Search

Your search keyword '"Nael Abu-Ghazaleh"' showing total 179 results

Search Constraints

Start Over You searched for: Author "Nael Abu-Ghazaleh" Remove constraint Author: "Nael Abu-Ghazaleh"
179 results on '"Nael Abu-Ghazaleh"'

Search Results

1. Microarchitectural Attacks in Heterogeneous Systems: A Survey

2. Efficient Hardware Malware Detectors That are Resilient to Adversarial Evasion

6. Beyond the CPU: Side–Channel Attacks on GPUs

7. ROOM: Adversarial Machine Learning Attacks Under Real-Time Constraints

9. A Longitudinal Study on Digital Filtering in Saudi Arabia

10. JetStream: Graph Analytics on Streaming Data with Event-Driven Hardware Accelerator

11. DisCo: Combining Disassemblers for Improved Performance

12. Secure Ramp Merging using Blockchain

13. Securing Connected Vehicle Applications with an Efficient Dual Cyber- Physical Blockchain Framework

14. MSS: Lightweight network authentication for resource constrained devices via Mergeable Stateful Signatures

15. BlockMaestro: Enabling Programmer-Transparent Task-based Execution in GPU Systems

16. PDES-A

17. How the spectre and meltdown hacks really worked

18. SDSense: An Agile and Flexible SDN-Based Framework for Wireless Sensor Networks

19. Defensive approximation: securing CNNs using approximate computing

20. BOW: Breathing Operand Windows to Exploit Bypassing in GPUs

21. PerSpectron: Detecting Invariant Footprints of Microarchitectural Attacks with Perceptron

22. GraphPulse: An Event-Driven Hardware Accelerator for Asynchronous Graph Processing

23. Leaky Buddies: Cross-Component Covert Channels on Integrated CPU-GPU Systems

24. Flexible Hardware-Managed Isolated Execution: Architecture, Software Support and Applications

25. Covert Channels on GPGPUs

26. LATCH

27. GPUGuard

28. PAPP

29. CORF

30. Collaborative Client-Side DNS Cache Poisoning Attack

31. SPECCFI: Mitigating Spectre Attacks using CFI Informed Speculation

33. Hardware-Based Malware Detection Using Low-Level Architectural Features

34. Efficient and Consistent Path Loss Model for Mobile Network Simulation

35. Understanding and Mitigating Covert Channels Through Branch Predictors

36. Wireless Software Defined Networking: A Survey and Taxonomy

37. Rethinking Memory Permissions for Protection Against Cross-Layer Attacks

38. Side Channel Attacks on GPUs

39. Rendered Insecure

41. In-Register Parameter Caching for Dynamic Neural Nets with Virtual Persistent Processor Specialization

42. SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free Speculation

43. AIR

45. Constructing and characterizing covert channels on GPGPUs

46. RHMD

47. RIC

48. Performance Characterization of Parallel Discrete Event Simulation on Knights Landing Processor

49. PDES-A

50. Interaction Engineering: Achieving Perfect CSMA Handshakes in Wireless Networks

Catalog

Books, media, physical & digital resources