OmegaLog: High-fidelity attack investigation via transparent multi-layer log analysis WU Hassan, MA Noureddine, P Datta, A Bates Network and distributed system security symposium, 2020 | 122 | 2020 |
An unsupervised multi-detector approach for identifying malicious lateral movement A Bohara, MA Noureddine, A Fawaz, WH Sanders 2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS), 224-233, 2017 | 74 | 2017 |
A game-theoretic approach to respond to attacker lateral movement MA Noureddine, A Fawaz, WH Sanders, T Başar Decision and Game Theory for Security: 7th International Conference, GameSec …, 2016 | 41 | 2016 |
Reduction and abstraction techniques for BIP M Noureddine, M Jaber, S Bliudze, FA Zaraket Formal Aspects of Component Software: 11th International Symposium, FACS …, 2015 | 15 | 2015 |
Validating the integrity of audit logs against execution repartitioning attacks C Yagemann, MA Noureddine, WU Hassan, S Chung, A Bates, W Lee Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 14 | 2021 |
Accounting for the human user in predictive security models MA Noureddine, A Marturano, K Keefe, M Bashir, WH Sanders 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing …, 2017 | 10 | 2017 |
Revisiting client puzzles for state exhaustion attacks resilience MA Noureddine, AM Fawaz, A Hsu, C Guldner, S Vijay, T Başar, ... 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems …, 2019 | 9 | 2019 |
Determining tolerable attack surfaces that preserves safety of cyber-physical systems C Cheh, A Fawaz, MA Noureddine, B Chen, WG Temple, WH Sanders 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing …, 2018 | 9 | 2018 |
Model checking software with first order logic specifications using AIG solvers MA Noureddine, FA Zaraket IEEE Transactions on Software Engineering 42 (8), 741-763, 2016 | 9 | 2016 |
Quantitative security metrics with human in the loop M Noureddine, K Keefe, WH Sanders, M Bashir Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 1-2, 2015 | 6 | 2015 |
P4aig: Circuit-level verification of p4 programs MA Noureddine, A Hsu, M Caesar, FA Zaraket, WH Sanders 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems …, 2019 | 4 | 2019 |
Specification construction using behaviours, equivalences, and smt solvers PC Attie, FA Zaraket, M Noureddine, F El-Hariri arXiv preprint arXiv:1307.6901, 2013 | 3 | 2013 |
Achieving network resiliency using sound theoretical and practical methods M Noureddine University of Illinois at Urbana-Champaign, 2020 | 2 | 2020 |
Poweralert: integrity checking using power measurement and a game-theoretic strategy AM Fawaz, MA Noureddine, WH Sanders 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018 | 2 | 2018 |
From high-level modeling towards efficient and trustworthy circuits M Jaber, M Noureddine, FA Zaraket arXiv preprint arXiv:1409.8146, 2014 | 2 | 2014 |
Portable Parallel Programs using architecture-aware libraries F Zaraket, M Noureddine, M Sabra, A Jaber Proceedings of the 27th Annual ACM Symposium on Applied Computing, 1922-1924, 2012 | 2 | 2012 |
From high-level modeling toward efficient and trustworthy circuits FA Zaraket, M Jaber, M Noureddine, Y Falcone International Journal on Software Tools for Technology Transfer 21 (2), 143-163, 2019 | 1 | 2019 |
PowerAlert: An integrity checker using power measurement AM Fawaz, M Noureddine, WH Sanders arXiv preprint arXiv:1702.02907, 2017 | 1 | 2017 |
Model checking software with first order logic specifications using aig solvers FA Zaraket, M Noureddine IEEE Transactions on Software Engineering 1, 2016 | 1 | 2016 |
Synthesis of Sequential Extended Regular Expressions for Verification M Noureddine, FA Zaraket, AS Elzein arXiv preprint arXiv:1401.3173, 2014 | 1 | 2014 |