Exploiting the transients of adaptation for RoQ attacks on Internet resources M Guirguis, A Bestavros, I Matta Proceedings of the 12th IEEE International Conference on Network Protocols …, 2004 | 211 | 2004 |
Reduction of quality (RoQ) attacks on internet end-systems M Guirguis, A Bestavros, I Matta, Y Zhang Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and …, 2005 | 180 | 2005 |
Friendly virtual machines: leveraging a feedback-control model for application adaptation Y Zhang, A Bestavros, M Guirguis, I Matta, R West Proceedings of the 1st ACM/USENIX international conference on Virtual …, 2005 | 108 | 2005 |
Transient clouds: Assignment and collaborative execution of tasks on mobile devices T Penner, A Johnson, B Van Slyke, M Guirguis, Q Gu 2014 IEEE Global Communications Conference, 2801-2806, 2014 | 68 | 2014 |
Reduction of quality (RoQ) attacks on dynamic load balancers: Vulnerability assessment and design tradeoffs M Guirguis, A Bestavros, I Matta, Y Zhang IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007 | 49 | 2007 |
Don’t bury your head in warnings: A game-theoretic approach for intelligent allocation of cyber-security alerts A Schlenker, H Xu, M Guirguis, C Kiekintveld, A Sinha, M Tambe, S Sonya, ... | 41 | 2017 |
On the impact of low-rate attacks M Guirguis, A Bestavros, I Matta 2006 IEEE International Conference on Communications 5, 2316-2321, 2006 | 35 | 2006 |
Bandwidth stealing via link targeted RoQ attacks M Guirguis, A Bestavros, I Matta Proceedings of the 2nd IASTED International Conference on Communication and …, 2004 | 26 | 2004 |
Context‐awareness over transient cloud in D2D networks: energy performance analysis and evaluation I Bisio, F Lavagetto, A Sciarrone, T Penner, M Guirguis Transactions on Emerging Telecommunications Technologies 28 (2), e3002, 2017 | 24 | 2017 |
Combating the bandits in the cloud: A moving target defense approach T Penner, M Guirguis 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid …, 2017 | 23 | 2017 |
Stealthy ip prefix hijacking: don't bite off more than you can chew C McArthur, M Guirguis GLOBECOM 2009-2009 IEEE Global Telecommunications Conference, 1-6, 2009 | 22 | 2009 |
Providing soft bandwidth guarantees using elastic TCP-based tunnels M Guirguis, A Bestavros, I Matta, N Riga, G Diamant, Y Zhang Proceedings. ISCC 2004. Ninth International Symposium on Computers And …, 2004 | 17 | 2004 |
Secure mobile cloud computing and security issues Q Gu, M Guirguis High performance cloud auditing and applications, 65-90, 2013 | 16 | 2013 |
Can you help me run these code segments on your mobile device? M Guirguis, R Ogden, Z Song, S Thapa, Q Gu 2011 IEEE Global Telecommunications Conference-GLOBECOM 2011, 1-5, 2011 | 16 | 2011 |
itmBench: Generalized API for Internet traffic managers G Diamant, L Veytser, I Malta, A Bestavros, M Guirguis, L Guo, Y Zhang, ... IEEE Global Telecommunications Conference Workshops, 2004. GlobeCom …, 2004 | 16 | 2004 |
It's time to migrate! A game-theoretic framework for protecting a multi-tenant cloud against collocation attacks AH Anwar, G Atia, M Guirguis 2018 IEEE 11th International Conference on Cloud Computing (CLOUD), 725-731, 2018 | 14 | 2018 |
Collaborative computing on-demand: Harnessing mobile devices in executing on-the-fly jobs T Langford, Q Gu, A Rivera-Longoria, M Guirguis 2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems …, 2013 | 14 | 2013 |
Adversarial exploits of end-systems adaptation dynamics M Guirguis, A Bestavros, I Matta, Y Zhang Journal of Parallel and Distributed Computing 67 (3), 318-335, 2007 | 14 | 2007 |
A game-theoretic framework for the virtual machines migration timing problem AH Anwar, G Atia, M Guirguis IEEE Transactions on Cloud Computing 9 (3), 854-867, 2019 | 11 | 2019 |
Game theoretic defense approach to wireless networks against stealthy decoy attacks AH Anwar, G Atia, M Guirguis 2016 54th Annual Allerton Conference on Communication, Control, and …, 2016 | 11 | 2016 |