Marwan H. Abu-Amara

Orcid: 0000-0001-6578-5417

According to our database1, Marwan H. Abu-Amara authored at least 24 papers between 1993 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Evaluation of Human Immune-Based IDPS Under DoS/DDoS Attacks.
Proceedings of the 2023 International Conference on Advances in Computing Research (ACR'23), 2023

2021
Secure Computing Enclaves Using FPGAs.
IEEE Trans. Dependable Secur. Comput., 2021

An Efficient RPL-Based Mechanism for Node-to-Node Communications in IoT.
IEEE Internet Things J., 2021

Modeling and Evaluation of Software Defined Networking Based 5G Core Network Architecture.
IEEE Access, 2021

2020
EDoS-ADS: An Enhanced Mitigation Technique Against Economic Denial of Sustainability (EDoS) Attacks.
IEEE Trans. Cloud Comput., 2020

Super Generation Network Coding for Peer-to-Peer Content Distribution Networks.
IEEE Access, 2020

2019
Traffic-aware auto-configuration protocol for service oriented low-power and lossy networks in IoT.
Wirel. Networks, 2019

A Protection and Pay-per-use Licensing Scheme for On-cloud FPGA Circuit IPs.
ACM Trans. Reconfigurable Technol. Syst., 2019

FPGA-Based Symmetric Re-Encryption Scheme to Secure Data Processing for Cloud-Integrated Internet of Things.
IEEE Internet Things J., 2019

2018
Software-defined networking approach for enhanced evolved packet core network.
Int. J. Commun. Syst., 2018

2014
A combined solution for the Internet access denial caused by malicious Internet service providers.
Secur. Commun. Networks, 2014

Interdomain Traffic Engineering Techniques to Overcome Undesirable Connectivity Incidents.
Proceedings of the Network and Parallel Computing, 2014

2013
Classifying malicious activities in Honeynets using entropy and volume-based thresholds.
Secur. Commun. Networks, 2013

A scalable NAT-based solution to Internet access denial by higher-tier ISPs.
Secur. Commun. Networks, 2013

2012
Prototyping and evaluating a tunnel-based solution to circumvent malicious IISP blocking.
Proceedings of the International Conference on Communications and Information Technology, 2012

2011
Identifying network traffic features suitable for honeynet data analysis.
Proceedings of the 24th Canadian Conference on Electrical and Computer Engineering, 2011

Internet access denial by higher-tier ISPS: A NAT-based solution.
Proceedings of the 24th Canadian Conference on Electrical and Computer Engineering, 2011

Dynamic peer-to-peer (P2P) solution to counter malicious higher Domain Name System (DNS) nameservers.
Proceedings of the 24th Canadian Conference on Electrical and Computer Engineering, 2011

2010
Comparative Performance Study for Integrated 3G/WLAN Networks Using Mobile IP, SIP, and m-SCTP Protocols.
Proceedings of the 71st IEEE Vehicular Technology Conference, 2010

2006
A heuristics based approach for cellular mobile network planning.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006

CDMA Access Channel Performance under Idle-Mode Ping-Pong Effect in Inter-MSC Handoffs.
Proceedings of the 3rd IEEE International Symposium on Wireless Communication Systems, 2006

1995
Optimal Asynchronous Agreement and Leader Election Algorithm for Complete Networks with Byzantine Faulty Links.
Distributed Comput., 1995

Asynchronous failure location algorithm for fiber-optic networks.
Proceedings of the Seventh IEEE Symposium on Parallel and Distributed Processing, 1995

1993
Functional languages: A performance study.
J. Syst. Softw., 1993


  Loading...