[go: up one dir, main page]

Follow
Hisham A. Kholidy
Hisham A. Kholidy
Northern Illinois University
Verified email at sunypoly.edu - Homepage
Title
Cited by
Cited by
Year
CIDS: A framework for intrusion detection in cloud systems
HA Kholidy, F Baiardi
2012 Ninth International Conference on Information Technology-New …, 2012
1712012
Autonomous mitigation of cyber risks in the Cyber-Physical Systems
HA Kholidy
Future Generation Computer Systems, 2021
1542021
An intelligent swarm based prediction approach for predicting cloud computing user resource needs
HA Kholidy
Computer Communications 151, 133-144, 2020
952020
CIDD: A cloud intrusion detection dataset for cloud computing and masquerade attacks
HA Kholidy, F Baiardi
2012 Ninth International Conference on Information Technology-New …, 2012
922012
A risk mitigation approach for autonomous cloud intrusion response system
HA Kholidy, A Erradi, S Abdelwahed, F Baiardi
Computing 98 (11), 1111-1135, 2016
852016
DDSGA: A data-driven semi-global alignment approach for detecting masquerade attacks
HA Kholidy, F Baiardi, S Hariri
IEEE Transactions on Dependable and Secure Computing 12 (2), 164-178, 2014
802014
A survey of the real-time metaverse: Challenges and opportunities
M Hatami, Q Qu, Y Chen, H Kholidy, E Blasch, E Ardiles-Cruz
Future Internet 16 (10), 379, 2024
792024
A finite state hidden markov model for predicting multistage attacks in cloud systems
HA Kholidy, A Erradi, S Abdelwahed, A Azab
2014 IEEE 12th International Conference on Dependable, Autonomic and Secure …, 2014
762014
Review of the Data-Driven Methods for Electricity Fraud Detection in Smart Metering Systems
MM Badr, MI Ibrahem, HA Kholidy, MM Fouda, M Ismail
Energies 16 (6), https://doi.org/10.3390/en16062852, 2023
672023
Detecting impersonation attacks in cloud computing environments using a centric user profiling approach
HA Kholidy
Future Generation Computer Systems, 2021
662021
Network anomaly detection in 5G networks
A Rahman, M Mahmud, T Iqbal, L Saraireh, H Kholidy, M Gollapalli, ...
Journal of Mathematical Modelling of Engineering Problems. http://iieta. org …, 2022
602022
5G Core Security in Edge Networks: A Vulnerability Assessment Approach
HA Kholidy, A Karam, JL Sidoran, MA Rahman
The 26th IEEE Symposium on Computers and Communications (ISCC), 1-6, 2021
572021
Multi-Layer Attack Graph Analysis in the 5G Edge Network Using a Dynamic Hexagonal Fuzzy Method
HA Kholidy
Sensors 22 (1), 9, 2021
572021
Toward Zero Trust Security in 5G Open Architecture Network Slices
HA Kholidy, A Karam, J Sidoran, MA Rahman, M Mahmoud, M Badr, ...
MILCOM 2022-2022 IEEE Military Communications Conference (MILCOM), 577-582, 2023
562023
A Hierarchical Cloud Intrusion Detection System: Design and Evaluation
H Kholidy, F Baiardi, S Hariri, EM ElHariri, AM Youssouf, SA Shehata
International Journal on Cloud Computing: Services and Architecture (IJCCSA …, 2012
52*2012
Clustering and ensemble based approach for securing electricity theft detectors against evasion attacks
I Elgarhy, MM Badr, MMEA Mahmoud, MM Fouda, M Alsabaan, ...
IEEE Access 11, 112147-112164, 2023
492023
ACCELERATING STREAM CIPHER OPERATIONS USING SINGLE AND GRID SYSTEMS
H Kholidy
US Patent US 20120089829A1, 2012
432012
US Patent: Accelerating stream cipher operations using single and grid systems
HA Kholidy
US Patent 8,533,456, 2012
432012
Towards Realizing a Distributed Event and Intrusion Detection System
Q Chen, HA Kholidy, S Abdelwahed, J Hamilton
The International Conference on Future Network Systems and Security (FNSS …, 2017
422017
QoS Optimization for Cloud Service Composition Based on Economic Model
H Kholidy, H Hassan, A Sarhan, A Erradi, S Abdelwahed
Internet of Things. User-Centric IoT, 355-366, 2015
422015
The system can't perform the operation now. Try again later.
Articles 1–20