Follow
Hisham A. Kholidy
Hisham A. Kholidy
The State University of New York (SUNY) Polytechnic Institute
Verified email at sunypoly.edu - Homepage
Title
Cited by
Cited by
Year
CIDS: A framework for intrusion detection in cloud systems
HA Kholidy, F Baiardi
2012 Ninth International Conference on Information Technology-New …, 2012
1662012
Autonomous mitigation of cyber risks in the Cyber-Physical Systems
HA Kholidy
Future Generation Computer Systems, 2021
1162021
CIDD: A cloud intrusion detection dataset for cloud computing and masquerade attacks
HA Kholidy, F Baiardi
2012 Ninth International Conference on Information Technology-New …, 2012
852012
An intelligent swarm based prediction approach for predicting cloud computing user resource needs
HA Kholidy
Computer Communications 151, 133-144, 2020
812020
A risk mitigation approach for autonomous cloud intrusion response system
HA Kholidy, A Erradi, S Abdelwahed, F Baiardi
Computing 98, 1111-1135, 2016
762016
DDSGA: A data-driven semi-global alignment approach for detecting masquerade attacks
HA Kholidy, F Baiardi, S Hariri
IEEE Transactions on Dependable and Secure Computing 12 (2), 164-178, 2014
752014
A finite state hidden markov model for predicting multistage attacks in cloud systems
HA Kholidy, A Erradi, S Abdelwahed, A Azab
2014 IEEE 12th International Conference on Dependable, Autonomic and Secure …, 2014
672014
Detecting impersonation attacks in cloud computing environments using a centric user profiling approach
HA Kholidy
Future Generation Computer Systems, 2021
562021
A Hierarchical Cloud Intrusion Detection System: Design and Evaluation
H Kholidy, F Baiardi, S Hariri, EM ElHariri, AM Youssouf, SA Shehata
International Journal on Cloud Computing: Services and Architecture (IJCCSA …, 2012
48*2012
Multi-Layer Attack Graph Analysis in the 5G Edge Network Using a Dynamic Hexagonal Fuzzy Method
HA Kholidy
Sensors 22 (1), 9, 2021
452021
5G Core Security in Edge Networks: A Vulnerability Assessment Approach
HA Kholidy, A Karam, JL Sidoran, MA Rahman
The 26th IEEE Symposium on Computers and Communications (ISCC), 1-6, 2021
412021
Toward Zero Trust Security in 5G Open Architecture Network Slices
HA Kholidy, A Karam, J Sidoran, MA Rahman, M Mahmoud, M Badr, ...
MILCOM 2022-2022 IEEE Military Communications Conference (MILCOM), 577-582, 2023
402023
Review of the Data-Driven Methods for Electricity Fraud Detection in Smart Metering Systems
MM Badr, MI Ibrahem, HA Kholidy, MM Fouda, M Ismail
Energies 16 (6), https://doi.org/10.3390/en16062852, 2023
392023
Towards Realizing a Distributed Event and Intrusion Detection System
Q Chen, HA Kholidy, S Abdelwahed, J Hamilton
The International Conference on Future Network Systems and Security (FNSS …, 2017
392017
QoS Optimization for Cloud Service Composition Based on Economic Model
H Kholidy, H Hassan, A Sarhan, A Erradi, S Abdelwahed
Internet of Things. User-Centric IoT, 355-366, 2015
382015
Network anomaly detection in 5G networks
A Rahman, M Mahmud, T Iqbal, L Saraireh, H Kholidy, M Gollapalli, ...
Journal of Mathematical Modelling of Engineering Problems. http://iieta. org …, 2022
372022
An adaptive decentralized scheduling mechanism for peer-to-peer Desktop Grids
AA Azab, HA Kholidy.
Computer Engineering & Systems, Cairo, 2008
372008
ACCELERATING STREAM CIPHER OPERATIONS USING SINGLE AND GRID SYSTEMS
H Kholidy
US Patent US 20120089829A1, 2012
362012
US Patent: Accelerating stream cipher operations using single and grid systems
HA Kholidy
US Patent 8,533,456, 2012
362012
Correlation‐based sequence alignment models for detecting masquerades in cloud computing
HA Kholidy
IET Information Security 14 (1), 39-50, 2020
352020
The system can't perform the operation now. Try again later.
Articles 1–20