Ashraf Matrawy

Orcid: 0000-0001-9220-4630

According to our database1, Ashraf Matrawy authored at least 101 papers between 2001 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Introducing Adaptive Continuous Adversarial Training (ACAT) to Enhance Machine Learning Robustness.
IEEE Netw. Lett., September, 2024

An Experimental Investigation of Tuning QUIC-Based Publish-Subscribe Architectures in IoT.
IEEE Internet Things J., February, 2024

Cybersecurity Challenge Analysis of Work-from-Anywhere (WFA) and Recommendations guided by a User Study.
CoRR, 2024

Introducing Perturb-ability Score (PS) to Enhance Robustness Against Evasion Adversarial Attacks on ML-NIDS.
CoRR, 2024

Introducing Adaptive Continuous Adversarial Training (ACAT) to Enhance ML Robustness.
CoRR, 2024

Privacy Engineering in Smart Home (SH) Systems: A Comprehensive Privacy Threat Analysis and Risk Management Approach.
CoRR, 2024

Security Analysis of Critical 5G Interfaces.
IEEE Commun. Surv. Tutorials, 2024

Temporal Partitioned Federated Learning for IoT Intrusion Detection Systems.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2024

Mass Configuration of Heterogeneous IIoT Nodes: A Proposal and Experimental Evaluation.
Proceedings of the International Conference on Computing, Networking and Communications, 2024

Could Min-Max Optimization be a General Defense Against Adversarial Attacks?
Proceedings of the International Conference on Computing, Networking and Communications, 2024

On the Impact of the RPL Decreased Rank Attack on 6TiSCH Networks.
Proceedings of the 20th International Conference on the Design of Reliable Communication Networks, 2024

On the Impact of Flooding Attacks on 5G Slicing with Different VNF Sharing Configurations.
Proceedings of the 20th International Conference on the Design of Reliable Communication Networks, 2024

2023
Adversarial Evasion Attacks Practicality in Networks: Testing the Impact of Dynamic Learning.
CoRR, 2023

A Security-aware Network Function Sharing Model for 5G Slicing.
CoRR, 2023

Integrating Medical and Wearable Devices with E-Health Systems Using Horizontal IoT Platforms.
Proceedings of the IEEE Sensors Applications Symposium, 2023

IoT Trust Establishment Through System Level Interactions and Communication Attributes.
Proceedings of the IEEE Global Communications Conference, 2023

The Impact of Dynamic Learning on Adversarial Attacks in Networks (IEEE CNS 23 Poster).
Proceedings of the IEEE Conference on Communications and Network Security, 2023

2022
Securing RPL Using Network Coding: The Chained Secure Mode (CSM).
IEEE Internet Things J., 2022

Open Source Horizontal IoT Platforms: A Comparative Study on Functional Requirements.
CoRR, 2022

Differentially private self-normalizing neural networks for adversarial robustness in federated learning.
Comput. Secur., 2022

A Formal Analysis of the Efficacy of Rebooting as a Countermeasure Against IoT Botnets.
Proceedings of the IEEE International Conference on Communications, 2022

2021
Consolidating Policy Chains Using One Pass Packet Steering in Software Defined Data Centers.
IEEE Trans. Cloud Comput., 2021

A Pure HTTP/3 Alternative to MQTT-over-QUIC in Resource-Constrained IoT.
CoRR, 2021

DiPSeN: Differentially Private Self-normalizing Neural Networks For Adversarial Robustness in Federated Learning.
CoRR, 2021

Integrating 6LoWPAN Security with RPL Using The Chained Secure Mode Framework.
Proceedings of the 2021 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2021

Evaluating Resilience of Encrypted Traffic Classification against Adversarial Evasion Attacks.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

An Early Benchmark of Quality of Experience Between HTTP/2 and HTTP/3 using Lighthouse.
Proceedings of the ICC 2021, 2021

TLS Performance Evaluation in the Control Plane of a 5G Core Network Slice.
Proceedings of the 2021 IEEE Conference on Standards for Communications and Networking, 2021

APure HTTP/3 Alternative to MQTT-over-QUIC in Resource-Constrained IoT.
Proceedings of the 2021 IEEE Conference on Standards for Communications and Networking, 2021

A STRIDE Threat Model for 5G Core Slicing.
Proceedings of the 4th IEEE 5G World Forum, 2021

2020
Enhancing Routing Security in IoT: Performance Evaluation of RPL's Secure Mode Under Attacks.
IEEE Internet Things J., 2020

A GAN-based Approach for Mitigating Inference Attacks in Smart Home Environment.
CoRR, 2020

Enhancing Routing Security in IoT: Performance Evaluation of RPL Secure Mode under Attacks.
CoRR, 2020

Proactive Allocation as Defense for Malicious Co-residency in Sliced 5G Core Networks.
CoRR, 2020

Introducing Network Coding to RPL: The Chained Secure Mode (CSM).
Proceedings of the 19th IEEE International Symposium on Network Computing and Applications, 2020

Proactive and Dynamic Slice Allocation in Sliced 5G Core Networks.
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020

Evaluation of Adversarial Training on Different Types of Neural Networks in Deep Learning-based IDSs.
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020

Towards a Decentralized Access Control System for IoT Platforms based on Blockchain Technology.
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020

Investigating Resistance of Deep Learning-based IDS against Adversaries using min-max Optimization.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

2019
Optimal Slice Allocation in 5G Core Networks.
IEEE Netw. Lett., 2019

The Threat of Adversarial Attacks on Machine Learning in Network Security - A Survey.
CoRR, 2019

Secure Routing in IoT: Evaluation of RPL Secure Mode under Attacks.
CoRR, 2019

DSAF: Dynamic Slice Allocation Framework for 5G Core Network.
CoRR, 2019

Routing Attacks and Mitigation Methods for RPL-Based Internet of Things.
IEEE Commun. Surv. Tutorials, 2019

Classifying Poisoning Attacks in Software Defined Networking.
Proceedings of the 2019 IEEE International Conference on Wireless for Space and Extreme Environments, 2019

Secure Routing in IoT: Evaluation of RPL's Secure Mode under Attacks.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Analyzing Adversarial Attacks against Deep Learning for Intrusion Detection in IoT Networks.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Towards Secure Slicing: Using Slice Isolation to Mitigate DDoS Attacks on 5G Core Network Slices.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
Economic and Energy Considerations for Resource Augmentation in Mobile Cloud Computing.
IEEE Trans. Cloud Comput., 2018

A Clustering-based Consistency Adaptation Strategy for Distributed SDN Controllers.
Proceedings of the 4th IEEE Conference on Network Softwarization and Workshops, 2018

SDN-VSA: Modeling and Analysis of SDN Control Applications Using Vector Spaces.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

A Discussion on Security Education in Academia.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Threat Modeling in LTE Small Cell Networks.
Proceedings of the 2018 IEEE Canadian Conference on Electrical & Computer Engineering, 2018

A Review of Recently Emerging Denial of Service Threats and Defences in the Transport Layer.
Proceedings of the 2018 IEEE Canadian Conference on Electrical & Computer Engineering, 2018

2017
Location Verification of Wireless Internet Clients: Evaluation and Improvements.
IEEE Trans. Emerg. Top. Comput., 2017

CPV: Delay-Based Location Verification for the Internet.
IEEE Trans. Dependable Secur. Comput., 2017

A survey on forensic event reconstruction systems.
Int. J. Inf. Comput. Secur., 2017

Modeling and Analysis of SDN Control Applications using Vector Spaces.
CoRR, 2017

One Pass Packet Steering (OPPS) for stateless policy chains in multi-subscriber SDN.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

An empirical model of packet processing delay of the Open vSwitch.
Proceedings of the 25th IEEE International Conference on Network Protocols, 2017

The effect of buffer management strategies on 6LoWPAN's response to buffer reservation attacks.
Proceedings of the IEEE International Conference on Communications, 2017

Leveraging inter-controller communication to MitigateDDoS attacks in SDN networks.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Could network view inconsistency affect virtualized network security functions?
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Accurate Manipulation of Delay-based Internet Geolocation.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
On the Impact of Network State Collection on the Performance of SDN Applications.
IEEE Commun. Lett., 2016

Maintaining an Up-to-date Global Network View in SDN.
CoRR, 2016

IDSaaS in SDN: Intrusion Detection System as a service in software defined networks.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2015
A Survey on Botnet Architectures, Detection and Defences.
Int. J. Netw. Secur., 2015

Accurate One-Way Delay Estimation With Reduced Client Trustworthiness.
IEEE Commun. Lett., 2015

Taxing the Queue: Hindering Middleboxes From Unauthorized Large-Scale Traffic Relaying.
IEEE Commun. Lett., 2015

A classification of web browser fingerprinting techniques.
Proceedings of the 7th International Conference on New Technologies, Mobility and Security, 2015

Towards power profiling of Android permissions.
Proceedings of the 7th International Conference on New Technologies, Mobility and Security, 2015

Improved SDN responsiveness to UDP flood attacks.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
An energy optimizing scheduler for mobile cloud computing environments.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

Location verification on the Internet: Towards enforcing location-aware access policies over Internet clients.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Optimizing Energy Consumption in Broker-Assisted Cyber Foraging Systems.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

2013
Centralized Management of Scalable Cyber Foraging Systems.
Proceedings of the 4th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2013) and the 3rd International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH), 2013

2012
Broadcasting in MANETs Using Multi-Source Random Linear Network Coding.
Ad Hoc Sens. Wirel. Networks, 2012

A Study of Trojan Propagation in Online Social Networks.
Proceedings of the 5th International Conference on New Technologies, 2012

Does context influence responses to firewall warnings?
Proceedings of the 2012 eCrime Researchers Summit, 2012

A Density Mapping Algorithm for Supporting Cyber Foraging Service Networks.
Proceedings of the 2012 Seventh International Conference on Broadband, 2012

2011
Enhanced QoS Support in Certified Wireless USB.
Proceedings of the Ninth Annual Communication Networks and Services Research Conference, 2011

A New Perspective on Providing Cloud Computing Security - A Position Paper.
Proceedings of the CLOSER 2011, 2011

2010
Adaptive Random Linear Network Coding with Controlled Forwarding for wireless broadcast.
Proceedings of the 3rd IFIP Wireless Days Conference 2010, 2010

2009
A Behaviour Study of Network-Aware Stealthy Worms.
Proceedings of IEEE International Conference on Communications, 2009

Design and Analysis of a Hierarchical IP Traceback System.
Proceedings of IEEE International Conference on Communications, 2009

2008
Scalable XML routed network topology generation.
Bell Labs Tech. J., 2008

Discovering Packet Structure through Lightweight Hierarchical Clustering.
Proceedings of IEEE International Conference on Communications, 2008

2006
A Multilayer Peer-to-Peer Framework for Distributed Synchronous Collaboration.
IEEE Internet Comput., 2006

Guaranteed Maximal Matching for Input Buffered Crossbar Switches.
Proceedings of the Fourth Annual Conference on Communication Networks and Services Research (CNSR 2006), 2006

MPLS-based Multicast Shared Trees.
Proceedings of the Fourth Annual Conference on Communication Networks and Services Research (CNSR 2006), 2006

Experimental evaluation of network security through a hierarchical quantitative metrics model.
Proceedings of the Third IASTED International Conference on Communication, 2006

2005
A real-time video multicast architecture for assured forwarding services.
IEEE Trans. Multim., 2005

Optimization of resilient packet ring networks scheduling for MPEG-4 video streaming.
Proceedings of IEEE International Conference on Communications, 2005

Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management.
Proceedings of the Applied Cryptography and Network Security, 2005

2004
Current Trends and Advances in Information Assurance Metrics.
Proceedings of the Second Annual Conference on Privacy, 2004

2003
A rate adaptation algorithm for multicast sources in priority-based IP networks.
IEEE Commun. Lett., 2003

A Survey of Congestion Control Schemes for Multicast Video Applications.
IEEE Commun. Surv. Tutorials, 2003

Real-time transport for assured forwarding: an architecture for both unicast and multicast applications.
Proceedings of IEEE International Conference on Communications, 2003

2002
Multicasting of adaptively-encoded MPEG4 over QoS-aware IP networks.
Proceedings of the IEEE International Conference on Communications, 2002

2001
On layered video fairness on IP networks.
Proceedings of the Global Telecommunications Conference, 2001


  Loading...