Publications

[1]  C. Tunc, F. Fargo, Y. Al-Nashif, and S. Hariri, “Autonomic Cross-Layer Management of Cloud Resources Framework”, Proceedings of the IEEE International Conference on Cloud and Autonomic Computing (ICCAC'17), 2017.

[2]  E. Blasch , Y. Badr, S. Hariri, Y. Al-Nashif, “Fusion Trust Service Assessment for Crisis Management Environments”, in Fusion Methodologies in Crisis Management - Higher Level Fusion and Decision Making, Galina Rogova and Peter Scott, Eds., pp. 389-420, Springer, 2016.

[3]  B. AlBaalbaki, J. Pacheco, C. Tunc, Salim Hariri, Y. Al‐Nashif, “Anomaly Behavior Analysis System for ZigBee in Smart Buildings”, in IEEE ACS International Conference on Computer Systems and Applications (AICCSA 2015).

[4]  C. Tunc, S. Hariri, F. D. L. P. Montero, F. Fargo, P. Satam, Y. Al-Nashif, “Teaching and Training Cybersecurity as a Cloud Service”, Proceedings of the International Conference on Cloud and Autonomic Computing (ICCAC’15), 2015

[5]  P. Satam, H. Alipour, Y. Al-Nashif, and S. Hariri, “DNS-IDS: Securing DNS in the Cloud Era”, Proceedings of the International Conference on Cloud and Autonomic Computing (ICCAC’15), 2015

[6]  C. Tunc, S. Hariri, Y. Al-Nashif, F. De La Peña Monter, F. Fargo, and P. Satam, “CLaaS: Cybersecurity Lab as a Service – Design, Analysis, and Evaluation”, Proceedings of the 2nd workshop on Autonomic Cloud Cybersecurity, 2015

[7]  Y. Badr, S. Hariri, Y. B. Al-Nashif, E. Blasch, “Resilient and Trustworthy Dynamic Data-driven Application Systems (DDDAS) Services for Crisis Management Environments,” ICCS 2015, pp. 2623-2637

[8]  E. Blasch, Y. Al-Nashif, and S. Hariri, “Static versus Dynamic Data Information Fusion analysis using DDDAS for Cyber Trust,” in Advances and Applications of DSmT for Information Fusion, F. Smarandache and J. Dezert, Eds. American Research Press (ARP), 2015.

[9]  H. Alipour, Y. B. Al-Nashif, P. Satam and S. Hariri, "Wireless Anomaly Detection Based on IEEE 802.11 Behavior Analysis," in IEEE Transactions on Information Forensics and Security, vol. 10, no. 10, pp. 2158-2170, Oct. 2015.

[10] J. Bai, Y. Al‐Nashif, S. Hariri, “A Network Protection Framework for DNP3 Over TCP/IP Protocol”, in IEEE ACS International Conference on Computer Systems and Applications (AICCSA 2014).

[11] Z. Pan, Y. Al‐Nashif, S. Hariri, “Anomaly Based Intrusion Detection for Building Automation and Control Networks”, in IEEE ACS International Conference on Computer Systems and Applications (AICCSA 2014).

[12] C. Tunc, F. Fargo, Y. Al-Nashif, S. Hariri, J. Hughes “Autonomic Resilient Cloud Management (ARCM): Design and Evaluation”, in IEEE International Conference on Cloud and Autonomic Computing (ICCAC 2014), London, UK., 2014.

[13] F. Fargo, C. Tunc, Y. Al-Nashif, A. Akoglu, S. Hariri “Autonomic Workload and Resources Management of Cloud Computing Services”, in IEEE International Conference on Cloud and Autonomic Computing (ICCAC 2014), London, UK., 2014.

[14] D. Thebeau II, B. Reidy, R. Valerdi, A. Gudagi, H. Kurra, Y. Al-Nashif, S. Hariri, and F. Sheldon, “Improving Cyber Resiliency of Cloud Application Services by Applying Software Behavior Encryption (SBE),” Procedia Computer Science, vol. 28, pp. 62–70, 2014.

[15] E. Blasch, Y. Al-Nashif, S. Hariri, “Static versus Dynamic Data Information Fusion analysis using DDDAS for Cyber Trust”, ICCS 2014: 14th International Conference on Computational Science, 2014

[16] G. Dsouza, G. Rodríguez, Y. B. Al-Nashif, S. Hariri, “Building resilient cloud services using DDDAS and moving target defence”, IJCC 2(2/3): 171-190 (2013)

[17] H. Kurra, Y. B. Al-Nashif, Salim Hariri, “Resilient cloud data storage services”, In Proceedings of the 2013 ACM Cloud and Autonomic Computing Conference (CAC '13). ACM, New York, NY, USA, , Article 17 , 9 pages

[18] F. Fargo, C. Tunc, Y. B. Al-Nashif, S. Hariri: “Autonomic performance-per-watt management (APM) of cloud resources and services”, In Proceedings of the 2013 ACM Cloud and Autonomic Computing Conference (CAC '13). ACM, New York, NY, USA, , Article 2 , 10 pages.

[19] B. AlBaalbaki,; Y. Al-Nashif, S. Hariri, D. Kelly, "Autonomic Critical Infrastructure Protection (ACIP) system," Computer Systems and Applications (AICCSA), 2013 ACS International Conference on , vol., no., pp.1,4, 27-30 May 2013

[20] G. Dsouza, S. Hariri, Y. B. Al-Nashif, G. Rodríguez, “Resilient Dynamic Data Driven Application Systems (rDDDAS)”, ICCS 2013: 1929-1938

[21] H. Alipour, Y. Al-Nashif, S. Hariri, “IEEE 802.11 Anomaly-based Behavior Analysis”, accepted, the Proceedings of International Conference on Computing, Networking and Communications (ICNC 2013), Jan. 28-31, 2013, San Diego, CA.  

[22] H. Luo, B. Khargharia, S. Hariri, and Y. Al-Nashif, “Autonomic Green Computing in Large-Scale Data Centers,” in Energy-Efficient Distributed Computing Systems, no. 10, Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012, pp. 271–299.

[23] Y. Luo, F. Szidarovszky, Y. Al-Nashif, S. Hariri, “A Novel Fictitious Play Approach for Multi-Stage Intrusion Defense Systems”, Journal of Security and Communication Networks, June 2012.

[24] H. Alipour, Y. Al-Nashif, S. Hariri, “Anomaly-based Behavior Analysis of DNS traffic secure”, In Proceeding of the 1st International IBM Cloud Academy Conference (ICA CON 2012), Apr. 2012.

[25] G. D’souza, H. Alipour, S. Hariri, Y. Al-Nashif, M. Eltoweissy, “Cloud Resilient Architecture”, In Proceeding of the 1st International IBM Cloud Academy Conference (ICA CON 2012), Apr. 2012.

[26] S. Hariri, M. Eltoweissy, Y. Alnashif, “BioARC: Bilogically-inspired Autonomic Resilient Cloud, “ Proceedings of the 7th Cyber Security and Information Intelligence Workshop (CSIIRW’2011), October 2011.

[27] M. Tabris, Y. B. Al-Nashif, S. Hariri, “Filtering Spam by Hybrid Approach”, Accepted in CyPhyCARD' 2011, the Workshop on Collaboration, Autonomic, and Resilient Defense for Cyber Physical System in Conjunction of Collaborate Come 2011, workshop, Oct. 2011

[28] R. P. Viswanathan, Y. Al-Nashif, S. Hariri “Application Attack Detection System (AADS): An Anomaly Based Behavior Analysis Approach”, Accepted in the The 9th ACS/IEEE International Conference On Computer Systems and Applications, 2011.

[29] Mallouhi, M.; Al-Nashif, Y.; Cox, D.; Chadaga, T.; Hariri, S. , "A testbed for analyzing security of SCADA control systems (TASSCS)," Innovative Smart Grid Technologies (ISGT), 2011 IEEE PES , vol., no., pp.1-7, 17-19 Jan. 2011

[30] B. Khargharia, H. Luo, Y. Al-Nashif, S. Hariri, “AppFlow: Autonomic Performance-per-Watt Management of Large-Scale Data Centers”, Proc. Of IEEE/ACM International Conference on Green Computing and Communications (GreenCom2010), 2010.

[31] Y. Luo, F. Szidarovszky, Y. Al-Nashif, S. Hariri, “Game Theory Based Network Security”, Journal of Information Security, 2010, 1, 41-44.

[32] A. Hary, A. Akoglu, Y. Al-Nashif, S. Hariri, D. Jenerette, “Design and evaluation of a self-healing Kepler for scientific workflows”, HPDC 2010: 340-343

[33] U. Ziegler, Y. Al-Nashif, S. Hariri, “Plug & execute framework for network traffic generation”, In Proceedings of the Sixth Annual Workshop on Cyber Security and information intelligence Research (Oak Ridge, Tennessee, April 21 - 23, 2010).

[34] Y. Luo, F. Szidarovszky, Y. Al-Nashif, S. Hariri, “Game Tree Based Partially Observable Stochastic Game Model for Intrusion Defense Systems (IDS)”, Proc. of Innovation Revealed, IEE Annual Conference and Expo 2009, Miami, Florida, May 30-June 3, 2009.

[35] Y. Luo, F. Szidarovszky, Y. Al-Nashif, S. Hariri, “A Game Theory Based Risk and Impact Analysis Method for Intrusion Defense Systems”, Proc. of the 7th ACS/IEEE International Conference on Computer Systems and Applications, Rabat, Morocco, May 10-13, 2009

[36] Y. Jararweh, A. Hary, Y. Al-Nashif, S. Hariri, A. Akoglu, D. Jenerette. “Accelerated Discovery through Integration of Kepler with Data Turbine for Ecosystem Research”, Proc. of the 7th ACS/IEEE International Conference on Computer Systems and Applications, Rabat, Morocco, May 10-13, 2009, pp. 1005-1012.

[37] Y. Al-Nashif, A. Arun Kumar, S. Hariri, Y. Luo, F. Szidarovsky, G. Qu, “Multi-Level Intrusion Detection System (ML-IDS)”, the 5th IEEE International Conference on Autonomic Computing (ICAC’08), pp. 131 - 140.

[38] S. Fayssal, Y. Al-Nashif, B. Kim, S. Hariri, “A proactive wireless self-protection system”. In Proceedings of the 5th international conference on Pervasive services (ICPS '08). ACM, New York, NY, USA, pp. 11-20.

[39] B. U. Kim, Y. Al-Nashif, S. Fayssal, S. Hariri, M. Yousif, “Anomaly-based fault detection in pervasive computing system”. In Proceedings of the 5th international conference on Pervasive services (ICPS '08). ACM, New York, NY, USA, pp. 147-156.

[40] D. Cox, Y. Al-Nashif, S. Hariri, “Autonomic GIG Management & Security Agent Technology”, 10th Annual NDIA System Engineering Conference, 2007.

[41] H. Chen, Y. Al-Nashif, G. Qu, S. Hariri, “Self-Configuration of Network Security”, in proceedings of the 11th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2007), p.97, 2007.

[42] D. Cox, Y. Al-Nashif, S. Hariri, “Application of Autonomic Agents for Global Information Grid Management and Security”, in proceedings of the Summer Computer Simulation Conference 2007 (SCSC 2007), pp. 1147-1154

[43] S. Fayssal, S. Hariri, Y. Al-Nashif, “Anomaly-Based Behavior Analysis of Wireless Network Security”, In proceedings if IEEE International Workshop on Personal Networks PerNets 07 Philadelphia, 2007, pp. 1-8