Guevara Noubir
Guevara Noubir
Professor of Computer Science, Northeastern University
Verified email at ccs.neu.edu
Title
Cited by
Cited by
Year
Mobility models for ad hoc network simulation
G Lin, G Noubir, R Rajaraman
IEEE INFOCOM 2004. Twenty-third Annual Joint Conference of the IEEE Computer …, 2004
3172004
Performance of IEEE 802.11 under jamming
E Bayraktaroglu, C King, X Liu, G Noubir, R Rajaraman, B Thapa
Mobile Networks and Applications 18 (5), 678-696, 2013
2662013
Low-power DoS attacks in data wireless LANs and countermeasures
G Noubir, G Lin
ACM SIGMOBILE Mobile Computing and Communications Review 7 (3), 29-30, 2003
2412003
On link layer denial of service in data wireless LANs
G Lin, G Noubir
Wireless Communications and Mobile Computing 5 (3), 273-284, 2005
1582005
Application-awareness in SDN
ZA Qazi, J Lee, T Jin, G Bellala, M Arndt, G Noubir
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM, 487-488, 2013
1542013
Broadcast control channel jamming: Resilience and identification of traitors
A Chan, X Liu, G Noubir, B Thapa
2007 IEEE International Symposium on Information Theory, 2496-2500, 2007
1322007
Secure multicast groups on ad hoc networks
T Kaya, G Lin, G Noubir, A Yilmaz
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor …, 2003
1322003
On connectivity in ad hoc networks under jamming using directional antennas and mobility
G Noubir
International Conference on Wired/Wireless Internet Communications, 186-200, 2004
1262004
Inferring user routes and locations using zero-permission mobile sensors
S Narain, TD Vo-Huu, K Block, G Noubir
2016 IEEE Symposium on Security and Privacy (SP), 397-413, 2016
1042016
Spread: Foiling smart jammers using multi-layer agility
X Liu, G Noubir, R Sundaram, S Tan
IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007
1032007
Wizi-cloud: Application-transparent dual zigbee-wifi radios for low power internet access
T Jin, G Noubir, B Sheng
2011 Proceedings IEEE INFOCOM, 1593-1601, 2011
1022011
Universal approximations for TSP, Steiner tree, and set cover
L Jia, G Lin, G Noubir, R Rajaraman, R Sundaram
Proceedings of the thirty-seventh annual ACM symposium on Theory of …, 2005
872005
Hierarchy-based access control in distributed environments
JC Birget, X Zou, G Noubir, B Ramamurthy
ICC 2001. IEEE International Conference on Communications. Conference Record …, 2001
822001
Zero pre-shared secret key establishment in the presence of jammers
T Jin, G Noubir, B Thapa
Proceedings of the tenth ACM international symposium on Mobile ad hoc …, 2009
712009
On the computation of local interchangeability in discrete constraint satisfaction problems
BY Choueiry, G Noubir
AAAI/IAAI, 326-333, 1998
681998
Linear programming models for jamming attacks on network traffic flows
P Tague, D Slater, R Poovendran, G Noubir
2008 6th International Symposium on Modeling and Optimization in Mobile, Ad …, 2008
672008
Static and dynamic polling mechanisms for fieldbus networks
P Raja, G Noubir
ACM SIGOPS Operating Systems Review 27 (3), 34-45, 1993
661993
On the robustness of IEEE 802.11 rate adaptation algorithms against smart jamming
G Noubir, R Rajaraman, B Sheng, B Thapa
Proceedings of the fourth ACM conference on Wireless network security, 97-108, 2011
652011
Abstraction methods for resource allocation
BY Choueiry, B Faltings, G Noubir
Verlag nicht ermittelbar, 1994
631994
A Practical, Targeted, and Stealthy Attack Against WPA Enterprise Authentication.
A Cassola, WK Robertson, E Kirda, G Noubir
NDSS, 2013
612013
The system can't perform the operation now. Try again later.
Articles 1–20