<?xml version="1.0"?>
<dblpperson name="Maher Khan" pid="298/9409" n="4">
<person key="homepages/298/9409" mdate="2021-08-09">
<author pid="298/9409">Maher Khan</author>
</person>
<r><inproceedings key="conf/srds/BommareddyKNGCL24" mdate="2025-04-01">
<author pid="325/3859">Sahiti Bommareddy</author>
<author pid="298/9409">Maher Khan</author>
<author pid="365/9109">Huzaifah Nadeem</author>
<author pid="295/9502">Benjamin Gilby</author>
<author pid="325/4011">Imes Chiu</author>
<author pid="250/2720">John W. van de Lindt</author>
<author pid="234/3847">Omar Nofal</author>
<author pid="187/9927">Mathaios Panteli</author>
<author pid="325/4308">Linton Wells</author>
<author pid="15/5788">Yair Amir</author>
<author orcid="0000-0002-9982-1364" pid="165/8309">Amy Babay</author>
<title>Tolerating Compound Threats in Critical Infrastructure Control Systems.</title>
<pages>66-79</pages>
<year>2024</year>
<booktitle>SRDS</booktitle>
<ee>https://doi.org/10.1109/SRDS64841.2024.00017</ee>
<crossref>conf/srds/2024</crossref>
<url>db/conf/srds/srds2024.html#BommareddyKNGCL24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/srds/KhanB23" mdate="2025-04-01">
<author pid="298/9409">Maher Khan</author>
<author orcid="0000-0002-9982-1364" pid="165/8309">Amy Babay</author>
<title>Making Intrusion Tolerance Accessible: A Cloud-Based Hybrid Management Approach to Deploying Resilient Systems.</title>
<pages>254-267</pages>
<year>2023</year>
<booktitle>SRDS</booktitle>
<ee>https://doi.org/10.1109/SRDS60354.2023.00033</ee>
<crossref>conf/srds/2023</crossref>
<url>db/conf/srds/srds2023.html#KhanB23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dsn/BommareddyGKCPL22" mdate="2023-06-26">
<author pid="325/3859">Sahiti Bommareddy</author>
<author pid="295/9502">Benjamin Gilby</author>
<author pid="298/9409">Maher Khan</author>
<author pid="325/4011">Imes Chiu</author>
<author pid="187/9927">Mathaios Panteli</author>
<author pid="250/2720">John W. van de Lindt</author>
<author pid="325/4308">Linton Wells</author>
<author pid="15/5788">Yair Amir</author>
<author orcid="0000-0002-9982-1364" pid="165/8309">Amy Babay</author>
<title>Data-Centric Analysis of Compound Threats to Critical Infrastructure Control Systems.</title>
<pages>72-79</pages>
<year>2022</year>
<booktitle>DSN Workshops</booktitle>
<ee>https://doi.org/10.1109/DSN-W54100.2022.00022</ee>
<crossref>conf/dsn/2022w</crossref>
<url>db/conf/dsn/dsn2022w.html#BommareddyGKCPL22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dsn/KhanB21" mdate="2022-04-09">
<author pid="298/9409">Maher Khan</author>
<author orcid="0000-0002-9982-1364" pid="165/8309">Amy Babay</author>
<title>Toward Intrusion Tolerance as a Service: Confidentiality in Partially Cloud-Based BFT Systems.</title>
<pages>14-25</pages>
<year>2021</year>
<booktitle>DSN</booktitle>
<ee>https://doi.org/10.1109/DSN48987.2021.00019</ee>
<crossref>conf/dsn/2021</crossref>
<url>db/conf/dsn/dsn2021.html#KhanB21</url>
</inproceedings>
</r>
<coauthors n="10" nc="1">
<co c="0"><na f="a/Amir:Yair" pid="15/5788">Yair Amir</na></co>
<co c="0"><na f="b/Babay:Amy" pid="165/8309">Amy Babay</na></co>
<co c="0"><na f="b/Bommareddy:Sahiti" pid="325/3859">Sahiti Bommareddy</na></co>
<co c="0"><na f="c/Chiu:Imes" pid="325/4011">Imes Chiu</na></co>
<co c="0"><na f="g/Gilby:Benjamin" pid="295/9502">Benjamin Gilby</na></co>
<co c="0"><na f="l/Lindt:John_W=_van_de" pid="250/2720">John W. van de Lindt</na></co>
<co c="0"><na f="n/Nadeem:Huzaifah" pid="365/9109">Huzaifah Nadeem</na></co>
<co c="0"><na f="n/Nofal:Omar" pid="234/3847">Omar Nofal</na></co>
<co c="0"><na f="p/Panteli:Mathaios" pid="187/9927">Mathaios Panteli</na></co>
<co c="0"><na f="w/Wells:Linton" pid="325/4308">Linton Wells</na></co>
</coauthors>
</dblpperson>

