Personal Information
Organización/Lugar de trabajo
Lebanon Lebanon
Ocupación
Computer Scientist - Cyberspace Engineering and Defense
Acerca de
I am a research scientist working on world class cyber-security research and cutting-edge technology. I had research grants from US Air Force Research Laboratory, Nevada NASA Space and National Security Agency (NSA) Information Assurance and European Union.
I am fortunate to have had the opportunity to work with academic scientists from Princeton University, MIT and Rutgers University and University of Oxford. I collaborated as well with industrial research engineers from Orange Labs in France, Nokia Bell labs and Honeywell Inc ACS Labs.
I published my research findings in scientific journals and conferences such as IEEE Communications Magazine journal (top 1 Journal in Computer Ne...
Etiquetas
game theory
testing
wireless security
dos
jamming
evaluation
countermeasures
transport protocol
internet
ddos
learning networking
computer networks
denialofservice
cybersecurity
tcp
telecommunication security
computer crime
ip networks
distributed denial of service attack
distributed processing
cyber attacks
Ver más
Personal Information
Organización/Lugar de trabajo
Lebanon Lebanon
Ocupación
Computer Scientist - Cyberspace Engineering and Defense
Acerca de
I am a research scientist working on world class cyber-security research and cutting-edge technology. I had research grants from US Air Force Research Laboratory, Nevada NASA Space and National Security Agency (NSA) Information Assurance and European Union.
I am fortunate to have had the opportunity to work with academic scientists from Princeton University, MIT and Rutgers University and University of Oxford. I collaborated as well with industrial research engineers from Orange Labs in France, Nokia Bell labs and Honeywell Inc ACS Labs.
I published my research findings in scientific journals and conferences such as IEEE Communications Magazine journal (top 1 Journal in Computer Ne...
Etiquetas
game theory
testing
wireless security
dos
jamming
evaluation
countermeasures
transport protocol
internet
ddos
learning networking
computer networks
denialofservice
cybersecurity
tcp
telecommunication security
computer crime
ip networks
distributed denial of service attack
distributed processing
cyber attacks
Ver más