Hesham Mekky
Hesham Mekky
Verified email at - Homepage
Cited by
Cited by
Application-aware Data Plane Processing in SDN
H Mekky, F Hao, S Mukherjee, ZL Zhang, TV Lakshman
ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN 2014), 2014
Detecting Malicious HTTP Redirections using Trees of User Browsing Activity
H Mekky, R Torres, ZL Zhang, S Saha, A Nucci
Proceedings IEEE INFOCOM, 2014, 1159-1167, 2014
Timing attacks on access privacy in information centric networks and countermeasures
A Mohaisen, H Mekky, X Zhang, H Xie, Y Kim
IEEE Transactions on Dependable and Secure Computing 12 (6), 675-687, 2014
Detecting malicious HTTP redirections using user browsing activity trees
R Torres, H Mekky, ZL Zhang, S Saha, A Nucci
US Patent 9,531,736, 2016
Magneto: Unified fine-grained path control in legacy and openflow hybrid networks
C Jin, C Lumezanu, Q Xu, H Mekky, ZL Zhang, G Jiang
Proceedings of the Symposium on SDN Research, 75-87, 2017
On virtual id assignment in networks for high resilience routing: a theoretical framework
G Ranjan, TN Nguyen, H Mekky, ZL Zhang
GLOBECOM 2020-2020 IEEE global communications conference, 1-6, 2020
Network function virtualization enablement within SDN data plane
H Mekky, F Hao, S Mukherjee, TV Lakshman, ZL Zhang
IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017
When raft meets SDN: How to elect a leader and reach consensus in an unruly network
Y Zhang, E Ramadan, H Mekky, ZL Zhang
Proceedings of the First Asia-Pacific Workshop on Networking, 1-7, 2017
Separation of benign and malicious network events for accurate malware family classification
H Mekky, A Mohaisen, ZL Zhang
2015 IEEE Conference on Communications and Network Security (CNS), 125-133, 2015
Detecting malicious activities with user‐agent‐based profiles
Y Zhang, H Mekky, ZL Zhang, R Torres, SJ Lee, A Tongaonkar, M Mellia
International Journal of Network Management 25 (5), 306-319, 2015
SAMPO: Online subflow association for multipath TCP with partial flow records
Y Zhang, H Mekky, ZL Zhang, F Hao, S Mukherjee, TV Lakshman
IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016
Systems, devices, and methods for separating malware and background events
H Mekky, A Mohaisen
US Patent 10,038,706, 2018
A virtual ID routing protocol for future dynamics networks and its implementation using the SDN paradigm
B Dumba, H Mekky, S Jain, G Sun, ZL Zhang
Journal of Network and Systems Management 24 (3), 578-606, 2016
Adaptive resilient routing via preorders in SDN
E Ramadan, H Mekky, B Dumba, ZL Zhang
Proceedings of the 4th Workshop on Distributed Cloud Computing, 1-6, 2016
Experience in Implementing & Deploying a Non-IP Routing Protocol VIRO in GENI
B Dumba, G Sun, H Mekky, ZL Zhang
Network Protocols (ICNP), 2014 IEEE 22nd International Conference on, 533-539, 2014
VIRO-GENI: SDN-based Approach for a Non-ip Protocol in GENI
H Mekky, C Jin, ZL Zhang
2014 Third GENI Research and Educational Experiment Workshop, 15-18, 2014
Detecting malicious HTTP redirections using user browsing activity trees
R Torres, H Mekky, ZL Zhang, S Saha, A Nucci
US Patent 9,912,680, 2018
POSTER: Blind Separation of Benign and Malicious Events to Enable Accurate Malware Family Classification
H Mekky, A Mohaisen, ZL Zhang
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
In-Network Dynamic Pathlet Switching with VIRO for SDN Networks
B Dumba, H Mekky, G Sun, ZL Zhang
2015 IEEE 35th International Conference on Distributed Computing Systems …, 2015
Taproot: Resilient Diversity Routing with Bounded Latency
E Ramadan, H Mekky, C Jin, B Dumba, ZL Zhang
Proceedings of the ACM SIGCOMM Symposium on SDN Research (SOSR), 135-147, 2021
The system can't perform the operation now. Try again later.
Articles 1–20