• Publications
  • Influence
Stopping Amplified DNS DDoS Attacks through Distributed Query Rate Sharing
TLDR
We present a novel mitigation system called"Distributed Rate Sharing based Amplified DNS-DDoS Attack Mitigation" (DRS-ADAM). Expand
  • 4
  • 1
  • PDF
POWJAM: A power reaction system against jamming attacks in wireless ad hoc networks
  • A. Hamieh
  • Computer Science
  • 9th Annual Conference on Wireless On-Demand…
  • 16 February 2012
TLDR
We present POWJAM (POWer reaction system against JAMming attacks), a system to react at jamming attacks in wireless ad hoc networks. Expand
  • 2
  • 1
Hive oversight for network intrusion early warning using DIAMoND: a bee-inspired method for fully distributed cyber defense
TLDR
We provide a summary of findings from a recently presented algorithm for a nonparametric, fully distributed coordination framework that translates the biological success of these methods into analogous operations for use in cyber defense. Expand
  • 22
  • PDF
Cache management using temporal pattern based solicitation for content delivery
TLDR
We propose a novel content caching scheme referred as “Cache Management using Temporal Pattern based Solicitation” (CMTPS), to further minimize both service delays and load in the network for Video on Demand (VoD) applications. Expand
  • 4
DIAMoND: Distributed Intrusion/Anomaly Monitoring for Nonparametric Detection
TLDR
In this paper, we describe a fully nonparametric, scalable, distributed detection algorithm for intrusion/anomaly detection in networks. Expand
  • 5
  • PDF
Cationic Tungsten(VI) Penta-Methyl Complex: Synthesis, Characterization and its Application in Olefin Metathesis Reaction
Tungsten-hexa-methyl readily reacts with B(C6 F5 )3 in dichloromethane and generates the corresponding well-defined cationic tungsten-penta-methyl complex which was identified precisely by 1 H NMR,Expand
  • 2
  • PDF
On the Cramer-Rao Lower Bounds of Ranging Based on IR-UWB TOA Estimation in Wirelessbody Area Networks
TLDR
A theoretical modeling of WBANs ranging errors based on IR-UWB Time Of Arrival (TOA) estimation based on theoretical CRLB-based predictions, fed with realistic channel parameters. Expand
  • 1
La sécurité dans les réseaux sans fil ad hoc : les attaques jamming et les noeuds greedy
Les reseaux ad hoc sont en effet vulnerables aux attaques telles que le comportement greedy (i. E. , egoiste) et les attaques jamming (i. E. , brouillage). Dans cette dissertation, nous avons proposeExpand
  • 1
Effect of oxygen pressure on the semiconductor properties of FTO thin films
TLDR
We have measured the Optical Transmission T and the Optical Reflection R in a range between 190nm and 2000nm of thin films thickness using a Perlin Elmer 9500 spechtrophotometer. Expand
PCF I NVESTIGATION TO IMPROVE THE PERFORMANCE OF TORA – BASED MANET AGAINST J AMMING A TTACKS
Security in Mobile Ad Hoc Network became very important due to the nature of wireless communication between the nodes and the rapid movement of node which make Mobile Ad hoc Network vulnerable toExpand