5 Nov 21 mohammed mahyoub Work from Anywhere Challenges: A Cybersecurity Perspective Organizations have had to quickly transit to work-from-anywhere (WFA) model, as a necessity to continue…
18 Feb 22 emmanuel alalade Differentially private self-normalizing neural networks for adversarial robustness in federated learning Ibitoye, O., Shafiq, M. O., & Matrawy, A. (2022). Differentially Private Self-normalizing Neural Networks for…
8 Feb 22 emmanuel alalade Congratulations to Olakunle Ibitoye for successfully defending his Ph.D. Proposal!
29 Jan 22 emmanuel alalade A Formal Analysis of the Efficacy of Rebooting as a Countermeasure against IoT Botnets A. Jawad, L. Newton, A. Matrawy, and J. Jaskolka, “A Formal Analysis of the Efficacy…
29 Jan 22 emmanuel alalade A Pure HTTP/3 Alternative to MQTT-over-QUIC in Resource-Constrained IoT D Saif, A Matrawy, “A Pure HTTP/3 Alternative to MQTT-over-QUIC in Resource-Constrained IoT”, IEEE Conference on…
28 Jan 22 emmanuel alalade An Early Benchmark of Quality of Experience Between HTTP/2 and HTTP/3 using Lighthouse D. Saif, C-H. Lung, and A. Matrawy, “An Early Benchmark of Quality of Experience Between…
28 Jan 22 emmanuel alalade Evaluating Resilience of Encrypted Traffic Classification against Adversarial Evasion Attacks R. Maarouf, D. Sattar and A. Matrawy, "Evaluating Resilience of Encrypted Traffic Classification against Adversarial…
28 Jan 22 emmanuel alalade A STRIDE Threat Model for 5G Core Slicing D. Sattar, A. H. Vasoukolaei, P. Crysdale, and A. Matrawy, “A STRIDE Threat Model for…
28 Jan 22 emmanuel alalade Integrating 6LoWPAN Security with RPL Using the Chained Secure Mode Framework. A Raoof, CH Lung, A Matrawy, “Integrating 6LoWPAN Security with RPL Using the Chained Secure…