Name
Affiliation
Papers
ASHRAF MATRAWY
Department of Systems and Computer Engineering, Carleton University, Canada
64
Collaborators
Citations 
PageRank 
80
146
26.98
Referers 
Referees 
References 
380
1019
448
Search Limit
1001000
Title
Citations
PageRank
Year
Differentially private self-normalizing neural networks for adversarial robustness in federated learning00.342022
A Formal Analysis of the Efficacy of Rebooting as a Countermeasure Against IoT Botnets00.342022
Securing RPL Using Network Coding: The Chained Secure Mode (CSM)00.342022
A STRIDE Threat Model for 5G Core Slicing00.342021
Evaluating Resilience of Encrypted Traffic Classification against Adversarial Evasion Attacks00.342021
An Early Benchmark of Quality of Experience Between HTTP/2 and HTTP/3 using Lighthouse00.342021
Consolidating Policy Chains Using One Pass Packet Steering in Software Defined Data Centers00.342021
Enhancing Routing Security in IoT: Performance Evaluation of RPL’s Secure Mode Under Attacks30.422020
Introducing Network Coding to RPL: The Chained Secure Mode (CSM)10.342020
Proactive and Dynamic Slice Allocation in Sliced 5G Core Networks00.342020
Evaluation of Adversarial Training on Different Types of Neural Networks in Deep Learning-based IDSs00.342020
DSAF: Dynamic Slice Allocation Framework for 5G Core Network.00.342019
Optimal Slice Allocation in 5G Core Networks.00.342019
Analyzing Adversarial Attacks Against Deep Learning for Intrusion Detection in IoT Networks.00.342019
Secure Routing in IoT: Evaluation of RPL's Secure Mode under Attacks00.342019
Routing Attacks and Mitigation Methods for RPL-Based Internet of Things100.612019
Towards Secure Slicing: Using Slice Isolation to Mitigate DDoS Attacks on 5G Core Network Slices10.342019
Optimal Slice Allocation in 5G Core Networks70.502018
A Clustering-based Consistency Adaptation Strategy for Distributed SDN Controllers30.392018
A Review Of Recently Emerging Denial Of Service Threats And Defences In The Transport Layer00.342018
A Discussion on Security Education in Academia00.342018
Economic and Energy Considerations for Resource Augmentation in Mobile Cloud Computing.40.382018
Threat Modeling in LTE Small Cell Networks00.342018
The Effect Of Buffer Management Strategies On 6lowpan'S Response To Buffer Reservation Attacks00.342017
CPV: Delay-Based Location Verification for the Internet.40.392017
Leveraging inter-controller communication to MitigateDDoS attacks in SDN networks.00.342017
A survey on forensic event reconstruction systems.00.342017
Location Verification of Wireless Internet Clients: Evaluation and Improvements.00.342017
Modeling and Analysis of SDN Control Applications using Vector Spaces.00.342017
An empirical model of packet processing delay of the Open vSwitch10.362017
Accurate Manipulation of Delay-based Internet Geolocation.00.342017
Could Network View Inconsistency Affect Virtualized Network Security Functions?00.342017
IDSaaS in SDN: Intrusion Detection System as a service in software defined networks.00.342016
On the Impact of Network State Collection on the Performance of SDN Applications70.532016
Maintaining an Up-to-date Global Network View in SDN.00.342016
Towards power profiling of Android permissions00.342015
A classification of web browser fingerprinting techniques70.492015
Taxing the Queue: Hindering Middleboxes From Unauthorized Large-Scale Traffic Relaying60.472015
A Survey on Botnet Architectures, Detection and Defences.00.342015
Improved SDN responsiveness to UDP flood attacks00.342015
Optimizing Energy Consumption in Broker-Assisted Cyber Foraging Systems30.432014
Centralized Management of Scalable Cyber Foraging Systems.30.422013
A Study of Trojan Propagation in Online Social Networks.00.342012
A Density Mapping Algorithm for Supporting Cyber Foraging Service Networks00.342012
Broadcasting in MANETs Using Multi-Source Random Linear Network Coding.00.342012
Does context influence responses to firewall warnings?20.362012
Enhanced QoS Support in Certified Wireless USB00.342011
A New Perspective on Providing Cloud Computing Security - A Position Paper.00.342011
Adaptive Random Linear Network Coding with Controlled Forwarding for wireless broadcast50.502010
A Behaviour Study of Network-Aware Stealthy Worms00.342009
  • 1
  • 2