How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
Citations since 2017
10 Research Items
I am an Assistant Professor in the Department of Computer Science at the University of New Orleans. I received my Ph.D. degree in Computer Science from the University of Louisiana at Lafayette in 2018. My research interests are Network Measurement and Analysis, Network Topology Discovering and Modeling, Network Security and Graph Theory.
The design of IP protocol creates difficulties in identifying the true source of any packet, which makes it one of the most arduous problems to defend against Denial of Service (DoS) attacks. This paper introduces an Autonomous System (AS) traceback mechanism based on probabilistic packet marking, which allows the victim to trace the attack-origina...
The Internet not only facilitates our daily activities, such as communication, entertainment and shopping but also serves as the enabling technology for many critical services, including finance, manufacturing, healthcare and transportation. On the other hand, a wide spectrum of attacks targets its communication infrastructure to disable or disrupt...
The Internet is a network of networks consisting of tens of thousands of Autonomous Systems (ASes). These ASes connect to each other in different forms to enable the “global” Internet communication. In this study, we investigate the geographical characteristics of the visible Internet as well as examine the relation between geography and intra-AS a...
The global communication infrastructure of the Internet is formed by tens of thousands of Autonomous Systems (ASes) connecting various organizations and individuals together. In the last two decades researchers have developed many techniques to infer the topology of individual ASes as well as the whole Internet at the interface, router, subnet, poi...
The Internet introduces a variety of vulnerabilities that put the security and privacy of computer based systems under risk. One of the most perilous threats in the Internet is the Denial of Service (DoS) attack and its variants such as Distributed DoS (DDoS).In this work we propose a novel probabilistic packet marking scheme to infer forward paths...
Recent advances in Cyber-Physical Systems (CPSs) promote the Internet as the main communication technology for monitoring, controlling and managing the physical entities as well as exchanging information between the physical entities and human users. On the other hand, the Internet introduces a variety of vulnerabilities that may put the security a...