— We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically fail to detect attacks and also gener...
The increase of the web traffic has created the need for web switches that are able to balance the traffic to the server farms based on their contents (e.g. layer 7 switching). In...
Many techniques have been proposed in the past for the protection of VLSI design IPs (intellectual property). CAD tools and algorithms are intensively used in all phases of modern...
Packet Classification (PC) has been a critical data path function for many emerging networking applications. An interesting approach is the use of TCAM to achieve deterministic, hi...
— Recently, we have proposed ANSWER: AutoNomouS Wireless sEnsor netwoRk as a service platform whose mission is to provide dependable information services to in-situ mobile users ...
Mohamed F. Younis, Waleed A. Youssef, Mohamed Elto...