mohamed Eltoweissy, Youssif B. Al-Nashif:
BioRAC: biologically inspired resilient autonomic cloud. CSIIRW 2011: 80 - 2010
- [j1]Yi Luo, Ferenc Szidarovszky, Youssif B. Al-Nashif, Salim Hariri:
Game Theory Based Network Security. J. Information Security 1(1): 41-44 (2010) - [c11]Uta Ziegler, Youssif B. Al-Nashif, Salim Hariri:
Plug & execute framework for network traffic generation. CSIIRW 2010: 49 - [c10]Bithika Khargharia, Haoting Luo, Youssif B. Al-Nashif, Salim Hariri:
AppFlow: Autonomic Performance-Per-Watt Management of Large-Scale Data Centers. GreenCom/CPSCom 2010: 103-111 - [c9]Arjun Hary, Ali Akoglu, Youssif B. Al-Nashif, Salim Hariri, Darrel Jenerette:
Design and evaluation of a self-healing Kepler for scientific workflows. HPDC 2010: 340-343
2000 – 2009
- 2009
- [c8]Yi Luo, Ferenc Szidarovszky, Youssif B. Al-Nashif, Salim Hariri:
A game theory based risk and impact analysis method for Intrusion Defense Systems. AICCSA 2009: 975-982 - [c7]Yaser Jararweh, Arjun Hary, Youssif B. Al-Nashif, Salim Hariri, Ali Akoglu, Darrel Jenerette:
Accelerated discovery through integration of Kepler with data turbine for ecosystem research. AICCSA 2009: 1005-1012 - 2008
- [b1]Youssif Al-Nashif:
Multi-Level Anomaly based Autonomic Intrusion Detection System. University of Arizona, Tucson, USA, 2008 - [c6]Youssif B. Al-Nashif, Aarthi Arun Kumar, Salim Hariri, Yi Luo, Ferenc Szidarovszky, Guangzhi Qu:
Multi-Level Intrusion Detection System (ML-IDS). ICAC 2008: 131-140 - [c5]Samer Fayssal, Youssif B. Al-Nashif, Byoung Uk Kim, Salim Hariri:
A proactive wireless self-protection system. ICPS 2008: 11-20 - [c4]Byoung Uk Kim, Youssif Al-Nashif, Samer Fayssal, Salim Hariri, Mazin S. Yousif:
Anomaly-based fault detection in pervasive computing system. ICPS 2008: 147-156 - 2007
- [c3]Huoping Chen, Youssif B. Al-Nashif, Guangzhi Qu, Salim Hariri:
Self-Configuration of Network Security. EDOC 2007: 97-110 - [c2]Samer Fayssal, Salim Hariri, Youssif B. Al-Nashif, Guangzhi Qu:
Anomaly-Based Behavior Analysis of Wireless Network Security. MobiQuitous 2007: 1-8 - [c1]Donald P. Cox, Youssif B. Al-Nashif, Salim Hariri:
Application of autonomic agents for global information grid management and security. SCSC 2007: 1147-1154
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint