• A cost-aware model for risk mitigation in Cloud computing systems 

      Kholidy, Hisham A.; Erradi, Abdelkarim ( IEEE Computer Society , 2016 , Conference Paper)
      Security is an important element in Cloud computing. Intruders may exploit clouds for their advantage. This paper presents a cost-aware model for risk mitigation in cloud computing systems. The proposed model is integrated ...
    • A Deep Learning Spatiotemporal Prediction Framework for Mobile Crowdsourced Services 

      Ben Said, Ahmed; Erradi, Abdelkarim; Neiat, Azadeh Ghari; Bouguettaya, Athman ( Springer New York LLC , 2019 , Article)
      This papers presents a deep learning-based framework to predict crowdsourced service availability spatially and temporally. A novel two-stage prediction model is introduced based on historical spatio-temporal traces of ...
    • A distributed control approach for autonomic performance management in cloud computing environment 

      Mehrotra, Rajat; Abdelwahed, Sherif; Erradi, Abdelkarim ( IEEE Computer Society , 2013 , Conference Paper)
      In this paper, a distributed control based performance management approach is developed for a general class of web services deployed in a cloud computing environment. This approach is developed using interaction balance ...
    • A Domain Specific Language for Secure Outsourcing of Computation to the Cloud 

      Nassar, Mohamed; Erradi, Abdelkarim; Malluhi, Qutaibah M. ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      Secure outsourcing of computation has gained importance with the proliferation of cloud services. However, existing outsourcing protocol specification languages are mainly suitable for secure multi-party computation. They ...
    • A finite context intrusion prediction model for cloud systems with a probabilistic suffix tree 

      Kholidy, Hisham A.; Yousof, Ahmed M.; Erradi, Abdelkarim; Abdelwahed, Sherif; Ali, Hisham Arafat ( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference Paper)
      The success of the cloud computing paradigm depends on how effectively the cloud infrastructures will be able to instantiate and dynamically maintain computing platforms that meet Quality of Service (QoS) requirements. ...
    • A hierarchical, autonomous, and forecasting cloud IDS 

      Kholidy, Hisham A.; Erradi, Abdelkarim; Abdelwahed, Sherif; Baiardi, Fabrizio ( IEEE , 2013 , Conference Paper)
      Cloud computing supports distributed service oriented paradigm, multi-domain and multi-users administrative infrastructure. Due to the distributed nature of the cloud environment, it has high intrusion prospects and suspect ...
    • A model driven framework for secure outsourcing of computation to the cloud 

      Nassar, Mohamed; Erradi, Abdelkarim; Sabry, Farida; Malluhi, Qutaibah M. ( IEEE Computer Society , 2014 , Conference Paper)
      This paper presents a model driven approach to define then coordinate the execution of protocols for secure outsourcing of computation of large datasets in cloud computing environments. First we present our Outsourcing ...
    • A model-based approach to self-protection in computing system 

      Chen, Qian; Abdelwahed, Sherif; Erradi, Abdelkarim ( Association for Computing Machinery, Inc , 2013 , Conference Paper)
      This paper introduces a model-based autonomic security management (ASM) approach to estimate, detect and identify security attacks along with planning a sequence of actions to effectively protect the networked computing ...
    • A model-based validated autonomic approach to self-protect computing systems 

      Chen, Qian; Abdelwahed, Sherif; Erradi, Abdelkarim ( IEEE , 2014 , Article)
      This paper introduces an autonomic model-based cyber security management approach for the Internet of Things (IoT) ecosystems. The approach aims at realizing a self-protecting system, which has the ability to autonomously ...
    • A Modified Layer of Protection Analysis for Cyber-Physical Systems Security 

      Tantawy, Ashraf; Erradi, Abdelkarim; Abdelwahed, Sherif ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      Layer of Protection Analysis (LOPA) is the most commonly used approach for quantitative safety risk assessment in the process control industry to protect a Cyber- Physical System (CPS) from accidental hazards-causing ...
    • A predictive control approach for fault management of computing systems 

      Jia, Rui; Abdelwahed, Sherif; Erradi, Abdelkarim ( Association for Computing Machinery , 2015 , Conference Paper)
      In this paper, a model-based predictive control approach for fault management in computing systems is presented. The proposed approach can incorporate existing fault diagnosis methods and fault recovery actions to facilitate ...
    • A Probabilistic Approach for Maximizing Travel Journey WiFi Coverage Using Mobile Crowdsourced Services 

      Ben Said, Ahmed; Erradi , Abdelkarim ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)
      A public transport journey planning service often yields multiple alternative journeys plans to get from a source to a destination. In addition to journey preferences, such as connecting time and walking distance, passengers ...
    • A risk mitigation approach for autonomous cloud intrusion response system 

      Kholidy, Hisham A.; Erradi, Abdelkarim; Abdelwahed, Sherif; Baiardi , Fabrizio ( Springer-Verlag Wien , 2016 , Article)
      Cloud computing delivers on-demand resources over the Internet on a pay-for-use basis, intruders may exploit clouds for their advantage. This paper presents Autonomous Cloud Intrusion Response System (ACIRS), a proper ...
    • A service computing manifesto: The next 10 years 

      Bouguettaya, Athman; Singh, Munindar P.; Huhns, Michael N.; Sheng, Quan Z.; Dong, Hai; ... more authors ( Association for Computing Machinery , 2017 , Article Review)
      Mapping out the challenges and strategies for the widespread adoption of service computing is an important task. Service computing is a key paradigm that offers cross-disciplinary computational abstractions, architectures, ...
    • Addressing security compatibility for multi-tenant cloud services 

      Khan, Khaled M.; Erradi, Abdelkarim; Alhazbi, Saleh; Han, Jun ( Inderscience Publishers , 2013 , Article)
      This paper addresses the issue of compatibility checking between the security requirements of service clients and the security assurances provided by multi-tenant cloud services. To allow early detection of security ...
    • An autonomic detection and protection system for denial of service attack 

      Chen, Qian; Abdelwahed, Sherif; Erradi, Abdelkarim ( ACTA Press , 2012 , Conference Paper)
      This paper introduces a self-protection structure for computing system. The proposed structure aims to detect, classify and protect against DoS attacks. This architecture utilizes a model-based decision approach that ...
    • An efficient hybrid prediction approach for predicting cloud consumer resource needs 

      Erradi, Abdelkarim; Kholidy, Hisham A. ( IEEE Computer Society , 2016 , Conference Paper)
      The prediction of cloud consumer resource needs is a vital step for several cloud deployment applications such as capacity planning, workload management, and dynamic allocation of cloud resources. In this paper, we develop ...
    • Applying and evaluating architectural patterns on a stock trading case study 

      Erradi, Abdelkarim ( IEEE , 2012 , Conference Paper)
      Teaching architectural and design patterns is a difficult task and not easy to understand by the students as patterns are expressed at a higher abstraction level than programming language constructs or graphical UML ...
    • Attack Prediction Models for Cloud Intrusion Detection Systems 

      Kholidy, Hisham A.; Erradi, Abdelkarim; Abdelwahed, Sherif ( Institute of Electrical and Electronics Engineers Inc. , 2014 , Conference Paper)
      In spite of the functional and economic benefits of the cloud-computing systems, they also expose entirely several attacks. Most of the current cloud security technologies do not provide early warnings about such attacks. ...
    • Automatic generation of optimized workflow for distributed computations on large-scale matrices 

      Sabry, Farida; Erradi, Abdelkarim; Nassar, Mohamed; Malluhi, Qutaibah M. ( Springer Verlag , 2014 , Conference Paper)
      Efficient evaluation of distributed computation on large-scale data is prominent in modern scientific computation; especially analysis of big data, image processing and data mining applications. This problem is particularly ...