Saad Saleh

Saad Saleh
University of Groningen | RUG

Master of Science

About

18
Publications
8,436
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
99
Citations

Publications

Publications (18)
Conference Paper
Full-text available
The identification of encrypted Instant Messaging (IM) channels between users is made difficult by the presence of variable and high levels of uncorrelated background traffic. In this paper, we propose a novel Cross-correlation Outlier Detector (CCOD) to identify communicating end-users in a large group of users. Our technique uses traffic flow tra...
Conference Paper
Full-text available
The breach of privacy in encrypted instant mes-senger (IM) service is a serious threat to user anonymity. Performance of previous de-anonymization strategies was limited to 65%. We perform network de-anonymization by taking advan-tage of the cause-effect relationship between sent and received packet streams and demonstrate this approach on a data s...
Article
Full-text available
Tremendous growth rates of Internet Protocol Television (IPTV) and Voice over Internet Protocol (VoIP) have demanded the shift of paradigm from wired to wireless applications. Increased packet loss with continuously varying wireless conditions make the transmission a challenging task in wireless environment. Our study investigates and proposes impr...
Article
Full-text available
Software defi�ned networks (SDNs) introduced the concept of decoupling control and data planes which is a paradigm shift. The OpenFlow protocol is one of a number of technologies that enables this decoupling and, in e�ffect, commodi�fies network equipment. As of now, there is still limited work that has been done towards modeling the transit delay...
Article
Full-text available
OpenFlow enabled networks split and separate the data and control planes of traditional networks. This design commodifies network switches and enables centralized control of the network. Control decisions are made by an OpenFlow controller, and locally cached by switches, as directed by controllers. Since controllers are not necessarily co-located...
Article
Full-text available
Anonymity services have seen high growth rates with increased usage in the past few years. Among various services, Tor is one of the most popular peer-to-peer anonymizing service. In this survey paper, we summarize, analyze, classify and quantify 26 years of research on the Tor network. Our research shows that `security' and `anonymity' are the mos...
Article
Full-text available
The broadcast nature of communication channels in infrastruc-tureless wireless networks poses challenges to security. In this paper, we propose a novel technique namely Secure Multi-channel Group Key Generation (MuGKeG) algorithm. We utilize the available channels switching behaviour between multiple nodes to hide our key from eavesdropper. We prov...
Conference Paper
Full-text available
Every day 645 million Twitter users generate approximately 58 million tweets. This motivates the question if it is possible to generate a summary of events from this rich set of tweets only. Key challenges in post summarization from microblog posts include circumnavigating spam and conversational posts. In this study, we present a novel technique c...
Research
Full-text available
Accepted at IEEE Intrnational Conference on Communications (ICC)
Conference Paper
Full-text available
This paper addresses the problem of sentiment classification of short messages on microblogging platforms. We apply machine learning and pattern recognition techniques to design and implement a classification system for microblog messages assigning them into one of three classes: positive, negative or neutral. As part of this work, we contributed a d...
Conference Paper
Full-text available
In this paper we study the time evolution of academic collaboration networks by predicting the appearance of new links between authors. The accurate prediction of new collaborations between members of a collaboration network can help accelerate the realization of new synergies, foster innovation, and raise productivity. For this study, the authors...
Conference Paper
Full-text available
Internet Protocol Television (IPTV) has gained an enormous growth rate by revolutionizing personal entertainment. High data rates with increased coverage radius of IEEE 802.11n Wireless Local Area Networks (WLANs) motivate the concept of wireless IPTV. Streaming of Television contents over highly pervasive wireless environment with satisfactory Qua...
Conference Paper
Full-text available
Internet Protocol Television (IPTV) and Voice over Internet Protocol (VoIP) have gained unprecedented growth rates in the past few years. Data rate and high coverage area of IEEE 802.11n motivate the concept of combined IPTV and VoIP over IEEE 802.11n. Transmission of combined IPTV and VoIP over a wireless network is a challenging task. In this pap...
Thesis
Full-text available
Internet Protocol Television (IPTV) has gained an enormous growth rate by revolutionizing personal entertainment. High data rates with increased coverage radius of IEEE 802.11n Wireless Local Area Networks (WLANs) motivate the concept of wireless IPTV. Focusing on wireless IPTV, our work deals with the capacity evaluation of IPTV users over IEEE 80...

Network

Cited By