Follow
Hesham Mekky
Hesham Mekky
Verified email at cs.umn.edu - Homepage
Title
Cited by
Cited by
Year
Application-aware Data Plane Processing in SDN
H Mekky, F Hao, S Mukherjee, ZL Zhang, TV Lakshman
ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN 2014), 2014
1332014
Detecting Malicious HTTP Redirections using Trees of User Browsing Activity
H Mekky, R Torres, ZL Zhang, S Saha, A Nucci
Proceedings IEEE INFOCOM, 2014, 1159-1167, 2014
842014
Detecting malicious HTTP redirections using user browsing activity trees
R Torres, H Mekky, ZL Zhang, S Saha, A Nucci
US Patent 9,531,736, 2016
642016
Timing attacks on access privacy in information centric networks and countermeasures
A Mohaisen, H Mekky, X Zhang, H Xie, Y Kim
IEEE Transactions on Dependable and Secure Computing 12 (6), 675-687, 2014
562014
On virtual id assignment in networks for high resilience routing: a theoretical framework
G Ranjan, TN Nguyen, H Mekky, ZL Zhang
GLOBECOM 2020-2020 IEEE Global Communications Conference, 1-6, 2020
352020
Magneto: Unified fine-grained path control in legacy and OpenFlow hybrid networks
C Jin, C Lumezanu, Q Xu, H Mekky, ZL Zhang, G Jiang
Proceedings of the Symposium on SDN Research, 75-87, 2017
342017
When raft meets SDN: How to elect a leader and reach consensus in an unruly network
Y Zhang, E Ramadan, H Mekky, ZL Zhang
Proceedings of the First Asia-Pacific Workshop on Networking, 1-7, 2017
282017
Network function virtualization enablement within SDN data plane
H Mekky, F Hao, S Mukherjee, TV Lakshman, ZL Zhang
IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017
242017
Detecting malicious activities with user‐agent‐based profiles
Y Zhang, H Mekky, ZL Zhang, R Torres, SJ Lee, A Tongaonkar, M Mellia
International Journal of Network Management 25 (5), 306-319, 2015
212015
Separation of benign and malicious network events for accurate malware family classification
H Mekky, A Mohaisen, ZL Zhang
2015 IEEE Conference on Communications and Network Security (CNS), 125-133, 2015
202015
Systems, devices, and methods for separating malware and background events
H Mekky, A Mohaisen
US Patent 10,038,706, 2018
152018
SAMPO: Online subflow association for multipath TCP with partial flow records
Y Zhang, H Mekky, ZL Zhang, F Hao, S Mukherjee, TV Lakshman
IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016
152016
Adaptive resilient routing via preorders in SDN
E Ramadan, H Mekky, B Dumba, ZL Zhang
Proceedings of the 4th Workshop on Distributed Cloud Computing, 1-6, 2016
102016
A virtual ID routing protocol for future dynamics networks and its implementation using the SDN paradigm
B Dumba, H Mekky, S Jain, G Sun, ZL Zhang
Journal of Network and Systems Management 24, 578-606, 2016
102016
Experience in Implementing & Deploying a Non-IP Routing Protocol VIRO in GENI
B Dumba, G Sun, H Mekky, ZL Zhang
Network Protocols (ICNP), 2014 IEEE 22nd International Conference on, 533-539, 2014
72014
Detecting malicious HTTP redirections using user browsing activity trees
R Torres, H Mekky, ZL Zhang, S Saha, A Nucci
US Patent 9,912,680, 2018
62018
VIRO-GENI: SDN-based Approach for a Non-ip Protocol in GENI
H Mekky, C Jin, ZL Zhang
2014 Third GENI Research and Educational Experiment Workshop, 15-18, 2014
62014
POSTER: Blind Separation of Benign and Malicious Events to Enable Accurate Malware Family Classification
H Mekky, A Mohaisen, ZL Zhang
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
42014
In-Network Dynamic Pathlet Switching with VIRO for SDN Networks
B Dumba, H Mekky, G Sun, ZL Zhang
2015 IEEE 35th International Conference on Distributed Computing Systems …, 2015
22015
Taproot: Resilient diversity routing with bounded latency
E Ramadan, H Mekky, C Jin, B Dumba, ZL Zhang
Proceedings of the ACM SIGCOMM Symposium on SDN Research (SOSR), 135-147, 2021
12021
The system can't perform the operation now. Try again later.
Articles 1–20