default search action
Ahmed Atya
Person information
- affiliation: University of California Riverside, CA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j5]Yue Cao, Ahmed Osama Fathy Atya, Shailendra Singh, Zhiyun Qian, Srikanth V. Krishnamurthy, Thomas F. La Porta, Prashant Krishnamurthy, Lisa M. Marvel:
Packet Header Obfuscation Using MIMO. IEEE/ACM Trans. Netw. 28(4): 1712-1725 (2020)
2010 – 2019
- 2019
- [j4]Ahmed Osama Fathy Atya, Zhiyun Qian, Srikanth V. Krishnamurthy, Thomas La Porta, Patrick D. McDaniel, Lisa M. Marvel:
Catch Me if You Can: A Closer Look at Malicious Co-Residency on the Cloud. IEEE/ACM Trans. Netw. 27(2): 560-576 (2019) - 2018
- [c14]Yue Cao, Ahmed Osama Fathy Atya, Shailendra Singh, Zhiyun Qian, Srikanth V. Krishnamurthy, Thomas La Porta, Prashant Krishnamurthy, Lisa M. Marvel:
A Framework for MIMO-based Packet Header Obfuscation. INFOCOM 2018: 1763-1771 - 2017
- [c13]Azeem Aqil, Karim Khalil, Ahmed Osama Fathy Atya, Evangelos E. Papalexakis, Srikanth V. Krishnamurthy, Trent Jaeger, K. K. Ramakrishnan, Paul L. Yu, Ananthram Swami:
Jaal: Towards Network Intrusion Detection at ISP Scale. CoNEXT 2017: 134-146 - [c12]Ahmed Osama Fathy Atya, Zhiyun Qian, Srikanth V. Krishnamurthy, Thomas La Porta, Patrick D. McDaniel, Lisa M. Marvel:
Malicious co-residency on the cloud: Attacks and defense. INFOCOM 2017: 1-9 - [c11]Kittipat Apicharttrisorn, Ahmed Osama Fathy Atya, Jiasi Chen, Karthikeyan Sundaresan, Srikanth V. Krishnamurthy:
Enhancing WiFi Throughput with PLC Extenders: A Measurement Study. PAM 2017: 257-269 - [c10]Ahmed Atya, Azeem Aqil, Karim Khalil, Zhiyun Qian, Srikanth V. Krishnamurthy, Thomas F. La Porta:
Stalling Live Migrations on the Cloud. WOOT 2017 - 2016
- [b1]Ahmed Osama Fathy Atya:
Performance and Security Problems in Today's Networks. University of California, Riverside, USA, 2016 - [j3]Ahmed Osama Fathy Atya, Ioannis Broustis, Shailendra Singh, Dimitris Syrivelis, Srikanth V. Krishnamurthy, Thomas F. La Porta:
A Policy-Aware Enforcement Logic for Appropriately Invoking Network Coding. IEEE/ACM Trans. Netw. 24(4): 2005-2018 (2016) - [c9]Azeem Aqil, Ahmed Osama Fathy Atya, Srikanth V. Krishnamurthy, Paul L. Yu, Ananthram Swami, Jeff Rowe, Karl N. Levitt, Alexander Poylisher, Constantin Serban, Ritu Chadha:
Automated cross layer feature selection for effective intrusion detection in networked systems. CNS 2016: 270-278 - 2015
- [j2]Ahmed Osama Fathy Atya, Azeem Aqil, Shailendra Singh, Ioannis Broustis, Karthikeyan Sundaresan, Srikanth V. Krishnamurthy:
Exploiting Subcarrier Agility to Alleviate Active Jamming Attacks in Wireless Networks. IEEE Trans. Mob. Comput. 14(12): 2488-2501 (2015) - [c8]Ahmed Osama Fathy Atya, Karthikeyan Sundaresan, Srikanth V. Krishnamurthy, Mohammad Ali Khojastepour, Sampath Rangarajan:
BOLT: realizing high throughput power line communication networks. CoNEXT 2015: 39:1-39:13 - [c7]Azeem Aqil, Ahmed Osama Fathy Atya, Srikanth V. Krishnamurthy, George Papageorgiou:
Streaming Lower Quality Video over LTE: How Much Energy Can You Save? ICNP 2015: 156-167 - [c6]Azeem Aqil, Ahmed Osama Fathy Atya, Trent Jaeger, Srikanth V. Krishnamurthy, Karl N. Levitt, Patrick D. McDaniel, Jeff Rowe, Ananthram Swami:
Detection of stealthy TCP-based DoS attacks. MILCOM 2015: 348-353 - 2014
- [c5]Zi Feng, George Papageorgiou, Qian Gao, Ahmed Osama Fathy Atya, Srikanth V. Krishnamurthy, Gang Chen:
Performance of visible light communications with dimming controls. WCNC 2014: 1756-1761 - 2013
- [c4]Ahmed Osama Fathy Atya, Jilong Kuang:
RUFC: A flexible framework for reliable UDP with flow control. ICITST 2013: 276-281 - [c3]Ahmed Osama Fathy Atya, Azeem Aqil, Shailendra Singh, Ioannis Broustis, Karthikeyan Sundaresan, Srikanth V. Krishnamurthy:
Mitigating malicious interference via subcarrier-level radio agility in wireless networks. ICNP 2013: 1-10 - [c2]Ahmed Osama Fathy Atya, Ioannis Broustis, Shailendra Singh, Dimitris Syrivelis, Srikanth V. Krishnamurthy, Thomas F. La Porta:
Wireless network coding: Deciding when to flip the switch. INFOCOM 2013: 260-264 - [c1]Ahmed Osama Fathy Atya, Tamer A. ElBatt, Moustafa A. Youssef:
On the flow anonymity problem in Network Coding. IWCMC 2013: 225-230 - 2011
- [j1]Ahmed Osama Fathy Atya, Tamer A. ElBatt, Moustafa Youssef:
A source authentication scheme using network coding. Int. J. Secur. Networks 6(2/3): 101-111 (2011)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:47 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint