Prati
Danai Chasaki
Danai Chasaki
Villanova Uni
Potvrđena adresa e-pošte na villanova.edu
Naslov
Citirano
Citirano
Godina
Cellular, wide-area, and non-terrestrial IoT: A survey on 5G advances and the road toward 6G
M Vaezi, A Azari, SR Khosravirad, M Shirvanimoghaddam, MM Azari, ...
IEEE Communications Surveys & Tutorials 24 (2), 1117-1174, 2022
2602022
Security challenges in the internet of things
D Chasaki, C Mansour
International Journal of Space-Based and Situated Computing 5 (3), 141-149, 2015
692015
Attacks and defenses in the data plane of networks
D Chasaki, T Wolf
IEEE Transactions on dependable and secure computing 9 (6), 798-810, 2012
502012
Attacks on network infrastructure
D Chasaki, Q Wu, T Wolf
2011 Proceedings of 20th International Conference on Computer Communications …, 2011
272011
Design of a secure packet processor
D Chasaki, T Wolf
Proceedings of the 6th ACM/IEEE Symposium on Architectures for Networking …, 2010
202010
Vulnerabilities of control systems in Internet of Things applications
V Radisavljevic-Gajic, S Park, D Chasaki
IEEE Internet of Things Journal 5 (2), 1023-1032, 2017
162017
Implementation of a simplified network processor
Q Wu, D Chasaki, T Wolf
2010 International Conference on High Performance Switching and Routing, 7-13, 2010
162010
Entrepreneurial-minded learning in a freshman mini-project in Computing
D Chasaki
2017 ASEE Annual Conference & Exposition, 2017
102017
Packet scheduling attacks on shipboard networked control systems
E Penera, D Chasaki
2015 Resilience Week (RWS), 1-6, 2015
102015
Design of an adaptive security mechanism for modern routers
C Mansour, YEH Shehadeh, D Chasaki
2015 IEEE International Conference on Consumer Electronics (ICCE), 241-244, 2015
72015
Low complexity intercarrier interference reduction for high mobility wireless systems
YEH Shehadeh, S Bamgartner, D Chasaki, G Hirtz
2015 IEEE International Conference on Consumer Electronics (ICCE), 641-644, 2015
72015
Identifying malicious behavior in MANET through data path information
D Chasaki
2014 International Conference on Computing, Networking and Communications …, 2014
72014
Topology reconstruction via path recording in secure MANET
D Chasaki, YS Hanay, T Wolf
MILCOM 2008-2008 IEEE Military Communications Conference, 1-7, 2008
72008
Detecting Malicious Hosts in SDN through System Call Learning
D Chasaki, C Mansour
IEEE INFOCOM 2021 - IEEE Conference on Computer Communications Workshops …, 2021
6*2021
External monitoring of highly parallel network processors
X Chen, D Chasaki, T Wolf
2013 IEEE 14th International Conference on High Performance Switching and …, 2013
62013
Network-Based Machine Learning Detection of Covert Channel Attacks on Cyber-Physical Systems
H Li, D Chasaki
IEEE International Conference on Industrial Informatics (INDIN 2022), 1-6, 2022
52022
A separation and protection scheme for on-chip memory blocks in FPGAs
LR Rivera, X Wang, D Chasaki
2016 IEEE International Symposium on Hardware Oriented Security and Trust …, 2016
52016
Secure and efficient medium access in wireless networks
YEH Shehadeh, D Chasaki
2014 IEEE Fourth International Conference on Consumer Electronics Berlin …, 2014
52014
Microgrids: Technical and security recommendations for future implementations
D Chasaki, N Kondrath
2014 IEEE International Conference on Consumer Electronics (ICCE), 313-314, 2014
52014
Fast regular expression matching in hardware using nfa-bdd combination
D Chasaki, T Wolf
Proceedings of the 6th ACM/IEEE Symposium on Architectures for Networking …, 2010
52010
Sustav trenutno ne može provesti ovu radnju. Pokušajte ponovo kasnije.
Članci 1–20