Skip to content

Next Generation Networks

  • Home
  • Projects
  • Publications
  • Blog
  • People
  • Gallery
  • News

5 Nov 21 mohammed mahyoub

Work from Anywhere Challenges: A Cybersecurity Perspective

Organizations have had to quickly transit to work-from-anywhere (WFA) model, as a necessity to continue…
Blog
0
11 May 22 emmanuel alalade

Mohamed Saleh el Shehaby

Machine Learning, Embedded Systems, IoT
PhD Students
0
4 May 22 emmanuel alalade

Sazzad Hossain

Network Security in IoT devices
Masters Students
0
18 Feb 22 emmanuel alalade

Differentially private self-normalizing neural networks for adversarial robustness in federated learning

Ibitoye, O., Shafiq, M. O., & Matrawy, A. (2022). Differentially Private Self-normalizing Neural Networks for…
Journal
0
8 Feb 22 emmanuel alalade

Congratulations to Olakunle Ibitoye for successfully defending his Ph.D. Proposal!

News
0
29 Jan 22 emmanuel alalade

A Formal Analysis of the Efficacy of Rebooting as a Countermeasure against IoT Botnets

A. Jawad, L. Newton, A. Matrawy, and J. Jaskolka, “A Formal Analysis of the Efficacy…
Conference, Publications
0
29 Jan 22 emmanuel alalade

A Pure HTTP/3 Alternative to MQTT-over-QUIC in Resource-Constrained IoT

D Saif, A Matrawy, “A Pure HTTP/3 Alternative to MQTT-over-QUIC in Resource-Constrained IoT”, IEEE Conference on…
Conference, Publications
0
28 Jan 22 emmanuel alalade

An Early Benchmark of Quality of Experience Between HTTP/2 and HTTP/3 using Lighthouse

D. Saif, C-H. Lung, and A. Matrawy, “An Early Benchmark of Quality of Experience Between…
Conference, Publications
0
28 Jan 22 emmanuel alalade

Evaluating Resilience of Encrypted Traffic Classification against Adversarial Evasion Attacks

R. Maarouf, D. Sattar and A. Matrawy, "Evaluating Resilience of Encrypted Traffic Classification against Adversarial…
Conference, Publications
0
28 Jan 22 emmanuel alalade

A STRIDE Threat Model for 5G Core Slicing

D. Sattar, A. H. Vasoukolaei, P. Crysdale, and A. Matrawy, “A STRIDE Threat Model for…
Conference, Publications
0
28 Jan 22 emmanuel alalade

Integrating 6LoWPAN Security with RPL Using the Chained Secure Mode Framework.

A Raoof, CH Lung, A Matrawy, “Integrating 6LoWPAN Security with RPL Using the Chained Secure…
Conference, Publications
0

Posts navigation

1 2 … 18
Theme Designed by IndiThemes | Maintained by NGN Lab
  • Home
  • Projects
  • Publications
  • Blog
  • People
  • Gallery
  • News
  • Home
  • Projects
  • Publications
  • Blog
  • People
  • Gallery
  • News