Publications

11/18/13

Home
Biography
Publications
Research
Projects
Teaching
Favorites
Feedback

 

Dr. Mohammed Houssaini Sqalli

 

Publications and Citations (Google Scholar)

 

Journal Publications:

  1. Mohammed H. Sqalli, Syed Naeem Firdous, Khaled Salah, and Marwan Abu-Amara, “Classifying malicious activities in Honeynets using entropy and volume-based thresholds”, Security and Communication Networks, John Wiley & Sons, Ltd, Volume 6, Issue 5, pages 567–583, May 2013.

  2. Marwan Abu-Amara, Abdulaziz Al-Baiz, Ashraf S. Mahmoud, Mohammed H. Sqalli, and Farag Azzedin, “A scalable NAT-based solution to Internet access denial by higher-tier ISPs”, Security and Communication Networks, John Wiley & Sons, Ltd, Volume 6, Issue 2, pages 194–209, February 2013.

  3. Ashraf S Mahmoud, Ahmad Salam Alrefai, Marwan Abu-Amara, Mohammed Sqalli, and Farag Azzedin, “Qualitative analysis of methods for circumventing malicious ISP blocking”, Arabian Journal for Science and Engineering, Springer Berlin/Heidelberg, Volume 37, Number 7, pp. 1911-1928, October 2012.

  4. K. Salah, K. Sattar, M. Sqalli, and Ehab Al-Shaer, “A Potential Low-Rate DoS Attack Against Network Firewalls”. Security and Communication Networks, John Wiley & Sons, Ltd., Volume 4, Issue 2, Pages: 136–146, February 2011.

  5. Mohammed H. Sqalli, Sadiq M. Sait, and Syed Asadullah, “OSPF Weight Setting Optimization for Single Link Failures”. International Journal of Computer Networks & Communications (IJCNC), Volume 3, Issue 1, Pages: 168–183, January 2011.

  6. K. Salah, K. Sattar, Z. A. Baig, M. Sqalli, and P. Calyam, “Discovering Last-matching Rules in Popular Open-source and Commercial Firewalls”. Special Issue on "Recent Advances on Network Attacks and Defences". International Journal of Internet Protocol Technology (IJIPT), Volume 5, Issue 1/2, Pages: 23-31, April 2010.

  7. Sadiq M. Sait, Mohammed H. Sqalli, and Syed Asadullah, “Parallel Tabu Search for Optimizing the OSPF Weight Setting Problem”. WSEAS Transactions on Communications, Volume 8, Issue 3, March 2009, Pages: 311-320.

  8. Shaik Sirajuddin, and Mohammed H. Sqalli, “Distributed XML-based Network Management using JPVM”. International Journal of Network Management (IJNM), John Wiley & Sons, Inc. Volume 16, Issue 4, July/August 2006, Pages: 263-277.

  9. Syed M. S. Islam, Mohammed H. Sqalli, and Sohel Khan, “Modeling and Formal Verification of DHCP Using SPIN”. International Journal of Computer Science & Applications (IJCSA), Volume 3, No. 2, June 2006, Pages: 145-159.

  10. Cynthia Marling, Mohammed Sqalli, Edwina Rissland, Hector Muñoz-Avila, and David Aha, “Case-Based Reasoning Integrations”. AI Magazine, Volume 23, Issue 1, Spring 2002, 69-86.

  11. Mohammed H. Sqalli, and Eugene C. Freuder, “A Constraint Satisfaction Model for Testing Emulated LANs in ATM Networks”. Canadian Artificial Intelligence Magazine on AI in Network Management. No. 41, Spring/Summer 1997. This paper was also published in Working Papers of the Seventh International Workshop on Principles of Diagnosis (DX-96), October 13-16, 1996, Val Morin, Quebec, Canada.

  12. Mohammed H. Sqalli, Raed AlShaikh, and Ezzat Ahmed, “Towards Simulating a Virtual Distributed Honeynet at KFUPM: A Case Study,” The IEEE UKSim 4th European Modelling Symposium on Mathematical Modelling and Computer Simulation (EMS), Pisa, Italy, November 17-19, 2010.

 

Conference Publications:

  1. Fahd Al-Haidari, Mohammed H Sqalli, and Khaled Salah, “Impact of CPU Utilization Thresholds and Scaling Size on Autoscaling Cloud Resources”, The 5th IEEE International Conference on Cloud Computing Technology and Science (IEEE CloudCom 2013), Bristol, United Kingdom, December 2-5, 2013.

  2. Mohammed Yahya Alkaff and Mohammed H. Sqalli, “Design and Deployment of a Cloud Computing Platform for Testing Attacks,” The Fourth Scientific Conference for Students of Higher Education in the K.S.A. (SSC4), Makkah, Saudi Arabia, April 29- May 2, 2013. (http://www.youtube.com/watch?v=4mskg1CN2do)

  3. Mohammed H. Sqalli, Mohammed Al-saeedi, Farid Binbeshr, and Mohammed Siddiqui, “UCloud: A Simulated Hybrid Cloud for A University Environment”, The 1st IEEE International Conference on Cloud Networking (IEEE CLOUDNET 2012), Paris, France, November 28-30, 2012.

  4. Fahd Al-Haidari, Mohammed H Sqalli, and Khaled Salah, “Enhanced EDoS-Shield for Mitigating EDoS Attacks Originating from Spoofed IP Addresses”, The 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp.1167-1174, Liverpool, United Kingdom, June 25-27, 2012.

  5. Mohammed H. Sqalli, Fahd Al-Haidari, and Khaled Salah, “EDoS-Shield - A Two-Steps Mitigation Technique against EDoS Attacks in Cloud Computing,” The 4th IEEE/ACM International Conference on Utility and Cloud Computing (UCC 2011), Melbourne, Australia, December 5-7, 2011.

  6. A. Al-Ghadhban, A. Mahmoud, M. Abu-Amara, F. Azzedin, and M. Sqalli, “Prototyping and Evaluating BGP-Based Solutions to Overcome Malicious IISP Blocking,” The 2nd International Conference on Networking and Information Technology, pp. 134-143, Hong Kong, November 25-27, 2011.

  7. Zubair A. Baig, Saad Khan, Saif Ahmed, and Mohammed Sqalli, “A Selective Parameter-based Evolutionary Technique for Network Intrusion Detection”, The 11th International Conference on Intelligent Systems Design and Applications (ISDA), Córdoba, Spain, November 22-24, 2011.

  8. Mohammed H. Sqalli, Syed Naeem Firdous, Zubair A. Baig, and Farag Azzedin, “An Entropy and Volume-based Approach for Identifying Malicious Activities in Honeynet Traffic,” The International Conference on Cyberworlds, Banff, Alberta, Canada, October 4-6, 2011.

  9. Mohammed H. Sqalli, Shoieb Arshad, Mohammad Khalaf, and Khaled Salah, “Identifying Scanning Activities in Honeynet Data using Data Mining”, The 3rd International Conference on Computational Intelligence, Communication Systems and Networks (CICSyN 2011), pp. 178-183, Bali, Indonesia, July 26-28, 2011.

  10. Marwan Abu-Amara, Mohammed A.K. Asif, Mohammed H. Sqalli, Ashraf Mahmoud, and Farag Azzedin, “Resilient Internet Access Using Tunnel-Based Solution for Malicious ISP Blocking,” The 3rd IEEE International Conference on Communication Software and Networks (ICCSN 2011), Xi an, China, May 27-29, 2011.

  11. Mohammed H. Sqalli, Syed Naeem Firdous, Khaled Salah, and Marwan Abu-Amara, “Identifying Network Traffic Features Suitable for Honeynet Data Analysis,” The 24th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE 2011), Niagara Falls, Ontario, Canada, May 8-11, 2011.

  12. Marwan Abu-Amara, Farag Azzedin, Fahd A. Abdulhameed, Ashraf Mahmoud, and Mohammed H. Sqalli, “Dynamic Peer-To-Peer (P2P) Solution to Counter Malicious Higher Domain Name System (DNS) Nameservers,” The 24th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE 2011), Niagara Falls, Ontario, Canada, May 8-11, 2011.

  13. Abdulaziz Al-Baiz, Marwan Abu-Amara, Ashraf Mahmoud, Mohammed H.  Sqalli, and Farag Azzedin, “Internet Access Denial By Higher-Tier ISPs: A NAT-Based Solution,” The 24th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE 2011), Niagara Falls, Ontario, Canada, May 8-11, 2011.

  14. Syed Naeem Firdous and Mohammed H. Sqalli, “Identifying Features for Honeynet Data Analysis using Feature Evaluation,” The Second Scientific Conference for Graduate and Undergraduate Students, Jeddah, Saudi Arabia, March 28-31, 2011.

  15. M. K. Alhamwi, O. Al-Hmouz, M. H. Sqalli, K.A Salah, “Delay-based Probing Technique for the Discovery of a Firewall's Accept Rules,” The 6th IEEE-GCC Conference and Exhibition, Pages: 445 – 448, February 19-22, 2011, Dubai, UAE.

  16. Mohammed H. Sqalli, Raed AlShaikh, and Ezzat Ahmed, “Towards Simulating a Virtual Distributed Honeynet at KFUPM: A Case Study,” The IEEE UKSim 4th European Modelling Symposium on Mathematical Modelling and Computer Simulation (EMS), Pisa, Italy, November 17-19, 2010.

  17. Mohammed H. Sqalli, Raed AlShaikh, and Ezzat Ahmed, “A Distributed Honeynet at KFUPM: A Case Study”. The 13th International Symposium on Recent Advances in Intrusion Detection (RAID), LNCS 6307, pp. 486-487, Ottawa, Ontario, Canada, September 15-17, 2010.

  18. Mohammed H. Sqalli, Sadiq M. Sait, and Syed Asadullah, Optimizing OSPF Routing for Link Failure Scenarios”. The Fifth International Workshop on Advanced Computation for Engineering Applications (ACEA-2010), March 9, 2010, Taif University, Saudi Arabia.

  19. Naeem Ferdous and Mohammed H. Sqalli, “Saudi Honeynet Project”. First Scientific Conference for Graduate and Undergraduate Students, Riyadh, 1-3 March 2010.

  20. K. Salah, K. Sattar, Z. A. Baig, M. Sqalli, and P. Calyam, “Resiliency of Open-Source Firewalls against Remote Discovery of Last-Matching Rules”. The 2nd International Conference on Security of Information and Networks (SIN 2009), October 6-10, 2009, North Cyprus, Turkey.

  21. F. Al-Haidari, M. Sqalli, K. Salah, and J. Hamodi, "An Entropy-Based Countermeasure against Intelligent DoS Attacks Targeting Firewalls".  The IEEE International Symposium on Policies for Distributed Systems and Networks, Policy’2009, Pages: 41-44, July 20-22, 2009, Imperial College London, UK.

  22. Sadiq M. Sait, Mohammed H. Sqalli, and Syed Asadullah, “Optimizing OSPF Routing Using Accelerated Iterative Heuristic”. The 8th WSEAS International Conference on Artificial Intelligence, Knowledge Engineering, and Databases (AIKED'09), February 21-23, 2009, University of Cambridge, Cambridge, UK.

  23. K. Salah, K. Sattar, M. Sqalli, and Ehab Al-Shaer, “A Probing Technique for Discovering Last-Matching Rules of a Network Firewall”. The 5th International Conference on Innovations in Information Technology (Innovations’08), December 16-18, 2008, Al Ain, United Arab Emirates (UAE).

  24. Mohammed H. Sqalli, Sadiq M. Sait, and Syed Asadullah, “Minimizing the Number of Congested Links in OSPF Routing”. The Australasian Telecommunications Networking and Application Conference (ATNAC-2008), December 7-10, 2008, Adelaide, Australia.

  25. Sadiq M. Sait, Mohammed H. Sqalli, and Mohammed Aijaz Mohiuddin, “Engineering Evolutionary Algorithm to Solve multi-objective OSPF weight setting problem”, the 19th ACS Australian Joint Conference on Artificial Intelligence (AI-2006), Lecture notes in computer science, ISSN 0302-9743, Hobart, Tasmania, Australia, December 4-8, 2006.

  26. Mohammed H. Sqalli, Sadiq M. Sait, and Mohammed Aijaz Mohiuddin, “An Enhanced Estimator to Multi-objective OSPF Weight Setting Problem”. The 10th IEEE/IFIP Network Operations and Management Symposium (NOMS-2006), April 3-7, 2006, Vancouver, Canada.

  27. Mohammed H. Sqalli, and Shaik Sirajuddin, “An Adaptive Load-balancing Approach to XML-based Network Management using JPVM”. The 13th IEEE International Conference on Networks (ICON 2005), November 16-18, 2005, Kuala Lumpur, Malaysia.

  28. Mohammed H. Sqalli, and Shaik Sirajuddin, “Static Weighted Load-balancing for XML-based Network Management using JPVM”. The 8th IFIP/IEEE International Conference on Management of Multimedia Networks and Services (MMNS 2005), J. Dalmau and G. Hasegawa (Eds.): LNCS 3754, pp. 228 – 241, October 24-26, 2005, Barcelona, Spain.

  29. Syed M. S. Islam, Mohammed H. Sqalli, and Sohel Khan, “Simulation and Formal Verification of DHCP”. Information and Communication Technologies International Symposium (ICTIS-2005), June 3-6, 2005, Tetouan, Morocco.

  30. Shaik Sirajuddin, and Mohammed H. Sqalli, “Comparison of CSV and DOM Tree Approaches in XML-based Network Management”. The 12th IEEE International Conference on Telecommunications (ICT 2005), May 3 - 6, 2005, Cape Town, South Africa.

  31. Mohammed H. Sqalli, and Shaik Sirajuddin, “Framework for Extensions to XML-based Network Management”. International Conference on Information & Computer Science (ICICS 2004), Nov. 29 - Dec. 1, 2004, Dhahran, Saudi Arabia.

  32. Mohammed H. Sqalli, and Eugene C. Freuder, “Case-Based Reasoning to Enhance Diagnosis and CSP Model Debugging in Interoperability Testing: ADIOP”. The IASTED International Conference on Intelligent Systems & Control (ISC-2003), June 25-27, 2003, Salzburg, Austria.

  33. Mohammed H. Sqalli, and Eugene C. Freuder, Constraint-Based Modeling of InterOperability Problems Using an Object-Oriented Approach”. The Thirteenth Innovative Applications of Artificial Intelligence Conference on Artificial Intelligence (IAAI-01), August 7-9, 2001, Seattle, Washington.

  34. Mohammed H. Sqalli, and Eugene C. Freuder, Solving InterOperability Problems Using Object-Oriented CSP Modeling. The IJCAI-01 Workshop on Modelling and Solving Problems with Constraints, August 5-6, 2001, Seattle, Washington.

  35. Mohammed H. Sqalli, Lisa Purvis, and Eugene C. Freuder, “Survey of Applications Integrating Constraint Satisfaction and Case-Based Reasoning”. The First International Conference and Exhibition on the Practical Application of Constraint Technologies and Logic Programming (PACLP99), April 19-21, 1999, London, UK.

  36. Mohammed H. Sqalli, and Eugene C. Freuder, “Diagnosing InterOperability Problems by Enhancing Constraint Satisfaction with Case-Based Reasoning”. The Ninth International Workshop on Principles of Diagnosis (DX-98), 1998.

  37. Mohammed H. Sqalli, and Eugene C. Freuder, “Integration of CSP and CBR to Compensate for Incompleteness and Incorrectness of Models”. The AAAI-98 Spring Symposium on Multimodal Reasoning, March 23-25, 1998, Stanford University, California, USA.

  38. Mohammed H. Sqalli, and Eugene C. Freuder, “Inference-Based Constraint Satisfaction Supports Explanation”. The Thirteenth National Conference on Artificial Intelligence (AAAI-96), August 4-8, 1996, Portland, Oregon, USA.

  •  
  • Home | Biography | Publications | Research | Projects | Teaching | Favorites | Feedback

    This site was last updated 11/18/13