Nael Abu-Ghazaleh
Cited by
Cited by
A taxonomy of wireless micro-sensor network models
S Tilak, NB Abu-Ghazaleh, W Heinzelman
ACM SIGMOBILE Mobile Computing and Communications Review 6 (2), 28-36, 2002
Algorithms and protocols for wireless sensor networks
A Boukerche
Preemptive routing in ad hoc networks
T Goff, NB Abu-Ghazaleh, DS Phatak, R Kahvecioglu
Proceedings of the 7th annual international conference on Mobile computing …, 2001
Infrastructure tradeoffs for sensor networks
S Tilak, NB Abu-Ghazaleh, W Heinzelman
Proceedings of the 1st ACM international workshop on Wireless sensor …, 2002
Spectre returns! speculation attacks using the return stack buffer
EM Koruyeh, KN Khasawneh, C Song, N Abu-Ghazaleh
12th USENIX Workshop on Offensive Technologies (WOOT 18), 2018
Jump over ASLR: Attacking branch predictors to bypass ASLR
D Evtyushkin, D Ponomarev, N Abu-Ghazaleh
2016 49th Annual IEEE/ACM International Symposium on Microarchitecture …, 2016
Branchscope: A new side-channel attack on directional branch predictor
D Evtyushkin, R Riley, N Abu-Ghazaleh, D Ponomarev
Proc. ASPLOS 2018 53 (2), 693-707, 2018
Guide to wireless sensor networks
M Sudip, W Isaac, MS Chandra
Computer Communication and Network Series, Springer, London 2, 422-426, 2009
Automatic clustering for self-organizing grids
N Abu-Ghazaleh, W Yang, M Lewis
US Patent 8,041,773, 2011
Mobile, wireless, and sensor networks: technology, applications, and future directions
R Shorey, A Ananda, MC Chan, WT Ooi
John Wiley & Sons, 2006
Non-monopolizable caches: Low-complexity mitigation of cache side channel attacks
L Domnitser, A Jaleel, J Loew, N Abu-Ghazaleh, D Ponomarev
ACM Transactions on Architecture and Code Optimization (TACO) 8 (4), 1-21, 2012
Wireless software defined networking: A survey and taxonomy
IT Haque, N Abu-Ghazaleh
IEEE Communications Surveys & Tutorials 18 (4), 2713-2737, 2016
Guide to wireless ad hoc networks
S Misra, I Woungang, SC Misra
Springer Science & Business Media, 2009
Malware-aware processors: A framework for efficient online malware detection
M Ozsoy, C Donovick, I Gorelik, N Abu-Ghazaleh, D Ponomarev
2015 IEEE 21st International Symposium on High Performance Computer …, 2015
Rendered insecure: Gpu side channel attacks are practical
H Naghibijouybari, A Neupane, Z Qian, N Abu-Ghazaleh
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
GPS: a general peer-to-peer simulator and its use for modeling BitTorrent
W Yang, N Abu-Ghazaleh
13th IEEE International Symposium on Modeling, Analysis, and Simulation of …, 2005
A high-resolution side-channel attack on last-level cache
M Kayaalp, N Abu-Ghazaleh, D Ponomarev, A Jaleel
Proceedings of the 53rd Annual Design Automation Conference, 1-6, 2016
Safespec: Banishing the spectre of a meltdown with leakage-free speculation
KN Khasawneh, EM Koruyeh, C Song, D Evtyushkin, D Ponomarev, ...
2019 56th ACM/IEEE Design Automation Conference (DAC), 1-6, 2019
Location verification and trust management for resilient geographic routing
K Liu, N Abu-Ghazaleh, KD Kang
Journal of parallel and distributed computing 67 (2), 215-228, 2007
Branch regulation: Low-overhead protection from code reuse attacks
M Kayaalp, M Ozsoy, N Abu-Ghazaleh, D Ponomarev
ACM SIGARCH Computer Architecture News 40 (3), 94-105, 2012
The system can't perform the operation now. Try again later.
Articles 1–20