Hesham Mekky
Hesham Mekky
Geverifieerd e-mailadres voor cs.umn.edu - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Application-aware Data Plane Processing in SDN
H Mekky, F Hao, S Mukherjee, ZL Zhang, TV Lakshman
ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN 2014), 2014
1192014
Detecting Malicious HTTP Redirections using Trees of User Browsing Activity
H Mekky, R Torres, ZL Zhang, S Saha, A Nucci
Proceedings IEEE INFOCOM, 2014, 1159-1167, 2014
642014
Timing attacks on access privacy in information centric networks and countermeasures
A Mohaisen, H Mekky, X Zhang, H Xie, Y Kim
IEEE Transactions on Dependable and Secure Computing 12 (6), 675-687, 2014
442014
Magneto: Unified fine-grained path control in legacy and openflow hybrid networks
C Jin, C Lumezanu, Q Xu, H Mekky, ZL Zhang, G Jiang
Proceedings of the Symposium on SDN Research, 75-87, 2017
232017
Network function virtualization enablement within SDN data plane
H Mekky, F Hao, S Mukherjee, TV Lakshman, ZL Zhang
IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017
192017
Detecting malicious HTTP redirections using user browsing activity trees
R Torres, H Mekky, Z Zhang, S Saha, A Nucci
US Patent 9,531,736, 2016
192016
When raft meets SDN: How to elect a leader and reach consensus in an unruly network
Y Zhang, E Ramadan, H Mekky, ZL Zhang
Proceedings of the First Asia-Pacific Workshop on Networking, 1-7, 2017
172017
Separation of benign and malicious network events for accurate malware family classification
H Mekky, A Mohaisen, ZL Zhang
2015 IEEE Conference on Communications and Network Security (CNS), 125-133, 2015
172015
Systems, devices, and methods for separating malware and background events
H Mekky, A Mohaisen
US Patent 10,038,706, 2018
15*2018
Detecting malicious activities with user‐agent‐based profiles
Y Zhang, H Mekky, ZL Zhang, R Torres, SJ Lee, A Tongaonkar, M Mellia
International Journal of Network Management 25 (5), 306-319, 2015
152015
SAMPO: Online subflow association for multipath TCP with partial flow records
Y Zhang, H Mekky, ZL Zhang, F Hao, S Mukherjee, TV Lakshman
IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016
112016
A virtual ID routing protocol for future dynamics networks and its implementation using the SDN paradigm
B Dumba, H Mekky, S Jain, G Sun, ZL Zhang
Journal of Network and Systems Management 24 (3), 578-606, 2016
72016
Experience in Implementing & Deploying a Non-IP Routing Protocol VIRO in GENI
B Dumba, G Sun, H Mekky, ZL Zhang
Network Protocols (ICNP), 2014 IEEE 22nd International Conference on, 533-539, 2014
62014
VIRO-GENI: SDN-based Approach for a Non-ip Protocol in GENI
H Mekky, C Jin, ZL Zhang
2014 Third GENI Research and Educational Experiment Workshop, 15-18, 2014
62014
Adaptive resilient routing via preorders in sdn
E Ramadan, H Mekky, B Dumba, ZL Zhang
Proceedings of the 4th Workshop on Distributed Cloud Computing, 1-6, 2016
52016
POSTER: Blind Separation of Benign and Malicious Events to Enable Accurate Malware Family Classification
H Mekky, A Mohaisen, ZL Zhang
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
42014
Detecting malicious HTTP redirections using user browsing activity trees
R Torres, H Mekky, Z Zhang, S Saha, A Nucci
US Patent 9,912,680, 2018
22018
In-Network Dynamic Pathlet Switching with VIRO for SDN Networks
B Dumba, H Mekky, G Sun, ZL Zhang
2015 IEEE 35th International Conference on Distributed Computing Systems …, 2015
22015
On virtual id assignment in networks for high resilience routing: A theoretical framework
G Ranjan, TN Nguyen, H Mekky, ZL Zhang
GLOBECOM 2020-2020 IEEE Global Communications Conference, 1-6, 2020
12020
Exerting fine-grained path control over legacy switches in hybrid networks
C Jin, C Lumezanu, Q Xu, H Mekky, ZL Zhang, G Jiang
12016
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20