Khaled Abdel Hamid Harfoush

Works (19)

Updated: April 16th, 2024 05:03

2024 article

Fingerprinting VPNs with Custom Router Firmware: A New Censorship Threat Model

2024 IEEE 21ST CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, pp. 976–981.

By: S. Almutairi n, Y. Neumann n & K. Harfoush n

author keywords: Virtual Private Networks; Traffic Fingerprinting; Censorship
Source: Web Of Science
Added: April 15, 2024

2024 article

Reactive Jamming of the Helium Network

2024 IEEE 21ST CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, pp. 296–301.

By: S. Tenneti n, R. Jakhar n & K. Harfoush n

author keywords: Internet of Things; LoRaWAN; Jamming Attacks
Source: Web Of Science
Added: April 15, 2024

2023 article

Performance Benchmarking of the QUIC Transport Protocol

2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC.

By: B. Cunha n, X. Li n, W. Wilson n & K. Harfoush n

author keywords: Hypertext Transfer Protocol (HTTP) versions 2/3; QUIC; Transport Protocols
TL;DR: A thorough investigation of QUIC under different network and workload conditions, both in a controlled environment and in the wild is conducted to provide a foundation for an educated choice of the transport protocol based on the constraints and needs of a specific use case. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: June 5, 2023

2022 article

Measurement-Driven Flow Selection for Open vSwitch Offload

IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), pp. 3635–3640.

By: Z. Wu*, X. Fan* & K. Harfoush n

author keywords: Open vSwitch; Software Defined Networking; Next Generation Networking; Network Function Virtualization
TL;DR: Experimental results reveal that MEG outperforms other offload algorithms and traditional OVS, and a new algorithm to select flow candidates for offload that minimizes the offload cost while maintaining a high hardware cache hit ratio. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: December 12, 2022

2021 article

MASS Communication for Constrained Devices

30TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2021).

By: C. Huang*, Z. Tay* & K. Harfoush n

author keywords: Direct-Sequence Spread Spectrum; M-ary Spreading Code; Multiple Channel Access
TL;DR: MASS is uncoordinated in the sense that it does not need expensive coordination or complex hardware for the constrained sensors, and its multi-access solution leads to higher throughput and longer lifetimes for constrained IoT devices compared to typical contention-based media access protocols. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: October 26, 2021

2017 conference paper

Efficient attack plan recognition using automated planning

2017 ieee symposium on computers and communications (iscc), 1001–1006.

By: A. Amos-Binks n, J. Clark n, K. Weston n, M. Winters n & K. Harfoush n

TL;DR: This paper uses automated planning to capture new properties of attack graphs and use it for plan recognition, and experimental results demonstrate the efficacy of this approach. (via Semantic Scholar)
UN Sustainable Development Goal Categories
11. Sustainable Cities and Communities (OpenAlex)
Source: NC State University Libraries
Added: August 6, 2018

2017 conference paper

SafeRelay: Improving safety in the time-constrained VANET with geoaddresing relay

2017 IEEE International Conference on Vehicular Electronics and Safety (ICVES), 44–50.

By: S. Carpenter n & K. Harfoush n

TL;DR: SafeRelay is proposed, a flooding-based message dissemination technique that relays safety messages within a geographically addressed forwarding zone (FZ) that can significantly improve safety awareness using moderately-sized nearby forwarding zones. (via Semantic Scholar)
UN Sustainable Development Goal Categories
11. Sustainable Cities and Communities (OpenAlex)
Source: NC State University Libraries
Added: August 6, 2018

2015 conference paper

CSI-based device-free gesture detection

2015 12th International Conference on High-Capacity Optical Networks and Enabling/Emerging Technologies (HONET), 122–126.

By: H. Xiong, F. Gong, L. Qu, C. Du & K. Harfoush

Source: NC State University Libraries
Added: August 6, 2018

2014 journal article

Equine digital veins are more sensitive to superoxide anions than digital arteries

European Journal of Pharmacology, 740, 66–71.

By: R. Lapo*, M. Gogny*, G. Chatagnon*, V. Lalanne*, K. Harfoush*, M. Assane*, J. Desfontis*, M. Mallem*

author keywords: EDVs; EDAs; Vasorelaxation; Superoxide anions; Endothelium
MeSH headings : Acetylcholine / pharmacology; Animals; Arteries / physiology; Ditiocarb / pharmacology; Forelimb; Horses; In Vitro Techniques; Phenylephrine / pharmacology; Superoxides / antagonists & inhibitors; Superoxides / metabolism; Vasoconstrictor Agents / pharmacology; Vasodilation / drug effects; Vasodilator Agents / pharmacology; Veins / physiology
TL;DR: It is concluded that due to the lower activity of SOD, EDVs are more sensitive to superoxide anions than EDAs, so any alteration of superoxideAnions metabolism is likely to have a more important impact on venous rather than arterial relaxation. (via Semantic Scholar)
Source: Crossref
Added: February 24, 2020

2013 conference paper

On the efficacy of WDM virtual topology design strategies

2013 international conference on computing, networking and communications (icnc).

By: X. Ma n & K. Harfoush n

TL;DR: A novel algorithm to determine a network bottleneck based on the 1) physical topology, 2) traffic demand and 3) technology constraints, and a topology model leading to optimized network throughput is introduced. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2013 conference paper

Performance analysis of iSCSI with data center bridging suite of protocols

2013 10th International Conference on High Capacity Optical Networks and Enabling Technologies (HONET-CNS), 179–183.

By: M. Chaudhry n, P. Malibiradar n, V. Mathur n, R. Chugh n & K. Harfoush n

TL;DR: The benefits of running i SCSI over DCB enhanced Ethernet as compared to iSCSI over traditional Ethernet to overcome its performance limitations are investigated. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2013 conference paper

Real-time traffic congestion management and deadlock avoidance for vehicular ad hoc networks

2013 10th International Conference on High Capacity Optical Networks and Enabling Technologies (HONET-CNS), 223–227.

By: S. Hussain n, A. Odeh n, A. Shivakumar n, S. Chauhan n & K. Harfoush n

TL;DR: A novel protocol to guide vehicles to their destinations while managing congestion and avoiding deadlock situations in urban city grids is introduced and results reveal that vehicles enjoy reduced travel times even during rush hours and in the presence of collisions. (via Semantic Scholar)
Source: NC State University Libraries
Added: August 6, 2018

2012 journal article

An Analytical Model for the Node Degree in Wireless Ad Hoc Networks

WIRELESS PERSONAL COMMUNICATIONS, 66(2), 291–306.

By: L. Guo*, K. Harfoush n & H. Xu*

author keywords: Ad hoc networks; Shadow fading; Link probability; Maximum node degree; Node degree distribution
TL;DR: A novel mathematical model is introduced to derive analytical expressions in the presence of radio channel fading that reveals that the node degree distribution follows a binomial distribution regardless of the initial distribution of nodes’ location. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2011 journal article

Online algorithms for advance resource reservations

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 71(7), 963–973.

By: C. Castillo*, G. Rouskas n & K. Harfoush n

Contributors: C. Castillo*, K. Harfoush n & G. Rouskas n

author keywords: Grid computing; Advance reservations; Scheduling; Resource allocation; Resource management
TL;DR: This work uses concepts from computational geometry to present a framework for tackling the resource fragmentation, and for formulating a suite of scheduling strategies, and develops efficient implementations of the scheduling algorithms that scale to large Grids. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Sources: Web Of Science, ORCID
Added: August 6, 2018

2009 journal article

Measuring Capacity Bandwidth of Targeted Path Segments

IEEE-ACM TRANSACTIONS ON NETWORKING, 17(1), 80–92.

By: K. Harfoush n, A. Bestavros* & J. Byers*

author keywords: Bottleneck bandwidth; content distribution; end-to-end measurement; overlay networks; packet-pair
TL;DR: End-to-end probing methods which can measure bottleneck capacity bandwidth along arbitrary, targeted sub paths of a path in the network, including subpaths shared by a set of flows are developed. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2009 article

Towards Realistic Physical Topology Models for Internet Backbone Networks

2009 6TH INTERNATIONAL SYMPOSIUM ON HIGH CAPACITY OPTICAL NETWORKS AND ENABLING TECHNOLOGIES (HONET 2009), pp. 36–42.

By: X. Ma n, S. Kim n & K. Harfoush n

author keywords: Optical backbone networks; physical topology; problem formulation; optimization; topology model
TL;DR: The driving forces for service providers to layout fiber links are explored, a polynomial time heuristic algorithm, HINT, is presented, and a new problem formulation is proposed that can accurately emulate the existing optical backbone networks. (via Semantic Scholar)
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2008 journal article

Shortest-path routing in randomized DHT-based Peer-to-Peer systems

COMPUTER NETWORKS, 52(18), 3307–3317.

By: C. Wang n & K. Harfoush n

author keywords: Distributed hash tables; Randomized networks; Shortest-path routing
TL;DR: A novel routing protocol, RASTER, that approximates shortest overlay routes between nodes in randomized DHTs and provides a forwarding overhead of merely a small constant number of bitwise operations, a routing performance close to optimal, and a better resilience to churn. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2007 chapter

Measuring Bandwidth Signatures of Network Paths

In I. F. Akyildiz, R. Sivakumar, E. Ekici, J. C. Oliveira, & J. McNair (Eds.), NETWORKING 2007. Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet (pp. 1072–1083).

By: M. Neginhal n, K. Harfoush n & H. Perros n

Ed(s): I. Akyildiz, R. Sivakumar, E. Ekici, J. Oliveira & J. McNair

TL;DR: A practical and efficient technique, Forecaster, to estimate (1) the end-to-end available bandwidth, and (2) the speed of the most congested link along an Internet path, thus avoiding path saturation. (via Semantic Scholar)
Source: Crossref
Added: August 28, 2020

2005 journal article

Inference and labeling of metric-induced network topologies

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 16(11), 1053–1065.

By: A. Bestavros*, J. Byers* & K. Harfoush n

author keywords: end-to-end measurement; packet-pair probing; Bayesian probing; Internet tomography; performance evaluation
TL;DR: The basic theoretical underpinnings of MINT are presented, a general framework for the construction of metric-induced models using end-to-end measurements are proposed, and PERISCOPE, a Linux embodiment of MINT constructions are described. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.