Cellular, wide-area, and non-terrestrial IoT: A survey on 5G advances and the road toward 6G M Vaezi, A Azari, SR Khosravirad, M Shirvanimoghaddam, MM Azari, ... IEEE Communications Surveys & Tutorials 24 (2), 1117-1174, 2022 | 326 | 2022 |
Security challenges in the internet of things D Chasaki, C Mansour International Journal of Space-Based and Situated Computing 5 (3), 141-149, 2015 | 70 | 2015 |
Attacks and defenses in the data plane of networks D Chasaki, T Wolf IEEE Transactions on dependable and secure computing 9 (6), 798-810, 2012 | 50 | 2012 |
Attacks on network infrastructure D Chasaki, Q Wu, T Wolf 2011 Proceedings of 20th International Conference on Computer Communications …, 2011 | 27 | 2011 |
Design of a secure packet processor D Chasaki, T Wolf Proceedings of the 6th ACM/IEEE Symposium on Architectures for Networking …, 2010 | 20 | 2010 |
Vulnerabilities of control systems in Internet of Things applications V Radisavljevic-Gajic, S Park, D Chasaki IEEE Internet of Things Journal 5 (2), 1023-1032, 2017 | 17 | 2017 |
Implementation of a simplified network processor Q Wu, D Chasaki, T Wolf 2010 International Conference on High Performance Switching and Routing, 7-13, 2010 | 16 | 2010 |
Packet scheduling attacks on shipboard networked control systems E Penera, D Chasaki 2015 Resilience Week (RWS), 1-6, 2015 | 11 | 2015 |
Entrepreneurial-minded learning in a freshman mini-project in Computing D Chasaki 2017 ASEE Annual Conference & Exposition, 2017 | 10 | 2017 |
Design of an adaptive security mechanism for modern routers C Mansour, YEH Shehadeh, D Chasaki 2015 IEEE International Conference on Consumer Electronics (ICCE), 241-244, 2015 | 7 | 2015 |
Low complexity intercarrier interference reduction for high mobility wireless systems YEH Shehadeh, S Bamgartner, D Chasaki, G Hirtz 2015 IEEE International Conference on Consumer Electronics (ICCE), 641-644, 2015 | 7 | 2015 |
Identifying malicious behavior in MANET through data path information D Chasaki 2014 International Conference on Computing, Networking and Communications …, 2014 | 7 | 2014 |
Topology reconstruction via path recording in secure MANET D Chasaki, YS Hanay, T Wolf MILCOM 2008-2008 IEEE Military Communications Conference, 1-7, 2008 | 7 | 2008 |
Network-Based Machine Learning Detection of Covert Channel Attacks on Cyber-Physical Systems H Li, D Chasaki IEEE International Conference on Industrial Informatics (INDIN 2022), 1-6, 2022 | 6 | 2022 |
Detecting Malicious Hosts in SDN through System Call Learning D Chasaki, C Mansour IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops …, 2021 | 6* | 2021 |
External monitoring of highly parallel network processors X Chen, D Chasaki, T Wolf 2013 IEEE 14th International Conference on High Performance Switching and …, 2013 | 6 | 2013 |
A separation and protection scheme for on-chip memory blocks in FPGAs LR Rivera, X Wang, D Chasaki 2016 IEEE International Symposium on Hardware Oriented Security and Trust …, 2016 | 5 | 2016 |
Secure and efficient medium access in wireless networks YEH Shehadeh, D Chasaki 2014 IEEE Fourth International Conference on Consumer Electronics Berlin …, 2014 | 5 | 2014 |
Microgrids: Technical and security recommendations for future implementations D Chasaki, N Kondrath 2014 IEEE International Conference on Consumer Electronics (ICCE), 313-314, 2014 | 5 | 2014 |
Fast regular expression matching in hardware using nfa-bdd combination D Chasaki, T Wolf Proceedings of the 6th ACM/IEEE Symposium on Architectures for Networking …, 2010 | 5 | 2010 |