Search Results - "Atya, Ahmed Fathy"
-
1
Catch Me if You Can: A Closer Look at Malicious Co-Residency on the Cloud
Published in IEEE/ACM transactions on networking (01-04-2019)“…VM migration is an effective countermeasure against attempts at malicious co-residency. In this paper, our overarching objectives are: (a) to get an in-depth…”
Get full text
Journal Article -
2
Packet Header Obfuscation Using MIMO
Published in IEEE/ACM transactions on networking (01-08-2020)“…Eavesdroppers can exploit exposed packet headers towards attacks that profile clients and their data flows. In this paper, we propose FOG, a framework for…”
Get full text
Journal Article -
3
A Policy-Aware Enforcement Logic for Appropriately Invoking Network Coding
Published in IEEE/ACM transactions on networking (01-08-2016)“…Network coding has been shown to offer significant throughput benefits over certain wireless network topologies. However, the application of network coding may…”
Get full text
Journal Article -
4
On the flow anonymity problem in Network Coding
Published in 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC) (01-07-2013)“…In this paper, we aim at protecting the privacy of the communicating parties while ensuring the authenticity of source nodes. In particular, we exploit…”
Get full text
Conference Proceeding -
5
Malicious co-residency on the cloud: Attacks and defense
Published in IEEE INFOCOM 2017 - IEEE Conference on Computer Communications (01-05-2017)“…Attacker VMs try to co-reside with victim VMs on the same physical infrastructure as a precursor to launching attacks that target information leakage. VM…”
Get full text
Conference Proceeding -
6
Performance and security problems in today's networks
Published 2016“…The demand for bandwidth is elevating in today’s networks. However, security threats and attacks are increasing as well. We study how to maximize throughput…”
Get full text
Dissertation -
7
Wireless network coding: Deciding when to flip the switch
Published in 2013 Proceedings IEEE INFOCOM (01-04-2013)“…Network coding has been shown to offer significant throughput benefits over store-and-forward routing in certain wireless network topologies. However, the…”
Get full text
Conference Proceeding -
8
Mitigating malicious interference via subcarrier-level radio agility in wireless networks
Published in 2013 21st IEEE International Conference on Network Protocols (ICNP) (01-10-2013)“…Malicious interference injection or jamming is one of the simplest ways to disrupt wireless communications. Prior approaches can alleviate jamming interference…”
Get full text
Conference Proceeding -
9
Automated cross layer feature selection for effective intrusion detection in networked systems
Published in 2016 IEEE Conference on Communications and Network Security (CNS) (01-10-2016)“…Traditionally, anomaly detection mechanisms have relied on the inspection of certain manually (by domain experts) chosen features in order to determine if a…”
Get full text
Conference Proceeding -
10
RUFC: A flexible framework for reliable UDP with flow control
Published in 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013) (01-12-2013)“…Various reliable UDP with flow control schemes have been widely adopted to enhance the native UDP protocol. However, all existing schemes exhibit one or more…”
Get full text
Conference Proceeding -
11
Exploiting Subcarrier Agility to Alleviate Active Jamming Attacks in Wireless Networks
Published in IEEE transactions on mobile computing (01-12-2015)“…Malicious interference injection or jamming is one of the simplest ways to disrupt wireless communications. Prior approaches can alleviate jamming interference…”
Get full text
Magazine Article