Muhamad Felemban

Muhamad Felemban
  • Purdue University West Lafayette

About

11
Publications
1,260
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
175
Citations
Current institution
Purdue University West Lafayette

Publications

Publications (11)
Preprint
Full-text available
Organizations are increasingly moving towards the cloud computing paradigm, in which an on-demand access to a pool of shared configurable resources is provided. However, security challenges, which are particularly exacerbated by the multitenancy and virtualization features of cloud computing, present a major obstacle. In particular, sharing of reso...
Article
Full-text available
Managing events pose a unique challenge to the stakeholders and authorities to control the crowd in all three phases of the event (pre, during and post), ensuring crowd safety. One of the fundamental keys to provide crowd safety is to consider the mobility infrastructure hosting the crowd, i.e., routes, areas, entrances and exits. During Hajj, wher...
Article
The performance of distributed streaming systems relies on how even the workload is distributed among their machines. However, data and query workloads are skewed and change rapidly. Therefore, multiple adaptive load-balancing mechanisms have been proposed in the literature to rebalance distributed streaming systems according to the changes in thei...
Preprint
Full-text available
With the growing cyber-security threats, ensuring the security of data in Cloud data centers is a challenging task. A prominent type of attack on Cloud data centers is data tampering attack that can jeopardize the confidentiality and the integrity of data. In this article, we present a security and performance driven architecture for these centers...
Article
Emerging cyberphysical systems incorporate systems of systems that have functional interdependencies. With the increase in complexity of cyberphysical systems, the attack surface also expands, making cyberphysical systems more vulnerable to cyberattacks. We present a novel security architecture that localizes the cyberattack in a timely manner and...
Article
In this article, we propose a threat management system (TMS) for Data-centric Internet-of-Things-based Collaborative Systems (DIoTCSs). In particular, we focus on tampering attacks that target shared databases and can affect the execution of the DIoTCS services. The novelty of the proposed system is to isolate the damage caused by tampering attacks...
Article
Full-text available
Underwater Acoustic Sensor Network (UASN) is playing a vital role in exploration and monitoring operations in underwater environments that are difficult to reach. The communication medium relies on acoustic waves, which limits the performance of UASN in comparison to terrestrial sensor network. This is due to its limited bandwidth, high latency and...
Conference Paper
Wireless sensor networks (WSN) are distributed event-based systems comprising of tiny nodes capable of sensing the environmental phenomena with a limited battery, low pro­cessing power and short-range radio for communication. Most of the applications of sensor network are concerned with sensing scalar sensor such as temperature, pressure, humidity,...
Article
Mobile cloud computing is emerging as a new paradigm for supporting a broad range of multimedia services. MCC alleviates the burden of storage and computation on mobile devices. In this article, we describe design requirements and an architecture for MCC. The novelty in this architecture is an integrated cloudlet and base station subsystem that can...
Conference Paper
Currently Underwater Acoustic Sensor Network (UASN) is playing a vital role in exploration and monitoring operations in underwater environments that are difficult to reach. Underwater communication mainly relies on acoustic waves, which limits the performance of UASN due to its limited bandwidth, large propagation delays, and high path loss. In thi...
Conference Paper
Wireless Sensor Networks (WSN) are expected to play a vital role in the exploration and monitoring of underwater areas which are not easily reachable by humans. However, underwater communication via acoustic waves is subject to several performance limitations that are very different from those used for terresstrial networks. In this paper, we inves...

Network

Cited By