Ashraf Matrawy
Orcid: 0000-0001-9220-4630
According to our database1,
Ashraf Matrawy
authored at least 101 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Introducing Adaptive Continuous Adversarial Training (ACAT) to Enhance Machine Learning Robustness.
IEEE Netw. Lett., September, 2024
An Experimental Investigation of Tuning QUIC-Based Publish-Subscribe Architectures in IoT.
IEEE Internet Things J., February, 2024
Cybersecurity Challenge Analysis of Work-from-Anywhere (WFA) and Recommendations guided by a User Study.
CoRR, 2024
Introducing Perturb-ability Score (PS) to Enhance Robustness Against Evasion Adversarial Attacks on ML-NIDS.
CoRR, 2024
Introducing Adaptive Continuous Adversarial Training (ACAT) to Enhance ML Robustness.
CoRR, 2024
Privacy Engineering in Smart Home (SH) Systems: A Comprehensive Privacy Threat Analysis and Risk Management Approach.
CoRR, 2024
Proceedings of the IEEE Wireless Communications and Networking Conference, 2024
Mass Configuration of Heterogeneous IIoT Nodes: A Proposal and Experimental Evaluation.
Proceedings of the International Conference on Computing, Networking and Communications, 2024
Proceedings of the International Conference on Computing, Networking and Communications, 2024
Proceedings of the 20th International Conference on the Design of Reliable Communication Networks, 2024
On the Impact of Flooding Attacks on 5G Slicing with Different VNF Sharing Configurations.
Proceedings of the 20th International Conference on the Design of Reliable Communication Networks, 2024
2023
Adversarial Evasion Attacks Practicality in Networks: Testing the Impact of Dynamic Learning.
CoRR, 2023
Integrating Medical and Wearable Devices with E-Health Systems Using Horizontal IoT Platforms.
Proceedings of the IEEE Sensors Applications Symposium, 2023
IoT Trust Establishment Through System Level Interactions and Communication Attributes.
Proceedings of the IEEE Global Communications Conference, 2023
The Impact of Dynamic Learning on Adversarial Attacks in Networks (IEEE CNS 23 Poster).
Proceedings of the IEEE Conference on Communications and Network Security, 2023
2022
IEEE Internet Things J., 2022
Open Source Horizontal IoT Platforms: A Comparative Study on Functional Requirements.
CoRR, 2022
Differentially private self-normalizing neural networks for adversarial robustness in federated learning.
Comput. Secur., 2022
A Formal Analysis of the Efficacy of Rebooting as a Countermeasure Against IoT Botnets.
Proceedings of the IEEE International Conference on Communications, 2022
2021
Consolidating Policy Chains Using One Pass Packet Steering in Software Defined Data Centers.
IEEE Trans. Cloud Comput., 2021
DiPSeN: Differentially Private Self-normalizing Neural Networks For Adversarial Robustness in Federated Learning.
CoRR, 2021
Proceedings of the 2021 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2021
Evaluating Resilience of Encrypted Traffic Classification against Adversarial Evasion Attacks.
Proceedings of the IEEE Symposium on Computers and Communications, 2021
An Early Benchmark of Quality of Experience Between HTTP/2 and HTTP/3 using Lighthouse.
Proceedings of the ICC 2021, 2021
Proceedings of the 2021 IEEE Conference on Standards for Communications and Networking, 2021
Proceedings of the 2021 IEEE Conference on Standards for Communications and Networking, 2021
Proceedings of the 4th IEEE 5G World Forum, 2021
2020
Enhancing Routing Security in IoT: Performance Evaluation of RPL's Secure Mode Under Attacks.
IEEE Internet Things J., 2020
CoRR, 2020
Enhancing Routing Security in IoT: Performance Evaluation of RPL Secure Mode under Attacks.
CoRR, 2020
Proactive Allocation as Defense for Malicious Co-residency in Sliced 5G Core Networks.
CoRR, 2020
Proceedings of the 19th IEEE International Symposium on Network Computing and Applications, 2020
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020
Evaluation of Adversarial Training on Different Types of Neural Networks in Deep Learning-based IDSs.
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020
Towards a Decentralized Access Control System for IoT Platforms based on Blockchain Technology.
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020
Investigating Resistance of Deep Learning-based IDS against Adversaries using min-max Optimization.
Proceedings of the 2020 IEEE International Conference on Communications, 2020
2019
The Threat of Adversarial Attacks on Machine Learning in Network Security - A Survey.
CoRR, 2019
IEEE Commun. Surv. Tutorials, 2019
Proceedings of the 2019 IEEE International Conference on Wireless for Space and Extreme Environments, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Analyzing Adversarial Attacks against Deep Learning for Intrusion Detection in IoT Networks.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Towards Secure Slicing: Using Slice Isolation to Mitigate DDoS Attacks on 5G Core Network Slices.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019
2018
Economic and Energy Considerations for Resource Augmentation in Mobile Cloud Computing.
IEEE Trans. Cloud Comput., 2018
Proceedings of the 4th IEEE Conference on Network Softwarization and Workshops, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 2018 IEEE Canadian Conference on Electrical & Computer Engineering, 2018
A Review of Recently Emerging Denial of Service Threats and Defences in the Transport Layer.
Proceedings of the 2018 IEEE Canadian Conference on Electrical & Computer Engineering, 2018
2017
IEEE Trans. Emerg. Top. Comput., 2017
IEEE Trans. Dependable Secur. Comput., 2017
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017
Proceedings of the 25th IEEE International Conference on Network Protocols, 2017
The effect of buffer management strategies on 6LoWPAN's response to buffer reservation attacks.
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
IEEE Commun. Lett., 2016
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
2015
IEEE Commun. Lett., 2015
Taxing the Queue: Hindering Middleboxes From Unauthorized Large-Scale Traffic Relaying.
IEEE Commun. Lett., 2015
Proceedings of the 7th International Conference on New Technologies, Mobility and Security, 2015
Proceedings of the 7th International Conference on New Technologies, Mobility and Security, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
2014
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014
Location verification on the Internet: Towards enforcing location-aware access policies over Internet clients.
Proceedings of the IEEE Conference on Communications and Network Security, 2014
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014
2013
Proceedings of the 4th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2013) and the 3rd International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH), 2013
2012
Ad Hoc Sens. Wirel. Networks, 2012
Proceedings of the 5th International Conference on New Technologies, 2012
Proceedings of the 2012 eCrime Researchers Summit, 2012
Proceedings of the 2012 Seventh International Conference on Broadband, 2012
2011
Proceedings of the Ninth Annual Communication Networks and Services Research Conference, 2011
A New Perspective on Providing Cloud Computing Security - A Position Paper.
Proceedings of the CLOSER 2011, 2011
2010
Adaptive Random Linear Network Coding with Controlled Forwarding for wireless broadcast.
Proceedings of the 3rd IFIP Wireless Days Conference 2010, 2010
2009
Proceedings of IEEE International Conference on Communications, 2009
Proceedings of IEEE International Conference on Communications, 2009
2008
Proceedings of IEEE International Conference on Communications, 2008
2006
IEEE Internet Comput., 2006
Proceedings of the Fourth Annual Conference on Communication Networks and Services Research (CNSR 2006), 2006
Proceedings of the Fourth Annual Conference on Communication Networks and Services Research (CNSR 2006), 2006
Experimental evaluation of network security through a hierarchical quantitative metrics model.
Proceedings of the Third IASTED International Conference on Communication, 2006
2005
IEEE Trans. Multim., 2005
Optimization of resilient packet ring networks scheduling for MPEG-4 video streaming.
Proceedings of IEEE International Conference on Communications, 2005
Proceedings of the Applied Cryptography and Network Security, 2005
2004
Proceedings of the Second Annual Conference on Privacy, 2004
2003
IEEE Commun. Lett., 2003
IEEE Commun. Surv. Tutorials, 2003
Real-time transport for assured forwarding: an architecture for both unicast and multicast applications.
Proceedings of IEEE International Conference on Communications, 2003
2002
Proceedings of the IEEE International Conference on Communications, 2002
2001
Proceedings of the Global Telecommunications Conference, 2001