default search action
Ashraf Matrawy
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j23]Mohammed Mahyoub, AbdulAziz AbdulGhaffar, Emmanuel Dare Alalade, Ezekiel Ndubisi, Ashraf Matrawy:
Security Analysis of Critical 5G Interfaces. IEEE Commun. Surv. Tutorials 26(4): 2382-2410 (2024) - [j22]Mohamed el Shehaby, Aditya Kotha, Ashraf Matrawy:
Introducing Adaptive Continuous Adversarial Training (ACAT) to Enhance Machine Learning Robustness. IEEE Netw. Lett. 6(3): 208-212 (2024) - [j21]Darius Saif, Ashraf Matrawy:
An Experimental Investigation of Tuning QUIC-Based Publish-Subscribe Architectures in IoT. IEEE Internet Things J. 11(3): 4924-4933 (2024) - [c61]Mohammed Mahyoub, Sazzad Hossain, Ashraf Matrawy:
On the Impact of the RPL Decreased Rank Attack on 6TiSCH Networks. DRCN 2024: 70-75 - [c60]AbdulAziz AbdulGhaffar, Mohammed Mahyoub, Ashraf Matrawy:
On the Impact of Flooding Attacks on 5G Slicing with Different VNF Sharing Configurations. DRCN 2024: 136-142 - [c59]Rana Abou Khamis, Ashraf Matrawy:
Could Min-Max Optimization be a General Defense Against Adversarial Attacks? ICNC 2024: 671-676 - [c58]Darius Saif, Ashraf Matrawy:
Mass Configuration of Heterogeneous IIoT Nodes: A Proposal and Experimental Evaluation. ICNC 2024: 932-937 - [c57]Mohannad Abu Issa, Mohamed Ibnkahla, Ashraf Matrawy, Abdel Rahman Eldosouky:
Temporal Partitioned Federated Learning for IoT Intrusion Detection Systems. WCNC 2024: 1-6 - [i31]Emmanuel Dare Alalade, Mohammed Mahyoub, Ashraf Matrawy:
Privacy Engineering in Smart Home (SH) Systems: A Comprehensive Privacy Threat Analysis and Risk Management Approach. CoRR abs/2401.09519 (2024) - [i30]Mohamed el Shehaby, Aditya Kotha, Ashraf Matrawy:
Introducing Adaptive Continuous Adversarial Training (ACAT) to Enhance ML Robustness. CoRR abs/2403.10461 (2024) - [i29]Mohamed el Shehaby, Ashraf Matrawy:
Introducing Perturb-ability Score (PS) to Enhance Robustness Against Evasion Adversarial Attacks on ML-NIDS. CoRR abs/2409.07448 (2024) - [i28]Mohammed Mahyoub, Ashraf Matrawy, Kamal Isleem, Olakunle Ibitoye:
Cybersecurity Challenge Analysis of Work-from-Anywhere (WFA) and Recommendations guided by a User Study. CoRR abs/2409.07567 (2024) - 2023
- [c56]Mohamed el Shehaby, Ashraf Matrawy:
The Impact of Dynamic Learning on Adversarial Attacks in Networks (IEEE CNS 23 Poster). CNS 2023: 1-2 - [c55]Ali Farhat, AbdelRahman Eldosouky, Mohamed Ibnkahla, Ashraf Matrawy:
IoT Trust Establishment Through System Level Interactions and Communication Attributes. GLOBECOM 2023: 5919-5924 - [c54]Mohannad Abu Issa, AbdelRahman Eldosouky, Mohamed Ibnkahla, Jason Jaskolka, Ashraf Matrawy:
Integrating Medical and Wearable Devices with E-Health Systems Using Horizontal IoT Platforms. SAS 2023: 1-6 - [i27]Mohammed Mahyoub, AbdulAziz AbdulGhaffar, Emmanuel Dare Alalade, Ashraf Matrawy:
A Security-aware Network Function Sharing Model for 5G Slicing. CoRR abs/2303.03492 (2023) - [i26]Mohamed el Shehaby, Ashraf Matrawy:
Adversarial Evasion Attacks Practicality in Networks: Testing the Impact of Dynamic Learning. CoRR abs/2306.05494 (2023) - 2022
- [j20]Olakunle Ibitoye, M. Omair Shafiq, Ashraf Matrawy:
Differentially private self-normalizing neural networks for adversarial robustness in federated learning. Comput. Secur. 116: 102631 (2022) - [j19]Ahmed Raoof, Chung-Horng Lung, Ashraf Matrawy:
Securing RPL Using Network Coding: The Chained Secure Mode (CSM). IEEE Internet Things J. 9(7): 4888-4898 (2022) - [c53]Alvi Jawad, Luke Newton, Ashraf Matrawy, Jason Jaskolka:
A Formal Analysis of the Efficacy of Rebooting as a Countermeasure Against IoT Botnets. ICC 2022: 2206-2211 - [i25]Darius Saif, Ashraf Matrawy:
An Experimental Investigation of Tuning QUIC-Based Publish-Subscribe Architectures in IoT. CoRR abs/2208.11178 (2022) - [i24]Ali Farhat, AbdelRahman Eldosouky, Jason Jaskolka, Mohamed Ibnkahla, Ashraf Matrawy:
Open Source Horizontal IoT Platforms: A Comparative Study on Functional Requirements. CoRR abs/2209.06384 (2022) - 2021
- [j18]Julian Chimaobi Chukwu, Ashraf Matrawy, Dimitrios Makrakis:
Consolidating Policy Chains Using One Pass Packet Steering in Software Defined Data Centers. IEEE Trans. Cloud Comput. 9(2): 518-531 (2021) - [c52]Danish Sattar, Alireza Hosseini Vasoukolaei, Pat Crysdale, Ashraf Matrawy:
A STRIDE Threat Model for 5G Core Slicing. 5GWF 2021: 247-252 - [c51]Darius Saif, Ashraf Matrawy:
APure HTTP/3 Alternative to MQTT-over-QUIC in Resource-Constrained IoT. CSCN 2021: 36-39 - [c50]Alireza Hosseini Vasoukolaei, Danish Sattar, Ashraf Matrawy:
TLS Performance Evaluation in the Control Plane of a 5G Core Network Slice. CSCN 2021: 155-160 - [c49]Darius Saif, Chung-Horng Lung, Ashraf Matrawy:
An Early Benchmark of Quality of Experience Between HTTP/2 and HTTP/3 using Lighthouse. ICC 2021: 1-6 - [c48]Ramy Maarouf, Danish Sattar, Ashraf Matrawy:
Evaluating Resilience of Encrypted Traffic Classification against Adversarial Evasion Attacks. ISCC 2021: 1-6 - [c47]Ahmed Raoof, Chung-Horng Lung, Ashraf Matrawy:
Integrating 6LoWPAN Security with RPL Using The Chained Secure Mode Framework. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2021: 23-28 - [i23]Olakunle Ibitoye, M. Omair Shafiq, Ashraf Matrawy:
DiPSeN: Differentially Private Self-normalizing Neural Networks For Adversarial Robustness in Federated Learning. CoRR abs/2101.03218 (2021) - [i22]Ahmed Raoof, Chung-Horng Lung, Ashraf Matrawy:
Securing RPL using Network Coding: The Chained Secure Mode (CSM). CoRR abs/2102.06254 (2021) - [i21]Ahmed Raoof, Chung-Horng Lung, Ashraf Matrawy:
Integrating 6LoWPAN Security with RPL Using The Chained Secure Mode Framework. CoRR abs/2104.14422 (2021) - [i20]Ramy Maarouf, Danish Sattar, Ashraf Matrawy:
Evaluating Resilience of Encrypted Traffic Classification Against Adversarial Evasion Attacks. CoRR abs/2105.14564 (2021) - [i19]Darius Saif, Ashraf Matrawy:
A Pure HTTP/3 Alternative to MQTT-over-QUIC in Resource-Constrained IoT. CoRR abs/2106.12684 (2021) - 2020
- [j17]Ahmed Raoof, Ashraf Matrawy, Chung-Horng Lung:
Enhancing Routing Security in IoT: Performance Evaluation of RPL's Secure Mode Under Attacks. IEEE Internet Things J. 7(12): 11536-11546 (2020) - [c46]Rana Abou Khamis, M. Omair Shafiq, Ashraf Matrawy:
Investigating Resistance of Deep Learning-based IDS against Adversaries using min-max Optimization. ICC 2020: 1-7 - [c45]Dana Haj Hussein, Ragunath Anbarasu, Ashraf Matrawy, Mohamed Ibnkahla:
Towards a Decentralized Access Control System for IoT Platforms based on Blockchain Technology. ISNCC 2020: 1-6 - [c44]Rana Abou Khamis, Ashraf Matrawy:
Evaluation of Adversarial Training on Different Types of Neural Networks in Deep Learning-based IDSs. ISNCC 2020: 1-6 - [c43]Danish Sattar, Ashraf Matrawy:
Proactive and Dynamic Slice Allocation in Sliced 5G Core Networks. ISNCC 2020: 1-8 - [c42]Ahmed Raoof, Chung-Horng Lung, Ashraf Matrawy:
Introducing Network Coding to RPL: The Chained Secure Mode (CSM). NCA 2020: 1-4 - [i18]Danish Sattar, Ashraf Matrawy:
Proactive Allocation as Defense for Malicious Co-residency in Sliced 5G Core Networks. CoRR abs/2001.09823 (2020) - [i17]Darius Saif, Chung-Horng Lung, Ashraf Matrawy:
An Early Benchmark of Quality of Experience Between HTTP/2 and HTTP/3 using Lighthouse. CoRR abs/2004.01978 (2020) - [i16]Ahmed Raoof, Ashraf Matrawy, Chung-Horng Lung:
Enhancing Routing Security in IoT: Performance Evaluation of RPL Secure Mode under Attacks. CoRR abs/2004.07815 (2020) - [i15]Ahmed Raoof, Chung-Horng Lung, Ashraf Matrawy:
Introducing Network Coding to RPL: The Chained Secure Mode (CSM). CoRR abs/2006.00310 (2020) - [i14]Rana Abou Khamis, Ashraf Matrawy:
Evaluation of Adversarial Training on Different Types of Neural Networks in Deep Learning-based IDSs. CoRR abs/2007.04472 (2020) - [i13]Olakunle Ibitoye, Ashraf Matrawy, M. Omair Shafiq:
A GAN-based Approach for Mitigating Inference Attacks in Smart Home Environment. CoRR abs/2011.06725 (2020)
2010 – 2019
- 2019
- [j16]Ahmed Raoof, Ashraf Matrawy, Chung-Horng Lung:
Routing Attacks and Mitigation Methods for RPL-Based Internet of Things. IEEE Commun. Surv. Tutorials 21(2): 1582-1606 (2019) - [j15]Danish Sattar, Ashraf Matrawy:
Optimal Slice Allocation in 5G Core Networks. IEEE Netw. Lett. 1(2): 48-51 (2019) - [c41]Danish Sattar, Ashraf Matrawy:
Towards Secure Slicing: Using Slice Isolation to Mitigate DDoS Attacks on 5G Core Network Slices. CNS 2019: 82-90 - [c40]Olakunle Ibitoye, M. Omair Shafiq, Ashraf Matrawy:
Analyzing Adversarial Attacks against Deep Learning for Intrusion Detection in IoT Networks. GLOBECOM 2019: 1-6 - [c39]Ahmed Raoof, Ashraf Matrawy, Chung-Horng Lung:
Secure Routing in IoT: Evaluation of RPL's Secure Mode under Attacks. GLOBECOM 2019: 1-6 - [c38]Thomas A. V. Sattolo, Saumil Macwan, Michael J. Vezina, Ashraf Matrawy:
Classifying Poisoning Attacks in Software Defined Networking. WiSEE 2019: 59-64 - [i12]Danish Sattar, Ashraf Matrawy:
Towards Secure Slicing: Using Slice Isolation to Mitigate DDoS Attacks on 5G Core Network Slices. CoRR abs/1901.01443 (2019) - [i11]Danish Sattar, Ashraf Matrawy:
DSAF: Dynamic Slice Allocation Framework for 5G Core Network. CoRR abs/1905.03873 (2019) - [i10]Olakunle Ibitoye, M. Omair Shafiq, Ashraf Matrawy:
Analyzing Adversarial Attacks Against Deep Learning for Intrusion Detection in IoT Networks. CoRR abs/1905.05137 (2019) - [i9]Ahmed Raoof, Ashraf Matrawy, Chung-Horng Lung:
Secure Routing in IoT: Evaluation of RPL Secure Mode under Attacks. CoRR abs/1905.10314 (2019) - [i8]Rana Abou Khamis, M. Omair Shafiq, Ashraf Matrawy:
Investigating Resistance of Deep Learning-based IDS against Adversaries using min-max Optimization. CoRR abs/1910.14107 (2019) - [i7]Olakunle Ibitoye, Rana Abou Khamis, Ashraf Matrawy, M. Omair Shafiq:
The Threat of Adversarial Attacks on Machine Learning in Network Security - A Survey. CoRR abs/1911.02621 (2019) - 2018
- [j14]Manjinder Nir, Ashraf Matrawy, Marc St-Hilaire:
Economic and Energy Considerations for Resource Augmentation in Mobile Cloud Computing. IEEE Trans. Cloud Comput. 6(1): 99-113 (2018) - [c37]Darius Saif, Alexandre Cormier, Suranjit Banik, Ashraf Matrawy:
A Review of Recently Emerging Denial of Service Threats and Defences in the Transport Layer. CCECE 2018: 1-5 - [c36]Danish Sattar, Ashraf Matrawy, Troy Bryant, Marc Kneppers:
Threat Modeling in LTE Small Cell Networks. CCECE 2018: 1-5 - [c35]Kevin R. B. Butler, Robert K. Cunningham, Paul C. van Oorschot, Reihaneh Safavi-Naini, Ashraf Matrawy, Jeremy Clark:
A Discussion on Security Education in Academia. CCS 2018: 2187-2188 - [c34]Mohamed Aslan, Ashraf Matrawy:
SDN-VSA: Modeling and Analysis of SDN Control Applications Using Vector Spaces. ICC 2018: 1-6 - [c33]Mohamed Aslan, Ashraf Matrawy:
A Clustering-based Consistency Adaptation Strategy for Distributed SDN Controllers. NetSoft 2018: 441-448 - [i6]Danish Sattar, Ashraf Matrawy:
Optimal Slice Allocation in 5G Core Networks. CoRR abs/1802.04655 (2018) - 2017
- [j13]Abes Dabir, AbdelRahman Abdou, Ashraf Matrawy:
A survey on forensic event reconstruction systems. Int. J. Inf. Comput. Secur. 9(4): 337-360 (2017) - [j12]AbdelRahman Abdou, Ashraf Matrawy, Paul C. van Oorschot:
CPV: Delay-Based Location Verification for the Internet. IEEE Trans. Dependable Secur. Comput. 14(2): 130-144 (2017) - [j11]AbdelRahman Abdou, Ashraf Matrawy, Paul C. van Oorschot:
Location Verification of Wireless Internet Clients: Evaluation and Improvements. IEEE Trans. Emerg. Top. Comput. 5(4): 563-575 (2017) - [c32]AbdelRahman Abdou, Ashraf Matrawy, Paul C. van Oorschot:
Accurate Manipulation of Delay-based Internet Geolocation. AsiaCCS 2017: 887-898 - [c31]J. P. Houle, S. Ahmadi, B. C. A. Robart, Ashraf Matrawy:
Leveraging inter-controller communication to MitigateDDoS attacks in SDN networks. CNS 2017: 376-377 - [c30]Mohamed Aslan, Ashraf Matrawy:
Could network view inconsistency affect virtualized network security functions? CNS 2017: 510-512 - [c29]Ahmed Raoof, Ashraf Matrawy:
The effect of buffer management strategies on 6LoWPAN's response to buffer reservation attacks. ICC 2017: 1-7 - [c28]Danish Sattar, Ashraf Matrawy:
An empirical model of packet processing delay of the Open vSwitch. ICNP 2017: 1-6 - [c27]Julian Chimaobi Chukwu, Ashraf Matrawy, Dimitrios Makrakis:
One Pass Packet Steering (OPPS) for stateless policy chains in multi-subscriber SDN. INFOCOM Workshops 2017: 408-413 - [i5]Mohamed Aslan, Ashraf Matrawy:
A Clustering-based Consistency Adaptation Strategy for Distributed SDN Controllers. CoRR abs/1705.09050 (2017) - [i4]Danish Sattar, Ashraf Matrawy:
An Empirical Model of Packet Processing Delay of the Open vSwitch. CoRR abs/1706.06631 (2017) - [i3]Mohamed Aslan, Ashraf Matrawy:
Could Network View Inconsistency Affect Virtualized Network Security Functions? CoRR abs/1707.05546 (2017) - [i2]Mohamed Aslan, Ashraf Matrawy:
Modeling and Analysis of SDN Control Applications using Vector Spaces. CoRR abs/1710.05252 (2017) - 2016
- [j10]Mohamed Aslan, Ashraf Matrawy:
On the Impact of Network State Collection on the Performance of SDN Applications. IEEE Commun. Lett. 20(1): 5-8 (2016) - [c26]Julian Chukwu, Ose Osamudiamen, Ashraf Matrawy:
IDSaaS in SDN: Intrusion Detection System as a service in software defined networks. CNS 2016: 356-357 - [i1]Mohamed Aslan, Ashraf Matrawy:
Maintaining an Up-to-date Global Network View in SDN. CoRR abs/1612.04944 (2016) - 2015
- [j9]AbdelRahman Abdou, Ashraf Matrawy, Paul C. van Oorschot:
Taxing the Queue: Hindering Middleboxes From Unauthorized Large-Scale Traffic Relaying. IEEE Commun. Lett. 19(1): 42-45 (2015) - [j8]AbdelRahman Abdou, Ashraf Matrawy, Paul C. van Oorschot:
Accurate One-Way Delay Estimation With Reduced Client Trustworthiness. IEEE Commun. Lett. 19(5): 735-738 (2015) - [j7]Muhammad Mahmoud, Manjinder Nir, Ashraf Matrawy:
A Survey on Botnet Architectures, Detection and Defences. Int. J. Netw. Secur. 17(3): 264-281 (2015) - [c25]Laura Mutu, Rania Saleh, Ashraf Matrawy:
Improved SDN responsiveness to UDP flood attacks. CNS 2015: 715-716 - [c24]Kevan Adlard, Tharanga Ekanayake, Ashraf Matrawy:
Towards power profiling of Android permissions. NTMS 2015: 1-5 - [c23]Randika Upathilake, Yingkun Li, Ashraf Matrawy:
A classification of web browser fingerprinting techniques. NTMS 2015: 1-5 - 2014
- [c22]Manjinder Nir, Ashraf Matrawy, Marc St-Hilaire:
Optimizing Energy Consumption in Broker-Assisted Cyber Foraging Systems. AINA 2014: 576-583 - [c21]AbdelRahman Abdou, Ashraf Matrawy, Paul C. van Oorschot:
Location verification on the Internet: Towards enforcing location-aware access policies over Internet clients. CNS 2014: 175-183 - [c20]Manjinder Nir, Ashraf Matrawy, Marc St-Hilaire:
An energy optimizing scheduler for mobile cloud computing environments. INFOCOM Workshops 2014: 404-409 - 2013
- [c19]Manjinder Nir, Ashraf Matrawy:
Centralized Management of Scalable Cyber Foraging Systems. EUSPN/ICTH 2013: 265-273 - 2012
- [j6]Kashif Mahmood, Thomas Kunz, Ashraf Matrawy:
Broadcasting in MANETs Using Multi-Source Random Linear Network Coding. Ad Hoc Sens. Wirel. Networks 16(1-3): 119-138 (2012) - [c18]Manjinder Nir, Ashraf Matrawy:
A Density Mapping Algorithm for Supporting Cyber Foraging Service Networks. BWCCA 2012: 578-583 - [c17]Muhammad Mahmoud, Sonia Chiasson, Ashraf Matrawy:
Does context influence responses to firewall warnings? eCrime Researchers Summit 2012: 1-10 - [c16]Mohammad Reza Faghani, Ashraf Matrawy, Chung-Horng Lung:
A Study of Trojan Propagation in Online Social Networks. NTMS 2012: 1-5 - 2011
- [c15]Ashraf Matrawy, Clifford Liem, Michael J. Wiener, Yuan Xiang Gu, Andrew Wajs:
A New Perspective on Providing Cloud Computing Security - A Position Paper. CLOSER 2011: 650-655 - [c14]Issam Al-Dalati, José R. Gallardo, Dimitrios Makrakis, Ashraf Matrawy:
Enhanced QoS Support in Certified Wireless USB. CNSR 2011: 93-100 - 2010
- [c13]Kashif Mahmood, Thomas Kunz, Ashraf Matrawy:
Adaptive Random Linear Network Coding with Controlled Forwarding for wireless broadcast. Wireless Days 2010: 1-5
2000 – 2009
- 2009
- [c12]Abes Dabir, Ashraf Matrawy:
Design and Analysis of a Hierarchical IP Traceback System. ICC 2009: 1-6 - [c11]Craig Smith, Ashraf Matrawy:
A Behaviour Study of Network-Aware Stealthy Worms. ICC 2009: 1-5 - 2008
- [j5]Khurram Masood, Ashraf Matrawy, Bashar Bou-Diab, Ross Kouhi:
Scalable XML routed network topology generation. Bell Labs Tech. J. 13(3): 87-93 (2008) - [c10]Abdulrahman Hijazi, Hajime Inoue, Ashraf Matrawy, Paul C. van Oorschot, Anil Somayaji:
Discovering Packet Structure through Lightweight Hierarchical Clustering. ICC 2008: 33-39 - 2006
- [j4]Yahya E. Osais, Souhail Abdala, Ashraf Matrawy:
A Multilayer Peer-to-Peer Framework for Distributed Synchronous Collaboration. IEEE Internet Comput. 10(6): 33-41 (2006) - [c9]F. El-Hassan, Ashraf Matrawy, Nabil Seddigh, Biswajit Nandy:
Experimental evaluation of network security through a hierarchical quantitative metrics model. Communication, Network, and Information Security 2006: 156-164 - [c8]Choudhury A. Al Sayeed, Ashraf Matrawy:
Guaranteed Maximal Matching for Input Buffered Crossbar Switches. CNSR 2006: 213-220 - [c7]Ashraf Matrawy, Wei Yi, Ioannis Lambadaris, Chung-Horng Lung:
MPLS-based Multicast Shared Trees. CNSR 2006: 227-234 - 2005
- [j3]Ashraf Matrawy, Ioannis Lambadaris:
A real-time video multicast architecture for assured forwarding services. IEEE Trans. Multim. 7(4): 688-699 (2005) - [c6]Ashraf Matrawy, Paul C. van Oorschot, Anil Somayaji:
Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management. ACNS 2005: 104-121 - [c5]Jian Zhu, Ashraf Matrawy, Ioannis Lambadaris, Mohsen Ashourian:
Optimization of resilient packet ring networks scheduling for MPEG-4 video streaming. ICC 2005: 271-275 - 2004
- [c4]Nabil Seddigh, Peter Pieda, Ashraf Matrawy, Biswajit Nandy, Ioannis Lambadaris, Adam Hatfield:
Current Trends and Advances in Information Assurance Metrics. PST 2004: 197-205 - 2003
- [j2]Ashraf Matrawy, Ioannis Lambadaris:
A Survey of Congestion Control Schemes for Multicast Video Applications. IEEE Commun. Surv. Tutorials 5(2): 22-31 (2003) - [j1]Ashraf Matrawy, Ioannis Lambadaris:
A rate adaptation algorithm for multicast sources in priority-based IP networks. IEEE Commun. Lett. 7(2): 94-96 (2003) - [c3]Ashraf Matrawy, Ioannis Lambadaris:
Real-time transport for assured forwarding: an architecture for both unicast and multicast applications. ICC 2003: 1780-1785 - 2002
- [c2]Ashraf Matrawy, Ioannis Lambadaris, Changcheng Huang:
Multicasting of adaptively-encoded MPEG4 over QoS-aware IP networks. ICC 2002: 1300-1304 - 2001
- [c1]Ashraf Matrawy, Ioannis Lambadaris, Changcheng Huang:
On layered video fairness on IP networks. GLOBECOM 2001: 2627-2633