Nael Abu-Ghazaleh
Cited by
Cited by
A taxonomy of wireless micro-sensor network models
S Tilak, NB Abu-Ghazaleh, W Heinzelman
ACM SIGMOBILE Mobile Computing and Communications Review 6 (2), 28-36, 2002
Algorithms and protocols for wireless and mobile ad hoc networks
A Boukerche
John Wiley & Sons, 2008
Preemptive routing in ad hoc networks
T Goff, N Abu-Ghazaleh, D Phatak, R Kahvecioglu
Journal of Parallel and Distributed Computing 63 (2), 123-140, 2003
Infrastructure tradeoffs for sensor networks
S Tilak, NB Abu-Ghazaleh, W Heinzelman
Proceedings of the 1st ACM international workshop on Wireless sensor …, 2002
Mobile, wireless, and sensor networks: technology, applications, and future directions
R Shorey, A Ananda, MC Chan, WT Ooi
John Wiley & Sons, 2006
Automatic clustering for self-organizing grids
N Abu-Ghazaleh, W Yang, M Lewis
US Patent 8,041,773, 2011
Guide to wireless sensor networks
S Misra, I Woungang, SC Misra
Springer Science & Business Media, 2009
Jump over ASLR: Attacking branch predictors to bypass ASLR
D Evtyushkin, D Ponomarev, N Abu-Ghazaleh
2016 49th Annual IEEE/ACM International Symposium on Microarchitecture …, 2016
Non-monopolizable caches: Low-complexity mitigation of cache side channel attacks
L Domnitser, A Jaleel, J Loew, N Abu-Ghazaleh, D Ponomarev
ACM Transactions on Architecture and Code Optimization (TACO) 8 (4), 1-21, 2012
Wireless software defined networking: A survey and taxonomy
IT Haque, N Abu-Ghazaleh
IEEE Communications Surveys & Tutorials 18 (4), 2713-2737, 2016
Guide to wireless ad hoc networks
S Misra, I Woungang, SC Misra
Springer Science & Business Media, 2009
GPS: a general peer-to-peer simulator and its use for modeling BitTorrent
W Yang, N Abu-Ghazaleh
13th IEEE International Symposium on Modeling, Analysis, and Simulation of …, 2005
Spectre returns! speculation attacks using the return stack buffer
EM Koruyeh, KN Khasawneh, C Song, N Abu-Ghazaleh
12th {USENIX} Workshop on Offensive Technologies ({WOOT} 18), 2018
Branchscope: A new side-channel attack on directional branch predictor
D Evtyushkin, R Riley, NCSEECE Abu-Ghazaleh, D Ponomarev
ACM SIGPLAN Notices 53 (2), 693-707, 2018
Dynamic localization control for mobile sensor networks
S Tilak, V Kolar, NB Abu-Ghazaleh, KD Kang
PCCC 2005. 24th IEEE International Performance, Computing, and …, 2005
Location verification and trust management for resilient geographic routing
K Liu, N Abu-Ghazaleh, KD Kang
Journal of parallel and distributed computing 67 (2), 215-228, 2007
Malware-aware processors: A framework for efficient online malware detection
M Ozsoy, C Donovick, I Gorelik, N Abu-Ghazaleh, D Ponomarev
2015 IEEE 21st International Symposium on High Performance Computer …, 2015
Branch regulation: Low-overhead protection from code reuse attacks
M Kayaalp, M Ozsoy, N Abu-Ghazaleh, D Ponomarev
ACM SIGARCH Computer Architecture News 40 (3), 94-105, 2012
A high-resolution side-channel attack on last-level cache
M Kayaalp, N Abu-Ghazaleh, D Ponomarev, A Jaleel
Proceedings of the 53rd Annual Design Automation Conference, 1-6, 2016
Iso-x: A flexible architecture for hardware-managed isolated execution
D Evtyushkin, J Elwell, M Ozsoy, D Ponomarev, NA Ghazaleh, R Riley
2014 47th Annual IEEE/ACM International Symposium on Microarchitecture, 190-202, 2014
The system can't perform the operation now. Try again later.
Articles 1–20