Aziz Mohaisen April

نویسنده

  • Aziz Mohaisen
چکیده

My research interests are in the areas of networks security and online privacy. My work has broadly combined principles of the design, analysis, and development of security and privacy primitives and tools for real-world systems. Over the past ten years, my interests have evolved to include topics in security analytics, social networks security and privacy, Internet security, networks security, and privacy. My approach in conducting research in these areas considered exploratory, constructive, and empirical methods. A common theme in my most recent research work is the use of advanced machine learning techniques for security analytics: to understand codes, traffic, and infrastructure usage in real-world deployments. My earlier work focused on understanding various security issues in multiple networking contexts, by design and analysis. My doctoral thesis work draw from both directions: measurements of social graphs properties used for security, and improved security by better properties in those graphs. In the following, I provide a summary, mostly focused on recent work, and open directions.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mitigating the ICA Attack against Rotation Based Transformation for Privacy Preserving Clustering

The rotation based transformation (RBT) for privacy preserving data mining (PPDM) is vulnerable to the independent component analysis (ICA) attack. This paper introduces a modified multiple rotation based transformation (MRBT) technique for special mining applications mitigating the ICA attack while maintaining the advantages of the RBT.

متن کامل

On the Insecurity of Asymmetric Key-based Architecture in Wireless Sensor Networks

In this article, we demonstrate that the asymmetric key-based architecture for securing wireless sensor networks recently introduced by Haque et al. is insecure under impersonation attack, since it does not provide authentication semantics. In addition, we show that, for the scheme to work correctly, the resulting key distribution construction should be symmetric and group-wise.

متن کامل

A Survey on Deep Packet Inspection for Intrusion Detection Systems

Deep packet inspection is widely recognized as a powerful way which is used for intrusion detection systems for inspecting, deterring and deflecting malicious attacks over the network. Fundamentally, almost intrusion detection systems have the ability to search through packets and identify contents that match with known attacks. In this paper, we survey the deep packet inspection implementation...

متن کامل

Characterizing Collaboration in Social Network-enabled Routing

Connectivity and trust in social networks have been exploited to propose applications on top of these networks, including routing, Sybil defenses, and anonymous communication systems. In these networks, and for such applications, connectivity ensures good performance of applications while trust is assumed to always hold, so as collaboration and good behavior are always guaranteed. In this paper...

متن کامل

Parallel QRD-M encoder for multi-user MIMO systems

In the context of multi-user precoding, the idea behind vector perturbation (VP) lies in adding an integer vector to the data vector such that the overall transmit power is reduced, where the performance at the users end is consequently improved. In the literature, several techniques have been proposed to find a quasi-optimum perturbing vector, where this process was represented as an integer l...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015