Adel El-Atawy
- Research Area(s)
- Networking
- Algorithms and Theory
Google Publications
-
End-to-end Verification of QoS Policies
Adel El-Atawy, Taghrid Samak
The 13th IEEE/IFIP Network Operations and Management Symposium (NOMS 2012)
-
Towards A Unified Modeling and Verification of Network and System Security Configuration
Mohammed Noraden Alsaleh, Ehab Al-Shaer, Adel El-Atawy
5th Symposium on Configuration Analytics and Automation (SafeConfig 2012)
-
QoS Policy Verification for DiffServ Networks
Taghrid Samak, Adel El-Atawy
19th International Workshop on Quality of Service, IWQoS'11 (2011), pp. 1-3
Previous Publications
-
Building Covert Channels over the Packet Reordering Phenomenon
INFOCOM'09, IEEE (2009), pp. 2186-2194
-
Network Configuration in a Box: Towards End-to-end Verification of Network Reachability and Security
Adel El-Atawy, Khalid ElBadawi, Will Marrero, Ehab Al-Shaer
International Conference on Network Protocols (ICNP) (2009)
-
A Game-theoretic Model for Capacity-constrained Fair Bandwidth Allocation
Yonghe Yan, Adel El-Atawy
Wiley's International Journal on Network Management (IJNM) special issue on Mathematical Methods in Network Management, vol. 18 (2008), pp. 467-483
-
An Automated Framework for Validating Firewall Policy Enforcement
Adel El-Atawy, Taghrid Samak, Zein Wali
The eighth International Workshop on Policies for Distributed Systems and Networks (Policy'07) (2007)
-
On Using Online Traffic Statistical Matching for Optimizing Packet Filtering Performance
Adel El-Atawy, Taghrid Samak, Hong Li
The 26th Annual IEEE Conference on Computer Communications (INFOCOM'07) (2007)
-
Ranking-based Optimal Resource Allocation in Peer-to-Peer Networks
Yonghe Yan, Adel El-Atawy
The 26th Annual IEEE Conference on Computer Communications (INFOCOM'07) (2007)
-
Adaptive Statistical Optimization Techniques for Firewall Packet Filtering
Hazem Hamed, Adel El-Atawy
INFOCOM (2006)
-
On Dynamic Optimization of Packet Matching in High Speed Firewalls
Hazem Hamed, Adel El-Atawy
IEEE Journal on Selected Areas in Communications (JSAC) special issue on High-Speed Network Security: Architecture, Algorithms and Implementations, vol. 24 (2006), pp. 1817-1830
