Follow
Mohammed Noraden Alsaleh
Title
Cited by
Cited by
Year
CloudExp: A comprehensive cloud computing experimental framework
Y Jararweh, M Jarrah, Z Alshara, MN Alsaleh, M Al-Ayyoub
Simulation Modelling Practice and Theory 49, 180-192, 2014
1062014
ConfigChecker: A tool for comprehensive security configuration analytics
E Al-Shaer, MN Alsaleh
2011 4th Symposium on Configuration Analytics and Automation (SAFECONFIG), 1-2, 2011
222011
SCAP based configuration analytics for comprehensive compliance checking
MN Alsaleh, E Al-Shaer
2011 4th Symposium on Configuration Analytics and Automation (SAFECONFIG), 1-8, 2011
132011
gextractor: Towards automated extraction of malware deception parameters
MN Alsaleh, J Wei, E Al-Shaer, M Ahmed
Proceedings of the 8th Software Security, Protection, and Reverse …, 2018
112018
Roi-driven cyber risk mitigation using host compliance and network configuration
MN Alsaleh, E Al-Shaer, G Husari
Journal of Network and Systems Management 25, 759-783, 2017
112017
Characterizing scientific reporting in security literature: An analysis of ACM CCS and IEEE S&P papers
M Burcham, M Al-Zyoud, JC Carver, M Alsaleh, H Du, F Gilani, J Jiang, ...
Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp …, 2017
102017
Moath Jarrah, Mazen kharbutli, Zakarea Alshara, Mohammed Noraden Alsaleh, Mahmoud Al-Ayyoub, CloudExp: A comprehensive cloud computing experimental framework
Y Jararweh
Simulation Modelling Practice and Theory 49 (0), 180-192, 2014
72014
Automated cyber risk mitigation: making informed cost-effective decisions
MN Alsaleh, E Al-Shaer
Adaptive autonomous secure cyber systems, 131-157, 2020
62020
Towards automated verification of active cyber defense strategies on software defined networks
MN Alsaleh, E Al-Shaer
Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active …, 2016
62016
Enterprise risk assessment based on compliance reports and vulnerability scoring systems
MN Alsaleh, E Al-Shaer
Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence …, 2014
62014
Objective metrics for firewall security: A holistic view
MN Alsaleh, S Al-Haj, E Al-Shaer
2013 IEEE Conference on Communications and Network Security (CNS), 470-477, 2013
62013
Optimizing the roi of cyber risk mitigation
MN Alsaleh, G Husari, E Al-Shaer
2016 12th International Conference on Network and Service Management (CNSM …, 2016
52016
Towards a unified modeling and verification of network and system security configurations
MN Alsaleh, E Al-Shaer, A El-Atawy
Automated Security Management, 3-19, 2013
42013
Clips/activesdn for automated and safe cybersecurity course-of-actions orchestration
MM Islam, E Al-Shaer, A Dutta, MN Alsaleh
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of …, 2019
22019
Gextractor: automated extraction of malware deception parameters for autonomous cyber deception
MN Alsaleh, J Wei, E Al-Shaer, M Ahmed
Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of …, 2019
22019
Verifying the Enforcement and Effectiveness of Network Lateral Movement Resistance Techniques.
MN Alsaleh, E Al-Shaer, Q Duan
ICETE (2), 412-423, 2018
22018
Formal techniques for cyber resilience: modeling, synthesis, and verification
MN Alsaleh
The University of North Carolina at Charlotte, 2018
12018
gExtractor
MN Alsaleh, J Wei, E Al-Shaer, M Ahmed
Proceedings of the 8th Software Security, Protection, and Reverse …, 2018
2018
Security configuration analytics using video games
MN Alsaleh, EA Al-Shaer
2014 IEEE Conference on Communications and Network Security, 256-264, 2014
2014
The system can't perform the operation now. Try again later.
Articles 1–19