Aziz Mohaisen April
نویسنده
چکیده
My research interests are in the areas of networks security and online privacy. My work has broadly combined principles of the design, analysis, and development of security and privacy primitives and tools for real-world systems. Over the past ten years, my interests have evolved to include topics in security analytics, social networks security and privacy, Internet security, networks security, and privacy. My approach in conducting research in these areas considered exploratory, constructive, and empirical methods. A common theme in my most recent research work is the use of advanced machine learning techniques for security analytics: to understand codes, traffic, and infrastructure usage in real-world deployments. My earlier work focused on understanding various security issues in multiple networking contexts, by design and analysis. My doctoral thesis work draw from both directions: measurements of social graphs properties used for security, and improved security by better properties in those graphs. In the following, I provide a summary, mostly focused on recent work, and open directions.
منابع مشابه
Mitigating the ICA Attack against Rotation Based Transformation for Privacy Preserving Clustering
The rotation based transformation (RBT) for privacy preserving data mining (PPDM) is vulnerable to the independent component analysis (ICA) attack. This paper introduces a modified multiple rotation based transformation (MRBT) technique for special mining applications mitigating the ICA attack while maintaining the advantages of the RBT.
متن کاملOn the Insecurity of Asymmetric Key-based Architecture in Wireless Sensor Networks
In this article, we demonstrate that the asymmetric key-based architecture for securing wireless sensor networks recently introduced by Haque et al. is insecure under impersonation attack, since it does not provide authentication semantics. In addition, we show that, for the scheme to work correctly, the resulting key distribution construction should be symmetric and group-wise.
متن کاملA Survey on Deep Packet Inspection for Intrusion Detection Systems
Deep packet inspection is widely recognized as a powerful way which is used for intrusion detection systems for inspecting, deterring and deflecting malicious attacks over the network. Fundamentally, almost intrusion detection systems have the ability to search through packets and identify contents that match with known attacks. In this paper, we survey the deep packet inspection implementation...
متن کاملCharacterizing Collaboration in Social Network-enabled Routing
Connectivity and trust in social networks have been exploited to propose applications on top of these networks, including routing, Sybil defenses, and anonymous communication systems. In these networks, and for such applications, connectivity ensures good performance of applications while trust is assumed to always hold, so as collaboration and good behavior are always guaranteed. In this paper...
متن کاملParallel QRD-M encoder for multi-user MIMO systems
In the context of multi-user precoding, the idea behind vector perturbation (VP) lies in adding an integer vector to the data vector such that the overall transmit power is reduced, where the performance at the users end is consequently improved. In the literature, several techniques have been proposed to find a quasi-optimum perturbing vector, where this process was represented as an integer l...
متن کامل