Author of the publication

Losing control of the internet: using the data plane to attack the control plane.

, , , , , and . ACM Conference on Computer and Communications Security, page 726-728. ACM, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Mohaisen, Abedelaziz
add a person with the name Mohaisen, Abedelaziz
 

Other publications of authors with the same name

Privacy Preserving Association Rule Mining Revisited, and . CoRR, (2008)DEOS: Dynamic energy-oriented scheduling for sustainable wireless sensor networks., , , and . INFOCOM, page 2363-2371. IEEE, (2012)Hierarchical Grid-based Pairwise Key Pre-distribution in Wireless Sensor Networks., , and . I. J. Network Security, 8 (3): 282-292 (2009)Mitigating the ICA Attack against Rotation Based Transformation for Privacy Preserving Clustering, and . CoRR, (2009)Secret Key Revocation in Sensor Networks., , and . UIC, volume 4611 of Lecture Notes in Computer Science, page 1222-1232. Springer, (2007)Private Over-Threshold Aggregation Protocols., , , and . ICISC, volume 7839 of Lecture Notes in Computer Science, page 472-486. Springer, (2012)Unveiling Zeus: automated classification of malware samples., and . WWW (Companion Volume), page 829-832. International World Wide Web Conferences Steering Committee / ACM, (2013)Two-level Key Pool Design-based Random Key Pre-distribution in Wireless Sensor Networks., , and . TIIS, 2 (5): 222-238 (2008)Understanding Social Networks Properties for Trustworthy Computing., , , and . ICDCS Workshops, page 154-159. IEEE Computer Society, (2011)Parallel QRD-M encoder for multi-user MIMO systems., , and . Telecommunication Systems, 57 (3): 261-270 (2014)