Optimal slice allocation in 5G core networks D Sattar, A Matrawy IEEE Networking Letters 1 (2), 48-51, 2019 | 141 | 2019 |
Towards secure slicing: Using slice isolation to mitigate DDoS attacks on 5G core network slices D Sattar, A Matrawy 2019 IEEE Conference on Communications and Network Security (CNS), 82-90, 2019 | 123 | 2019 |
Enhanced and fast face recognition by hashing algorithm M Sharif, K Ayub, D Sattar, M Raza, S Mohsin Journal of applied research and technology 10 (4), 607-617, 2012 | 31 | 2012 |
Adaptive bubble burst (ABB): Mitigating DDoS attacks in software-defined networks D Sattar, A Matrawy, O Adeojo 2016 17th International Telecommunications Network Strategy and Planning …, 2016 | 21 | 2016 |
Real time face detection M Sharif, K Ayub, D Sattar, M Raza Sindh University Research Journal-SURJ (Science Series) 44 (4), 2012 | 17 | 2012 |
An empirical model of packet processing delay of the Open vSwitch D Sattar, A Matrawy 2017 IEEE 25th International Conference on Network Protocols (ICNP), 1-6, 2017 | 15 | 2017 |
A stride threat model for 5g core slicing D Sattar, AH Vasoukolaei, P Crysdale, A Matrawy 2021 IEEE 4th 5G World Forum (5GWF), 247-252, 2021 | 13 | 2021 |
Evaluating resilience of encrypted traffic classification against adversarial evasion attacks R Maarouf, D Sattar, A Matrawy 2021 IEEE Symposium on Computers and Communications (ISCC), 1-6, 2021 | 11 | 2021 |
Proactive and dynamic slice allocation in sliced 5g core networks D Sattar, A Matrawy 2020 International symposium on networks, computers and communications …, 2020 | 11 | 2020 |
Energy efficient multicast routing protocols for wireless sensor networks AA Minhas, D Sattar, K Mustaq, SA Rizvi 2011 World Congress on Sustainable Technologies (WCST), 178-181, 2011 | 10 | 2011 |
TLS performance evaluation in the control plane of a 5g core network slice AH Vasoukolaei, D Sattar, A Matrawy 2021 IEEE Conference on Standards for Communications and Networking (CSCN …, 2021 | 5 | 2021 |
DSAF: Dynamic slice allocation framework for 5G core network D Sattar, A Matrawy arXiv preprint arXiv:1905.03873, 2019 | 5 | 2019 |
KashifMustaq and S AA Minhas, DS Fazl-e-Hadi Ali Rizvi,“Energy efficient Multicast Routing Protocols for Wireless Sensor …, 2011 | 5 | 2011 |
A comparative analysis of flooding time synchronization protocol and recursive time synchronization protocol D Sattar, TR Sheltami, AS Mahmoud, EM Shakshuki Proceedings of International Conference on Advances in Mobile Computing …, 2013 | 4 | 2013 |
Threat Modeling in LTE Small Cell Networks D Sattar, A Matrawy, T Bryant, M Kneppers 2018 IEEE Canadian Conference on Electrical & Computer Engineering (CCECE), 1-5, 2018 | 3 | 2018 |
Real-time performance evaluation for flooding and recursive time synchronization protocols over Arduino and XBee TR Sheltami, D Sattar, EM Shakshuki, AS Mahmoud International Journal of Distributed Sensor Networks 11 (10), 652041, 2015 | 3 | 2015 |
Proactive Allocation as Defense for Malicious Co-residency in Sliced 5G Core Networks D Sattar, A Matrawy arXiv preprint arXiv:2001.09823, 2020 | | 2020 |
Mitigating Security Problems in Virtualized Networks Through Resource Management D Sattar Carleton University, 2020 | | 2020 |
Real-time performance evaluation of flooding & recursive time synchronization protocols over Arduino & XBee D Sattar PQDT-Global, 2013 | | 2013 |