Search Results - "Atya, Ahmed Fathy"

  • Showing 1 - 11 results of 11
Refine Results
  1. 1

    Catch Me if You Can: A Closer Look at Malicious Co-Residency on the Cloud by Atya, Ahmed Osama Fathy, Qian, Zhiyun, Krishnamurthy, Srikanth V., La Porta, Thomas, McDaniel, Patrick, Marvel, Lisa M.

    Published in IEEE/ACM transactions on networking (01-04-2019)
    “…VM migration is an effective countermeasure against attempts at malicious co-residency. In this paper, our overarching objectives are: (a) to get an in-depth…”
    Get full text
    Journal Article
  2. 2

    Packet Header Obfuscation Using MIMO by Cao, Yue, Atya, Ahmed Osama Fathy, Singh, Shailendra, Qian, Zhiyun, Krishnamurthy, Srikanth V., Porta, Thomas F. La, Krishnamurthy, Prashant, Marvel, Lisa

    Published in IEEE/ACM transactions on networking (01-08-2020)
    “…Eavesdroppers can exploit exposed packet headers towards attacks that profile clients and their data flows. In this paper, we propose FOG, a framework for…”
    Get full text
    Journal Article
  3. 3

    A Policy-Aware Enforcement Logic for Appropriately Invoking Network Coding by Atya, Ahmed Osama Fathy, Broustis, Ioannis, Singh, Shailendra, Syrivelis, Dimitris, Krishnamurthy, Srikanth V., La Porta, Thomas F.

    Published in IEEE/ACM transactions on networking (01-08-2016)
    “…Network coding has been shown to offer significant throughput benefits over certain wireless network topologies. However, the application of network coding may…”
    Get full text
    Journal Article
  4. 4

    On the flow anonymity problem in Network Coding by Fathy Atya, Ahmed Osama, ElBatt, Tamer, Youssef, Moustafa

    “…In this paper, we aim at protecting the privacy of the communicating parties while ensuring the authenticity of source nodes. In particular, we exploit…”
    Get full text
    Conference Proceeding
  5. 5

    Malicious co-residency on the cloud: Attacks and defense by Atya, Ahmed Osama Fathy, Qian, Zhiyun, Krishnamurthy, Srikanth V., La Porta, Thomas, McDaniel, Patrick, Marvel, Lisa

    “…Attacker VMs try to co-reside with victim VMs on the same physical infrastructure as a precursor to launching attacks that target information leakage. VM…”
    Get full text
    Conference Proceeding
  6. 6

    Performance and security problems in today's networks by Atya, Ahmed Osama Fathy Mahmoud

    Published 2016
    “…The demand for bandwidth is elevating in today’s networks. However, security threats and attacks are increasing as well. We study how to maximize throughput…”
    Get full text
    Dissertation
  7. 7

    Wireless network coding: Deciding when to flip the switch by Atya, Ahmed Osama Fathy, Broustis, Ioannis, Singh, Shailendra, Syrivelis, Dimitris, Krishnamurthy, Srikanth V., La Porta, Thomas F.

    Published in 2013 Proceedings IEEE INFOCOM (01-04-2013)
    “…Network coding has been shown to offer significant throughput benefits over store-and-forward routing in certain wireless network topologies. However, the…”
    Get full text
    Conference Proceeding
  8. 8

    Mitigating malicious interference via subcarrier-level radio agility in wireless networks by Atya, Ahmed Osama Fathy, Aqil, Azeem, Singh, Shailendra, Broustis, Ioannis, Sundaresan, Karthikeyan, Krishnamurthy, Srikanth V.

    “…Malicious interference injection or jamming is one of the simplest ways to disrupt wireless communications. Prior approaches can alleviate jamming interference…”
    Get full text
    Conference Proceeding
  9. 9

    Automated cross layer feature selection for effective intrusion detection in networked systems by Aqil, Azeem, Atya, Ahmed Fathy, Krishnamurthy, Srikanth V., Yu, Paul, Swami, Ananthram, Rowe, Jeff, Levitt, Karl, Poylisher, Alexander, Serban, Constantin, Chadha, Ritu

    “…Traditionally, anomaly detection mechanisms have relied on the inspection of certain manually (by domain experts) chosen features in order to determine if a…”
    Get full text
    Conference Proceeding
  10. 10

    RUFC: A flexible framework for reliable UDP with flow control by Atya, Ahmed Osama Fathy, Jilong Kuang

    “…Various reliable UDP with flow control schemes have been widely adopted to enhance the native UDP protocol. However, all existing schemes exhibit one or more…”
    Get full text
    Conference Proceeding
  11. 11

    Exploiting Subcarrier Agility to Alleviate Active Jamming Attacks in Wireless Networks by FathyAtya, Ahmed Osama, Aqil, Azeem, Singh, Shailendra, Broustis, Ioannis, Sundaresan, Karthikeyan, Krishnamurthy, Srikanth V.

    Published in IEEE transactions on mobile computing (01-12-2015)
    “…Malicious interference injection or jamming is one of the simplest ways to disrupt wireless communications. Prior approaches can alleviate jamming interference…”
    Get full text
    Magazine Article