Select Publications
Book Chapters
2024, 'Network Anatomy and Real-Time Measurement of Nvidia GeForce NOW Cloud Gaming', in , pp. 61 - 91, http://dx.doi.org/10.1007/978-3-031-56249-5_3
,2021, 'Cyber-securing IoT infrastructure by modeling network traffic', in Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications, pp. 151 - 176, http://dx.doi.org/10.1002/9781119607755.ch6
,2021, 'Software-defined multi-domain tactical networks: Foundations and future directions', in Mobile Edge Computing, pp. 183 - 277, http://dx.doi.org/10.1007/978-3-030-69893-5_9
,2015, 'Privacy in Crowdsourced Platforms', in Zeadally S; Badra M (ed.), Privacy in a Digital, Networked World Technologies, Implications and Solutions, Springer, pp. 57 - 84
,, 2011, 'Network and Medium Access Control Protocol Design for Wireless Body Area Networks', in Wireless Body Area Networks, Jenny Stanford Publishing, pp. 279 - 314, http://dx.doi.org/10.1201/b11522-11
, 2011, 'Power Management in Body Area Networks for Health Care Applications', in Wireless Body Area Networks, Jenny Stanford Publishing, pp. 315 - 342, http://dx.doi.org/10.1201/b11522-12
2011, 'Routers and Networks with Near-Zero Buffers', in Morris JE (ed.), Computer Science Research and the Internet, NOVA Science Publisher, pp. 1 - 44, http://www2.ee.unsw.edu.au/~vijay/pubs/chapters/SmallBuffer.pdf
,2006, 'Network Mobility', in Zhang Y; Hu H; Fujise M (ed.), Resource, Mobility, and Security Management in Wireless Networks and Mobile Communications, Auerbach Press, New York, pp. 417 - 441
,Journal articles
2024, 'MetaVRadar: Measuring Metaverse Virtual Reality Network Activity', Performance Evaluation Review, 52, pp. 11 - 12, http://dx.doi.org/10.1145/3673660.3655065
,2024, 'A Survey on Enterprise Network Security: Asset Behavioral Monitoring and Distributed Attack Detection', IEEE Access, 12, pp. 89363 - 89383, http://dx.doi.org/10.1109/ACCESS.2024.3419068
,2023, 'MetaVRadar: Measuring Metaverse Virtual Reality Network Activity', Proceedings of the ACM on Measurement and Analysis of Computing Systems, 7, http://dx.doi.org/10.1145/3626786
,2023, 'Enterprise DNS Asset Mapping and Cyber-Health Tracking via Passive Traffic Analysis', IEEE Transactions on Network and Service Management, 20, pp. 3699 - 3716, http://dx.doi.org/10.1109/TNSM.2022.3221981
,2023, 'PEDDA: Practical and Effective Detection of Distributed Attacks on enterprise networks via progressive multi-stage inference', Computer Networks, 233, http://dx.doi.org/10.1016/j.comnet.2023.109873
,2023, 'A Survey on DNS Encryption: Current Development, Malware Misuse, and Inference Techniques', ACM Computing Surveys, 55, http://dx.doi.org/10.1145/3547331
,2022, 'Classifying and tracking enterprise assets via dual-grained network behavioral analysis', Computer Networks, 218, http://dx.doi.org/10.1016/j.comnet.2022.109387
,2022, 'Combining Device Behavioral Models and Building Schema for Cybersecurity of Large-Scale IoT Infrastructure', IEEE Internet of Things Journal, 9, pp. 24174 - 24185, http://dx.doi.org/10.1109/JIOT.2022.3189350
,2022, 'Estimating Passenger Queue for Bus Resource Optimization Using LoRaWAN-Enabled Ultrasonic Sensors', IEEE Systems Journal, 16, pp. 6265 - 6276, http://dx.doi.org/10.1109/JSYST.2022.3159577
,2022, 'Understanding and Reducing HVAC Power Consumption Post-Evacuation Events in Commercial Buildings', IEEE Internet of Things Journal, 9, pp. 17235 - 17248, http://dx.doi.org/10.1109/JIOT.2022.3152138
,2022, 'Modeling Classroom Occupancy Using Data of WiFi Infrastructure in a University Campus', IEEE Sensors Journal, 22, pp. 9981 - 9996, http://dx.doi.org/10.1109/JSEN.2022.3165138
,2022, 'Monetizing Parking IoT Data via Demand Prediction and Optimal Space Sharing', IEEE Internet of Things Journal, 9, pp. 5629 - 5644, http://dx.doi.org/10.1109/JIOT.2020.3044900
,2022, 'Automatic Detection of DGA-Enabled Malware Using SDN and Traffic Behavioral Modeling', IEEE Transactions on Network Science and Engineering, 9, pp. 2922 - 2939, http://dx.doi.org/10.1109/TNSE.2022.3173591
,2022, 'Verifying and Monitoring IoTs Network Behavior Using MUD Profiles', IEEE Transactions on Dependable and Secure Computing, 19, pp. 1 - 18, http://dx.doi.org/10.1109/TDSC.2020.2997898
,2021, 'Optimal Witnessing of Healthcare IoT Data Using Blockchain Logging Contract', IEEE Internet of Things Journal, 8, pp. 10117 - 10130, http://dx.doi.org/10.1109/JIOT.2021.3051433
,2021, 'Hierarchical Anomaly-Based Detection of Distributed DNS Attacks on Enterprise Networks', IEEE Transactions on Network and Service Management, 18, pp. 1031 - 1048, http://dx.doi.org/10.1109/TNSM.2021.3050091
,2021, 'Secure Opportunistic Contextual Logging for Wearable Healthcare Sensing Devices', IEEE Transactions on Dependable and Secure Computing, 18, pp. 753 - 764, http://dx.doi.org/10.1109/TDSC.2019.2927674
,2020, 'Forensic Verification of Health Data from Wearable Devices Using Anonymous Witnesses', IEEE Internet of Things Journal, 7, pp. 10745 - 10762, http://dx.doi.org/10.1109/JIOT.2020.2982958
,2020, 'Detecting Behavioral Change of IoT Devices Using Clustering-Based Network Traffic Modeling', IEEE Internet of Things Journal, 7, pp. 7295 - 7309, http://dx.doi.org/10.1109/JIOT.2020.2984030
,2020, 'Managing IoT Cyber-Security Using Programmable Telemetry and Machine Learning', IEEE Transactions on Network and Service Management, 17, pp. 60 - 74, http://dx.doi.org/10.1109/TNSM.2020.2971213
,2019, 'Enhancing Security Management at Software-Defined Exchange Points', IEEE Transactions on Network and Service Management, 16, pp. 1479 - 1492, http://dx.doi.org/10.1109/TNSM.2019.2944368
,2019, 'Experiences with IoT and AI in a Smart Campus for Optimizing Classroom Usage', IEEE Internet of Things Journal, 6, pp. 7595 - 7607, http://dx.doi.org/10.1109/JIOT.2019.2902410
,2019, 'iTeleScope: Softwarized Network Middle-Box for Real-Time Video Telemetry and Classification', IEEE Transactions on Network and Service Management, 16, pp. 1071 - 1085, http://dx.doi.org/10.1109/TNSM.2019.2929511
,2019, 'Classifying IoT Devices in Smart Environments Using Network Traffic Characteristics', IEEE Transactions on Mobile Computing, 18, pp. 1745 - 1759, http://dx.doi.org/10.1109/TMC.2018.2866249
,2019, 'Network-level security for the internet of things: Opportunities and challenges', Computer, 52, pp. 58 - 62, http://dx.doi.org/10.1109/MC.2019.2917972
,2019, 'Monitoring Enterprise DNS Queries for Detecting Data Exfiltration from Internal Hosts', IEEE Transactions on Network and Service Management, 17, http://dx.doi.org/10.1109/TNSM.2019.2940735
,2018, 'Responsive high throughput congestion control for interactive applications over SDN-enabled networks', Computer Networks, 134, pp. 152 - 166, http://dx.doi.org/10.1016/j.comnet.2018.01.043
,2018, 'Smart IoT devices in the home: Security and Privacy Implications', IEEE Technology and Society Magazine, 37, pp. 71 - 79, http://dx.doi.org/10.1109/MTS.2018.2826079
,2017, 'Enabling fast and slow lanes for content providers using software defined networking', IEEE/ACM Transactions on Networking, 25, pp. 1373 - 1385, http://dx.doi.org/10.1109/TNET.2016.2627005
,2017, 'HazeEst: Machine Learning Based Metropolitan Air Pollution Estimation from Fixed and Mobile Sensors', IEEE Sensors Journal, 17, pp. 3517 - 3525, http://dx.doi.org/10.1109/JSEN.2017.2690975
,2016, 'Greening Router Line-Cards via Dynamic Management of Packet Memory', IEEE Journal on Selected Areas in Communications, 34, pp. 3843 - 3853, http://dx.doi.org/10.1109/JSAC.2016.2600412
,2016, 'SDN APIs and Models for Two-Sided Resource Management in Broadband Access Networks', IEEE Transactions on Network and Service Management, 13, pp. 823 - 834, http://dx.doi.org/10.1109/TNSM.2016.2615067
,2016, 'An economic model for a new broadband ecosystem based on fast and slow lanes', IEEE Network, 30, pp. 26 - 31, http://dx.doi.org/10.1109/MNET.2016.7437021
,2016, 'Perspectives on net neutrality and Internet fast-lanes', Computer Communication Review, 46, pp. 64 - 69, http://dx.doi.org/10.1145/2875951.2875962
,2015, 'A Survey of Securing Networks Using Software Defined Networking', IEEE Transactions on Reliability, 64, pp. 1086 - 1097, http://dx.doi.org/10.1109/TR.2015.2421391
,2015, 'Greening residential Wi-Fi networks under centralized control', IEEE Transactions on Mobile Computing, 14, pp. 552 - 564, http://dx.doi.org/10.1109/TMC.2014.2324582
,2015, 'Comparing edge and host traffic pacing in small buffer networks', Computer Networks, 77, pp. 103 - 116, http://dx.doi.org/10.1016/j.comnet.2014.11.021
,2015, 'Bringing cohort studies to the bedside: framework for a ‘green button’to support clinical decision-making', Journal of comparative effectiveness research, 4, pp. 191 - 197
,2015, 'Design and evaluation of a metropolitan air pollution sensing system', IEEE Sensors Journal, 16, pp. 1448 - 1459
,2015, 'It’s only the beginning: Metadata Retention laws and the Internet of Things', Australian Journal of Telecommunications and the Digital Economy, 3, pp. 47 - 57, http://dx.doi.org/10.18080/ajtde.v3n3.21
,2014, 'Eliminating reconciliation cost in secret key generation for body-worn health monitoring devices', IEEE Transactions on Mobile Computing, 13, pp. 2763 - 2776, http://dx.doi.org/10.1109/TMC.2013.71
,2014, 'Securing first-hop data provenance for bodyworn devices using wireless link fingerprints', IEEE Transactions on Information Forensics and Security, 9, pp. 2193 - 2204, http://dx.doi.org/10.1109/TIFS.2014.2357998
,