[1] C. Tunc, F. Fargo, Y. Al-Nashif, and S.
Hariri, “Autonomic Cross-Layer Management of Cloud Resources Framework”, Proceedings of the IEEE
International Conference on Cloud and Autonomic Computing (ICCAC'17), 2017.
[2] E.
Blasch , Y. Badr, S. Hariri, Y. Al-Nashif, “Fusion Trust Service Assessment for Crisis Management
Environments”, in Fusion Methodologies in Crisis Management - Higher Level Fusion and Decision
Making, Galina Rogova and Peter Scott, Eds., pp.
389-420, Springer, 2016.
[3] B. AlBaalbaki, J. Pacheco, C. Tunc, Salim Hariri, Y.
Al‐Nashif, “Anomaly Behavior Analysis System for ZigBee in Smart Buildings”, in IEEE ACS
International Conference on Computer Systems
and Applications (AICCSA 2015).
[4] C. Tunc, S. Hariri, F. D. L. P. Montero, F.
Fargo, P. Satam, Y. Al-Nashif, “Teaching and Training Cybersecurity as a Cloud Service”, Proceedings
of the International Conference
on Cloud and Autonomic Computing (ICCAC’15), 2015
[5] P. Satam, H. Alipour, Y.
Al-Nashif, and S. Hariri, “DNS-IDS: Securing DNS in the Cloud Era”, Proceedings of the
International Conference on Cloud and
Autonomic Computing (ICCAC’15), 2015
[6] C. Tunc, S. Hariri, Y. Al-Nashif, F. De
La Peña Monter, F. Fargo, and P. Satam, “CLaaS: Cybersecurity Lab as a Service – Design, Analysis,
and Evaluation”, Proceedings
of the 2nd workshop on Autonomic Cloud Cybersecurity, 2015
[7] Y. Badr, S. Hariri,
Y. B. Al-Nashif, E. Blasch, “Resilient and Trustworthy Dynamic Data-driven Application Systems
(DDDAS) Services for Crisis Management
Environments,” ICCS 2015, pp. 2623-2637
[8] E. Blasch, Y. Al-Nashif, and S.
Hariri, “Static versus Dynamic Data Information Fusion analysis using DDDAS for Cyber Trust,” in
Advances and Applications of DSmT for
Information Fusion, F. Smarandache and J. Dezert, Eds. American Research Press (ARP), 2015.
[9] H.
Alipour, Y. B. Al-Nashif, P. Satam and S. Hariri, "Wireless Anomaly Detection Based on IEEE 802.11
Behavior Analysis,"
in IEEE Transactions on Information Forensics and Security, vol. 10, no. 10, pp. 2158-2170, Oct.
2015.
[10] J. Bai, Y. Al‐Nashif, S. Hariri, “A Network Protection Framework for DNP3 Over
TCP/IP Protocol”, in IEEE ACS International
Conference on Computer Systems and Applications (AICCSA 2014).
[11] Z. Pan, Y. Al‐Nashif, S.
Hariri, “Anomaly Based Intrusion Detection for Building Automation and Control Networks”, in IEEE
ACS International Conference
on Computer Systems and Applications (AICCSA 2014).
[12] C. Tunc, F. Fargo, Y. Al-Nashif, S.
Hariri, J. Hughes “Autonomic Resilient Cloud Management (ARCM): Design and Evaluation”, in IEEE
International Conference on Cloud
and Autonomic Computing (ICCAC 2014), London, UK., 2014.
[13] F. Fargo, C. Tunc, Y.
Al-Nashif, A. Akoglu, S. Hariri “Autonomic Workload and Resources Management of Cloud Computing
Services”, in IEEE International Conference
on Cloud and Autonomic Computing (ICCAC 2014), London, UK., 2014.
[14] D. Thebeau II, B.
Reidy, R. Valerdi, A. Gudagi, H. Kurra, Y. Al-Nashif, S. Hariri, and F. Sheldon, “Improving Cyber
Resiliency of Cloud Application Services
by Applying Software Behavior Encryption (SBE),” Procedia Computer Science, vol. 28, pp. 62–70,
2014.
[15] E. Blasch, Y. Al-Nashif, S. Hariri, “Static versus Dynamic Data Information Fusion
analysis using DDDAS for Cyber
Trust”, ICCS 2014: 14th International Conference on Computational Science, 2014
[16] G.
Dsouza, G. Rodríguez, Y. B. Al-Nashif, S. Hariri, “Building resilient cloud services using DDDAS and
moving target defence”, IJCC 2(2/3):
171-190 (2013)
[17] H. Kurra, Y. B. Al-Nashif, Salim Hariri, “Resilient cloud data storage
services”, In Proceedings of the 2013 ACM Cloud and Autonomic Computing Conference (CAC '13). ACM,
New York, NY, USA, , Article 17
, 9 pages
[18] F. Fargo, C. Tunc, Y. B. Al-Nashif, S. Hariri: “Autonomic performance-per-watt
management (APM) of cloud resources and services”, In Proceedings of the 2013 ACM Cloud and
Autonomic Computing Conference (CAC
'13). ACM, New York, NY, USA, , Article 2 , 10 pages.
[19] B. AlBaalbaki,; Y. Al-Nashif, S.
Hariri, D. Kelly, "Autonomic Critical Infrastructure Protection (ACIP) system," Computer Systems and
Applications (AICCSA), 2013
ACS International Conference on , vol., no., pp.1,4, 27-30 May 2013
[20] G. Dsouza, S.
Hariri, Y. B. Al-Nashif, G. Rodríguez, “Resilient Dynamic Data Driven Application Systems (rDDDAS)”,
ICCS 2013: 1929-1938
[21]
H. Alipour, Y. Al-Nashif, S. Hariri, “IEEE 802.11 Anomaly-based Behavior Analysis”, accepted, the
Proceedings of International Conference on Computing, Networking and Communications (ICNC 2013),
Jan. 28-31, 2013, San Diego, CA.
[22]
H. Luo, B. Khargharia, S. Hariri, and Y. Al-Nashif, “Autonomic Green Computing in Large-Scale Data
Centers,” in Energy-Efficient Distributed Computing Systems, no. 10, Hoboken, NJ, USA: John Wiley
& Sons, Inc., 2012, pp. 271–299.
[23]
Y. Luo, F. Szidarovszky, Y. Al-Nashif, S. Hariri, “A Novel Fictitious Play Approach for Multi-Stage
Intrusion Defense Systems”, Journal of Security and Communication Networks, June 2012.
[24]
H. Alipour, Y. Al-Nashif, S.
Hariri, “Anomaly-based Behavior Analysis of DNS traffic secure”, In Proceeding of the 1st
International IBM Cloud Academy Conference (ICA CON 2012), Apr. 2012.
[25] G. D’souza, H.
Alipour, S. Hariri, Y. Al-Nashif, M. Eltoweissy,
“Cloud Resilient Architecture”, In Proceeding of the 1st International IBM Cloud Academy Conference
(ICA CON 2012), Apr. 2012.
[26] S. Hariri, M. Eltoweissy, Y. Alnashif, “BioARC:
Bilogically-inspired Autonomic Resilient
Cloud, “ Proceedings of the 7th Cyber Security and Information Intelligence Workshop (CSIIRW’2011),
October 2011.
[27] M. Tabris, Y. B. Al-Nashif, S. Hariri, “Filtering Spam by Hybrid
Approach”, Accepted in CyPhyCARD' 2011,
the Workshop on Collaboration, Autonomic, and Resilient Defense for Cyber Physical System in
Conjunction of Collaborate Come 2011, workshop, Oct. 2011
[28] R. P. Viswanathan, Y.
Al-Nashif, S. Hariri “Application Attack
Detection System (AADS): An Anomaly Based Behavior Analysis Approach”, Accepted in the The 9th
ACS/IEEE International Conference On Computer Systems and Applications, 2011.
[29] Mallouhi,
M.; Al-Nashif, Y.; Cox, D.; Chadaga,
T.; Hariri, S. , "A testbed for analyzing security of SCADA control systems (TASSCS)," Innovative
Smart Grid Technologies (ISGT), 2011 IEEE PES , vol., no., pp.1-7, 17-19 Jan. 2011
[30] B.
Khargharia, H. Luo, Y. Al-Nashif,
S. Hariri, “AppFlow: Autonomic Performance-per-Watt Management of Large-Scale Data Centers”, Proc.
Of IEEE/ACM International Conference on Green Computing and Communications (GreenCom2010), 2010.
[31]
Y. Luo, F. Szidarovszky,
Y. Al-Nashif, S. Hariri, “Game Theory Based Network Security”, Journal of Information Security,
2010, 1, 41-44.
[32] A. Hary, A. Akoglu, Y. Al-Nashif, S. Hariri, D. Jenerette, “Design and
evaluation of a self-healing Kepler
for scientific workflows”, HPDC 2010: 340-343
[33] U. Ziegler, Y. Al-Nashif, S. Hariri, “Plug
& execute framework for network traffic generation”, In Proceedings of the Sixth Annual Workshop
on Cyber Security and information
intelligence Research (Oak Ridge, Tennessee, April 21 - 23, 2010).
[34] Y. Luo, F.
Szidarovszky, Y. Al-Nashif, S. Hariri, “Game Tree Based Partially Observable Stochastic Game Model
for Intrusion Defense Systems (IDS)”,
Proc. of Innovation Revealed, IEE Annual Conference and Expo 2009, Miami, Florida, May 30-June 3,
2009.
[35] Y. Luo, F. Szidarovszky, Y. Al-Nashif, S. Hariri, “A Game Theory Based Risk and
Impact Analysis Method for Intrusion
Defense Systems”, Proc. of the 7th ACS/IEEE International Conference on Computer Systems and
Applications, Rabat, Morocco, May 10-13, 2009
[36] Y. Jararweh, A. Hary, Y. Al-Nashif, S.
Hariri, A. Akoglu, D. Jenerette. “Accelerated
Discovery through Integration of Kepler with Data Turbine for Ecosystem Research”, Proc. of the 7th
ACS/IEEE International Conference on Computer Systems and Applications, Rabat, Morocco, May 10-13,
2009, pp. 1005-1012.
[37]
Y. Al-Nashif, A. Arun Kumar, S. Hariri, Y. Luo, F. Szidarovsky, G. Qu, “Multi-Level Intrusion
Detection System (ML-IDS)”, the 5th IEEE International Conference on Autonomic Computing (ICAC’08),
pp. 131 - 140.
[38] S. Fayssal,
Y. Al-Nashif, B. Kim, S. Hariri, “A proactive wireless self-protection system”. In Proceedings of
the 5th international conference on Pervasive services (ICPS '08). ACM, New York, NY, USA, pp.
11-20.
[39] B. U. Kim, Y. Al-Nashif,
S. Fayssal, S. Hariri, M. Yousif, “Anomaly-based fault detection in pervasive computing system”. In
Proceedings of the 5th international conference on Pervasive services (ICPS '08). ACM, New York, NY,
USA, pp. 147-156.
[40]
D. Cox, Y. Al-Nashif, S. Hariri, “Autonomic GIG Management & Security Agent Technology”, 10th
Annual NDIA System Engineering Conference, 2007.
[41] H. Chen, Y. Al-Nashif, G. Qu, S.
Hariri, “Self-Configuration of
Network Security”, in proceedings of the 11th IEEE International Enterprise Distributed Object
Computing Conference (EDOC 2007), p.97, 2007.
[42] D. Cox, Y. Al-Nashif, S. Hariri,
“Application of Autonomic Agents for Global
Information Grid Management and Security”, in proceedings of the Summer Computer Simulation
Conference 2007 (SCSC 2007), pp. 1147-1154
[43] S. Fayssal, S. Hariri, Y. Al-Nashif,
“Anomaly-Based Behavior Analysis of Wireless
Network Security”, In proceedings if IEEE International Workshop on Personal Networks PerNets 07
Philadelphia, 2007, pp. 1-8