팔로우
Hisham A. Kholidy
Hisham A. Kholidy
Northern Illinois University
sunypoly.edu의 이메일 확인됨 - 홈페이지
제목
인용
인용
연도
CIDS: A framework for intrusion detection in cloud systems
HA Kholidy, F Baiardi
2012 Ninth International Conference on Information Technology-New …, 2012
1662012
Autonomous mitigation of cyber risks in the Cyber-Physical Systems
HA Kholidy
Future Generation Computer Systems, 2021
1202021
CIDD: A cloud intrusion detection dataset for cloud computing and masquerade attacks
HA Kholidy, F Baiardi
2012 Ninth International Conference on Information Technology-New …, 2012
862012
An intelligent swarm based prediction approach for predicting cloud computing user resource needs
HA Kholidy
Computer Communications 151, 133-144, 2020
812020
A risk mitigation approach for autonomous cloud intrusion response system
HA Kholidy, A Erradi, S Abdelwahed, F Baiardi
Computing 98, 1111-1135, 2016
772016
DDSGA: A data-driven semi-global alignment approach for detecting masquerade attacks
HA Kholidy, F Baiardi, S Hariri
IEEE Transactions on Dependable and Secure Computing 12 (2), 164-178, 2014
772014
A finite state hidden markov model for predicting multistage attacks in cloud systems
HA Kholidy, A Erradi, S Abdelwahed, A Azab
2014 IEEE 12th International Conference on Dependable, Autonomic and Secure …, 2014
682014
Detecting impersonation attacks in cloud computing environments using a centric user profiling approach
HA Kholidy
Future Generation Computer Systems, 2021
582021
Review of the Data-Driven Methods for Electricity Fraud Detection in Smart Metering Systems
MM Badr, MI Ibrahem, HA Kholidy, MM Fouda, M Ismail
Energies 16 (6), https://doi.org/10.3390/en16062852, 2023
502023
A Hierarchical Cloud Intrusion Detection System: Design and Evaluation
H Kholidy, F Baiardi, S Hariri, EM ElHariri, AM Youssouf, SA Shehata
International Journal on Cloud Computing: Services and Architecture (IJCCSA …, 2012
48*2012
Multi-Layer Attack Graph Analysis in the 5G Edge Network Using a Dynamic Hexagonal Fuzzy Method
HA Kholidy
Sensors 22 (1), 9, 2021
472021
5G Core Security in Edge Networks: A Vulnerability Assessment Approach
HA Kholidy, A Karam, JL Sidoran, MA Rahman
The 26th IEEE Symposium on Computers and Communications (ISCC), 1-6, 2021
452021
Toward Zero Trust Security in 5G Open Architecture Network Slices
HA Kholidy, A Karam, J Sidoran, MA Rahman, M Mahmoud, M Badr, ...
MILCOM 2022-2022 IEEE Military Communications Conference (MILCOM), 577-582, 2023
422023
Network anomaly detection in 5G networks
A Rahman, M Mahmud, T Iqbal, L Saraireh, H Kholidy, M Gollapalli, ...
Journal of Mathematical Modelling of Engineering Problems. http://iieta. org …, 2022
402022
ACCELERATING STREAM CIPHER OPERATIONS USING SINGLE AND GRID SYSTEMS
H Kholidy
US Patent US 20120089829A1, 2012
402012
US Patent: Accelerating stream cipher operations using single and grid systems
HA Kholidy
US Patent 8,533,456, 2012
402012
Towards Realizing a Distributed Event and Intrusion Detection System
Q Chen, HA Kholidy, S Abdelwahed, J Hamilton
The International Conference on Future Network Systems and Security (FNSS …, 2017
392017
QoS Optimization for Cloud Service Composition Based on Economic Model
H Kholidy, H Hassan, A Sarhan, A Erradi, S Abdelwahed
Internet of Things. User-Centric IoT, 355-366, 2015
392015
An adaptive decentralized scheduling mechanism for peer-to-peer Desktop Grids
AA Azab, HA Kholidy.
Computer Engineering & Systems, Cairo, 2008
372008
Correlation‐based sequence alignment models for detecting masquerades in cloud computing
HA Kholidy
IET Information Security 14 (1), 39-50, 2020
352020
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20