Hesham Mekky
Hesham Mekky
Verified email at cs.umn.edu - Homepage
Title
Cited by
Cited by
Year
Application-aware Data Plane Processing in SDN
H Mekky, F Hao, S Mukherjee, ZL Zhang, TV Lakshman
ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN 2014), 2014
1102014
Detecting Malicious HTTP Redirections using Trees of User Browsing Activity
H Mekky, R Torres, ZL Zhang, S Saha, A Nucci
Proceedings IEEE INFOCOM, 2014, 1159-1167, 2014
532014
Timing attacks on access privacy in information centric networks and countermeasures
A Mohaisen, H Mekky, X Zhang, H Xie, Y Kim
IEEE Transactions on Dependable and Secure Computing 12 (6), 675-687, 2014
382014
Magneto: Unified fine-grained path control in legacy and openflow hybrid networks
C Jin, C Lumezanu, Q Xu, H Mekky, ZL Zhang, G Jiang
Proceedings of the Symposium on SDN Research, 75-87, 2017
202017
When raft meets SDN: How to elect a leader and reach consensus in an unruly network
Y Zhang, E Ramadan, H Mekky, ZL Zhang
Proceedings of the First Asia-Pacific Workshop on Networking, 1-7, 2017
162017
Separation of benign and malicious network events for accurate malware family classification
H Mekky, A Mohaisen, ZL Zhang
2015 IEEE Conference on Communications and Network Security (CNS), 125-133, 2015
142015
Generating a function within a logic design using a dialog box
WR Wheeler, MJ Adiletta, TJ Fennell
US Patent 6,708,321, 2004
14*2004
Network function virtualization enablement within SDN data plane
H Mekky, F Hao, S Mukherjee, TV Lakshman, ZL Zhang
IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017
122017
Detecting malicious activities with user‐agent‐based profiles
Y Zhang, H Mekky, ZL Zhang, R Torres, SJ Lee, A Tongaonkar, M Mellia
International Journal of Network Management 25 (5), 306-319, 2015
122015
Detecting malicious HTTP redirections using user browsing activity trees
R Torres, H Mekky, ZL Zhang, S Saha, A Nucci
US Patent 9,531,736, 2016
102016
SAMPO: Online subflow association for multipath TCP with partial flow records
Y Zhang, H Mekky, ZL Zhang, F Hao, S Mukherjee, TV Lakshman
IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016
102016
A virtual ID routing protocol for future dynamics networks and its implementation using the SDN paradigm
B Dumba, H Mekky, S Jain, G Sun, ZL Zhang
Journal of Network and Systems Management 24 (3), 578-606, 2016
72016
Experience in Implementing & Deploying a Non-IP Routing Protocol VIRO in GENI
B Dumba, G Sun, H Mekky, ZL Zhang
Network Protocols (ICNP), 2014 IEEE 22nd International Conference on, 533-539, 2014
52014
VIRO-GENI: SDN-based Approach for a Non-ip Protocol in GENI
H Mekky, C Jin, ZL Zhang
2014 Third GENI Research and Educational Experiment Workshop, 15-18, 2014
52014
Adaptive resilient routing via preorders in sdn
E Ramadan, H Mekky, B Dumba, ZL Zhang
Proceedings of the 4th Workshop on Distributed Cloud Computing, 1-6, 2016
42016
POSTER: Blind Separation of Benign and Malicious Events to Enable Accurate Malware Family Classification
H Mekky, A Mohaisen, ZL Zhang
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
42014
In-Network Dynamic Pathlet Switching with VIRO for SDN Networks
B Dumba, H Mekky, G Sun, ZL Zhang
2015 IEEE 35th International Conference on Distributed Computing Systems …, 2015
22015
Exerting fine-grained path control over legacy switches in hybrid networks
C Jin, C Lumezanu, Q Xu, H Mekky, ZL Zhang, G Jiang
Univ. Minnesote, Minneapolis, MN, USA, Rep. TR, 16-035, 2016
12016
Detecting malicious HTTP redirections using user browsing activity trees
R Torres, H Mekky, ZL Zhang, S Saha, A Nucci
US Patent 9,912,680, 2018
2018
Securing and Protecting Enterprise Networks via Data-driven Analytics and Application-aware SDN
H Mekky
2016
The system can't perform the operation now. Try again later.
Articles 1–20