Seguir
Hisham A. Kholidy
Hisham A. Kholidy
The State University of New York (SUNY) Polytechnic Institute
Dirección de correo verificada de sunypoly.edu - Página principal
Título
Citado por
Citado por
Año
CIDS: A framework for intrusion detection in cloud systems
HA Kholidy, F Baiardi
2012 Ninth International Conference on Information Technology-New …, 2012
1682012
Autonomous mitigation of cyber risks in the Cyber-Physical Systems
HA Kholidy
Future Generation Computer Systems, 2021
1052021
CIDD: A cloud intrusion detection dataset for cloud computing and masquerade attacks
HA Kholidy, F Baiardi
2012 Ninth International Conference on Information Technology-New …, 2012
872012
A risk mitigation approach for autonomous cloud intrusion response system
HA Kholidy, A Erradi, S Abdelwahed, F Baiardi
Computing 98, 1111-1135, 2016
792016
An intelligent swarm based prediction approach for predicting cloud computing user resource needs
HA Kholidy
Computer Communications 151, 133-144, 2020
752020
DDSGA: A data-driven semi-global alignment approach for detecting masquerade attacks
HA Kholidy, F Baiardi, S Hariri
IEEE Transactions on Dependable and Secure Computing 12 (2), 164-178, 2014
732014
A finite state hidden markov model for predicting multistage attacks in cloud systems
HA Kholidy, A Erradi, S Abdelwahed, A Azab
2014 IEEE 12th International Conference on Dependable, Autonomic and Secure …, 2014
622014
Detecting impersonation attacks in cloud computing environments using a centric user profiling approach
HA Kholidy
Future Generation Computer Systems, 2021
562021
A Hierarchical Cloud Intrusion Detection System: Design and Evaluation
H Kholidy, F Baiardi, S Hariri, EM ElHariri, AM Youssouf, SA Shehata
International Journal on Cloud Computing: Services and Architecture (IJCCSA …, 2012
50*2012
Multi-Layer Attack Graph Analysis in the 5G Edge Network Using a Dynamic Hexagonal Fuzzy Method
HA Kholidy
Sensors 22 (1), 9, 2021
422021
Towards Realizing a Distributed Event and Intrusion Detection System
Q Chen, HA Kholidy, S Abdelwahed, J Hamilton
The International Conference on Future Network Systems and Security (FNSS …, 2017
402017
QoS Optimization for Cloud Service Composition Based on Economic Model
H Kholidy, H Hassan, A Sarhan, A Erradi, S Abdelwahed
Internet of Things. User-Centric IoT, 355-366, 2015
382015
5G Core Security in Edge Networks: A Vulnerability Assessment Approach
HA Kholidy, A Karam, JL Sidoran, MA Rahman
The 26th IEEE Symposium on Computers and Communications (ISCC), 1-6, 2021
372021
Correlation‐based sequence alignment models for detecting masquerades in cloud computing
HA Kholidy
IET Information Security 14 (1), 39-50, 2020
362020
ACCELERATING STREAM CIPHER OPERATIONS USING SINGLE AND GRID SYSTEMS
H Kholidy
US Patent US 20120089829A1, 2012
362012
US Patent: Accelerating stream cipher operations using single and grid systems
HA Kholidy
US Patent 8,533,456, 2012
362012
An adaptive decentralized scheduling mechanism for peer-to-peer Desktop Grids
AA Azab, HA Kholidy.
Computer Engineering & Systems, Cairo, 2008
362008
Toward Zero Trust Security in 5G Open Architecture Network Slices
HA Kholidy, A Karam, J Sidoran, MA Rahman, M Mahmoud, M Badr, ...
MILCOM 2022-2022 IEEE Military Communications Conference (MILCOM), 577-582, 2023
352023
Network anomaly detection in 5G networks
A Rahman, M Mahmud, T Iqbal, L Saraireh, H Kholidy, M Gollapalli, ...
Journal of Mathematical Modelling of Engineering Problems. http://iieta. org …, 2022
352022
(Best Paper Award) Towards A Scalable Symmetric Key Cryptographic Scheme: Performance Evaluation and Security Analysis
HA Kholidy
2019 2nd International Conference on Computer Applications & Information …, 2019
322019
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20