Zobrazeno 1 - 10
of 76
pro vyhledávání: '"Ashraf Matrawy"'
Publikováno v:
IEEE Transactions on Cloud Computing. 9:518-531
In this paper, we address the problem of service function chaining in a network and present a solution that tackles this problem in Software Defined Data Centers. Service function chaining can broadly be categorized into middlebox placement in a netw
Publikováno v:
2021 IEEE Conference on Standards for Communications and Networking (CSCN).
Publikováno v:
5GWF
5G networks bring a new paradigm of cellular infrastructure and, therefore, a need to model new types of threats. One of the primary innovations of 5G networks compared to previous generations is the ability to create network slices. This allows netw
Autor:
Darius Saif, Ashraf Matrawy
In this paper, we address the issue of scalable, interoperable, and timely dissemination of information in resource-constrained IoT. Scalability is addressed by adopting a publish-subscribe architecture. To address interoperable and timely disseminat
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::301df065bee68299350c00f0489525e5
http://arxiv.org/abs/2106.12684
http://arxiv.org/abs/2106.12684
Autor:
Danish Sattar, Ashraf Matrawy
Publikováno v:
IEEE Networking Letters. 1:48-51
5G network slicing is essential to providing flexible, scalable, and on-demand solutions for the vast array of applications in 5G networks. Two key challenges of 5G network slicing are function isolation (intra-slice) and guaranteeing end-to-end dela
Publikováno v:
IEEE Communications Surveys & Tutorials. 21:1582-1606
The recent bloom of Internet of Things (IoT) and its prevalence in many security-sensitive environments made the security of these networks a crucial requirement. Routing in many of IoT networks has been performed using the routing protocol for low p
The IPv6 over Low-powered Wireless Personal Area Network (6LoWPAN) protocol was introduced to allow the transmission of Internet Protocol version 6 (IPv6) packets using the smaller-size frames of the IEEE 802.15.4 standard, which is used in many Inte
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::83d2a24d87f9432fe28f653b6db9cb1f
http://arxiv.org/abs/2104.14422
http://arxiv.org/abs/2104.14422
As the de facto routing protocol for many Internet of Things (IoT) networks nowadays, and to assure the confidentiality and integrity of its control messages, the Routing Protocol for Low Power and Lossy Networks (RPL) incorporates three modes of sec
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::66cc1cbd42a966cde97170d42d4ccf5b
Publikováno v:
Computers & Security. 116:102631
Autor:
Ashraf Matrawy, Danish Sattar
Publikováno v:
ISNCC
Malicious co-residency in virtualized networks poses a real threat. The next-generation mobile networks heavily rely on virtualized infrastructure, and network slicing has emerged as a key enabler to support different virtualized services and applica