Khaled Abdel Harfoush Almutairi, S., Neumann, Y., & Harfoush, K. (2024). Fingerprinting VPNs with Custom Router Firmware: A New Censorship Threat Model. 2024 IEEE 21ST CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, pp. 976–981. https://doi.org/10.1109/CCNC51664.2024.10454833 Tenneti, S., Jakhar, R., & Harfoush, K. (2024). Reactive Jamming of the Helium Network. 2024 IEEE 21ST CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, pp. 296–301. https://doi.org/10.1109/CCNC51664.2024.10454757 Cunha, B. V., Li, X., Wilson, W., & Harfoush, K. (2023). Performance Benchmarking of the QUIC Transport Protocol. 2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC. https://doi.org/10.1109/CCNC51644.2023.10060785 Wu, Z., Fan, X., & Harfoush, K. (2022). Measurement-Driven Flow Selection for Open vSwitch Offload. IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), pp. 3635–3640. https://doi.org/10.1109/ICC45855.2022.9838661 Huang, C., Tay, Z. H., & Harfoush, K. (2021). MASS Communication for Constrained Devices. 30TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2021). https://doi.org/10.1109/ICCCN52240.2021.9522167 Amos-Binks, A., Clark, J., Weston, K., Winters, M., & Harfoush, K. (2017). Efficient attack plan recognition using automated planning. 2017 ieee symposium on computers and communications (iscc), 1001–1006. https://doi.org/10.1109/iscc.2017.8024656 Carpenter, S. E., & Harfoush, K. (2017). SafeRelay: Improving safety in the time-constrained VANET with geoaddresing relay. 2017 IEEE International Conference on Vehicular Electronics and Safety (ICVES), 44–50. https://doi.org/10.1109/icves.2017.7991899 Xiong, H., Gong, F. Y., Qu, L., Du, C. L., & Harfoush, K. (2015). CSI-based device-free gesture detection. 2015 12th International Conference on High-Capacity Optical Networks and Enabling/Emerging Technologies (HONET), 122–126. Lapo, R. A., Gogny, M., Chatagnon, G., Lalanne, V., Harfoush, K., Assane, M., … Mallem, M. Y. (2014). Equine digital veins are more sensitive to superoxide anions than digital arteries. European Journal of Pharmacology, 740, 66–71. https://doi.org/10.1016/J.EJPHAR.2014.06.016 Ma, X. Z., & Harfoush, K. (2013). On the efficacy of WDM virtual topology design strategies. 2013 international conference on computing, networking and communications (icnc). https://doi.org/10.1109/iccnc.2013.6504115 Chaudhry, M., Malibiradar, P., Mathur, V., Chugh, R., & Harfoush, K. (2013). Performance analysis of iSCSI with data center bridging suite of protocols. 2013 10th International Conference on High Capacity Optical Networks and Enabling Technologies (HONET-CNS), 179–183. https://doi.org/10.1109/honet.2013.6729782 Hussain, S. R., Odeh, A., Shivakumar, A., Chauhan, S., & Harfoush, K. (2013). Real-time traffic congestion management and deadlock avoidance for vehicular ad hoc networks. 2013 10th International Conference on High Capacity Optical Networks and Enabling Technologies (HONET-CNS), 223–227. https://doi.org/10.1109/honet.2013.6729791 Guo, L., Harfoush, K., & Xu, H. (2012). An Analytical Model for the Node Degree in Wireless Ad Hoc Networks. WIRELESS PERSONAL COMMUNICATIONS, 66(2), 291–306. https://doi.org/10.1007/s11277-011-0339-y Castillo, C., Rouskas, G. N., & Harfoush, K. (2011). Online algorithms for advance resource reservations. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 71(7), 963–973. https://doi.org/10.1016/j.jpdc.2011.01.003 Harfoush, K., Bestavros, A., & Byers, J. (2009). Measuring Capacity Bandwidth of Targeted Path Segments. IEEE-ACM TRANSACTIONS ON NETWORKING, 17(1), 80–92. https://doi.org/10.1109/TNET.2008.2008702 Ma, X., Kim, S., & Harfoush, K. (2009). Towards Realistic Physical Topology Models for Internet Backbone Networks. 2009 6TH INTERNATIONAL SYMPOSIUM ON HIGH CAPACITY OPTICAL NETWORKS AND ENABLING TECHNOLOGIES (HONET 2009), pp. 36–42. https://doi.org/10.1109/honet.2009.5423064 Wang, C.-C., & Harfoush, K. (2008). Shortest-path routing in randomized DHT-based Peer-to-Peer systems. COMPUTER NETWORKS, 52(18), 3307–3317. https://doi.org/10.1016/j.comnet.2008.07.014 Neginhal, M., Harfoush, K., & Perros, H. (2007). Measuring Bandwidth Signatures of Network Paths. In I. F. Akyildiz, R. Sivakumar, E. Ekici, J. C. Oliveira, & J. McNair (Eds.), NETWORKING 2007. Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet (pp. 1072–1083). https://doi.org/10.1007/978-3-540-72606-7_92 Bestavros, A., Byers, J. W., & Harfoush, K. A. (2005). Inference and labeling of metric-induced network topologies. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 16(11), 1053–1065. https://doi.org/10.1109/tpds.2005.138