Search Results - "Chasaki, Danai"

Refine Results
  1. 1

    Cellular, Wide-Area, and Non-Terrestrial IoT: A Survey on 5G Advances and the Road Toward 6G by Vaezi, Mojtaba, Azari, Amin, Khosravirad, Saeed R., Shirvanimoghaddam, Mahyar, Azari, M. Mahdi, Chasaki, Danai, Popovski, Petar

    Published in IEEE Communications surveys and tutorials (01-01-2022)
    “…The next wave of wireless technologies is proliferating in connecting things among themselves as well as to humans. In the era of the Internet of Things (IoT),…”
    Get full text
    Journal Article
  2. 2

    Detecting covert channel attacks on cyber‐physical systems by Li, Hongwei, Chasaki, Danai

    Published in IET cyber-physical systems (01-09-2024)
    “…Cyberattacks on cyber‐physical systems (CPS) have the potential to cause widespread disruption and affect the safety of millions of people. Machine learning…”
    Get full text
    Journal Article
  3. 3

    Network-Based Machine Learning Detection of Covert Channel Attacks on Cyber-Physical Systems by Li, Hongwei, Chasaki, Danai

    “…Most of the recent high-profile attacks targeting cyber-physical systems (CPS) started with lengthy reconnaissance periods that enabled attackers to gain…”
    Get full text
    Conference Proceeding
  4. 4

    Adaptive security monitoring for next-generation routers by Mansour, Christopher, Chasaki, Danai

    Published in EURASIP journal on embedded systems (10-01-2019)
    “…In today’s Internet, modern routers rely on high-performance reliable general-purpose multi-core packet processing systems in order to support the flexibility…”
    Get full text
    Journal Article
  5. 5

    Security-Aware Ad Hoc Networking Protocol for Vehicular Safety Systems by Chasaki, Danai, Randazzo, David, Kulkarni, Sarvesh

    “…Modern cars are implemented with a number of environmentally-aware safety systems, from radar-induced braking, to oncoming-vehicle detecting headlight…”
    Get full text
    Conference Proceeding
  6. 6

    Vulnerabilities of Control Systems in Internet of Things Applications by Radisavljevic-Gajic, Verica, Park, Seri, Chasaki, Danai

    Published in IEEE internet of things journal (01-04-2018)
    “…In this paper, we present some initial results about vulnerability of control systems that can be used in Internet of Things (IoT) applications. Up to our best…”
    Get full text
    Journal Article
  7. 7

    Trust and reliability for next-generation routers by Mansour, Christopher, Chasaki, Danai

    “…To support the flexibility and the different protocol operations and applications provided by today's internet, modern routers rely on high-performance…”
    Get full text
    Conference Proceeding
  8. 8

    Hardware Implementation of High-Performance Polynomial Multiplication for KEM Saber by Tu, Yazheng, He, Pengzhou, Lee, Chiou-Yng, Chasaki, Danai, Xie, Jiafeng

    “…Recent advances in quantum computing have initiated a new round of cryptosystem innovation as the existing public-key cryptosystems are proven to be vulnerable…”
    Get full text
    Conference Proceeding
  9. 9

    Selective encryption of video transmissions over multi-hop wireless networks by Mansour, Christopher, Chasaki, Danai

    “…From a user perspective both security and power consumption during video transmissions are critical. On the one hand, assuming an eavesdropper on the wireless…”
    Get full text
    Conference Proceeding
  10. 10

    Microgrids: Technical and security recommendations for future implementations by Chasaki, Danai, Kondrath, Nisha

    “…Microgrids are modern, localized versions of the centralized utility grid. They have been gaining popularity due to the increased power demand and the…”
    Get full text
    Conference Proceeding
  11. 11

    Heterogeneous GNN with Express Edges for Intrusion Detection in Cyber-Physical Systems by Li, Hongwei, Chasaki, Danai

    “…With the ever-increasing population of Internet-of-Things (IoT) and Cyber-Physical systems (CPS), cyber attacks can result in significantly more severe…”
    Get full text
    Conference Proceeding
  12. 12

    Attacks and Defenses in the Data Plane of Networks by Chasaki, D., Wolf, T.

    “…Security issues in computer networks have focused on attacks on end systems and the control plane. An entirely new class of emerging network attacks aims at…”
    Get full text
    Journal Article
  13. 13

    Ensemble Machine Learning for Intrusion Detection in Cyber-Physical Systems by Li, Hongwei, Chasaki, Danai

    “…In this work, we evaluate the benefits of applying ensemble machine learning techniques to CPS attack detection, together with the application of data…”
    Get full text
    Conference Proceeding
  14. 14

    SDN Security through System Call Learning by Chasaki, Danai, Mansour, Christopher

    “…Software Defined Networking (SDN) has changed the way of designing and managing networks. This technology emerged from the efforts to make the networks more…”
    Get full text
    Conference Proceeding
  15. 15

    Detecting Malicious Hosts in SDN through System Call Learning by Chasaki, Danai, Mansour, Christopher

    “…Software Defined Networking (SDN) has changed the way of designing and managing networks through programmability. However, programmability also introduces…”
    Get full text
    Conference Proceeding
  16. 16

    Improving Efficiency in Attack Detection through Real-time Processing Monitoring and Machine Learning by Chasaki, Danai, Mansour, Christopher

    “…Modern networks can benefit immensely from the flexibility and the improvements in delivery of services that Software Defined Networking (SDN) provides…”
    Get full text
    Conference Proceeding
  17. 17

    Design of an adaptive security mechanism for modern routers by Mansour, Christopher, El Hajj Shehadeh, Youssef, Chasaki, Danai

    “…Modern routers should be able to support many new functions to meet the needs of customers. To achieve such flexibility, programmable packet processors have…”
    Get full text
    Conference Proceeding
  18. 18

    Low complexity Intercarrier Interference reduction for high mobility wireless systems by El Hajj Shehadeh, Youssef, Bamgartner, Sebastian, Chasaki, Danai, Hirtz, Gangolf

    “…With the growing number of infotainment services, the demand on high speed internet in vehicles is increasing. Yet, ensuring a high speed internet access at…”
    Get full text
    Conference Proceeding
  19. 19

    Design of an SDN Security Mechanism to Detect Malicious Activities by Mansour, Christopher, Chasaki, Danai

    “…Software Defined Networks (SDN) is a modern networking paradigm that introduces lots of benefits to the next-generation networks. It offers the necessary…”
    Get full text
    Conference Proceeding
  20. 20

    Security issues in networked embedded devices by Chasaki, Danai

    Published 01-01-2012
    “…Embedded devices are ubiquitous; they are present in various sectors of everyday life: smart homes, automobiles, health care, telephony, industrial automation,…”
    Get full text
    Dissertation