{"id":35,"date":"2022-09-19T12:12:22","date_gmt":"2022-09-19T16:12:22","guid":{"rendered":"https:\/\/carleton.ca\/ngn\/?page_id=35"},"modified":"2026-02-06T16:07:33","modified_gmt":"2026-02-06T21:07:33","slug":"publications","status":"publish","type":"page","link":"https:\/\/carleton.ca\/ngn\/publications\/","title":{"rendered":"Publications"},"content":{"rendered":"<h2><span data-olk-copy-source=\"MessageBody\">Keynotes by Prof. Matrawy<\/span><\/h2>\n<p><strong>2025: The 9th International Conference on Advanced Machine Learning Technologies and Applications,<br \/>\n<\/strong><em>AMLTA 2025, Cairo, Egypt, Remote presentation<\/em><\/p>\n<ul>\n<li>Using Machine Learning in Network Security: A New Investigation of Adversarial Evasion Attacks. <a href=\"https:\/\/egyptscience-srge.com\/AMLTA25\/programme-2.html\">Conference Link<\/a>, <a href=\"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/AMLTA2025.pdf\">Presentation Link<\/a><\/li>\n<\/ul>\n<p><strong>2024: The International Conference on the Design of Reliable Communication Networks,<br \/>\n<\/strong><em>DRCN, Montreal, Canada<\/em><\/p>\n<ul>\n<li>Using Machine Learning in Network Security: A New Investigation of Adversarial Evasion Attacks. <a href=\"https:\/\/drcn2024.encs.concordia.ca\/program\/keynotes\/\">Conference Link<\/a>, <a href=\"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/Matrawy_DRCN2024_Keynote.pdf\">Presentation Link<\/a><\/li>\n<\/ul>\n<h2><span data-olk-copy-source=\"MessageBody\">Invited Talks by Prof. Matrawy<\/span><\/h2>\n<p><strong>2024: IEEE 10th World Forum on Internet of Things,<br \/>\n<\/strong><em>Ottawa, Canada<\/em><\/p>\n<ul>\n<li><span data-olk-copy-source=\"MessageBody\">An Experimental Investigation of Tuning QUIC-Based Pub-Sub Architectures in IoT<\/span>. <a href=\"https:\/\/can01.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fwfiot2024.iot.ieee.org%2F%3Futm_medium%3Demail%26utm_source%3Dmarketo%26utm_campaign%3Dwf-iot_2024%26utm_content%3Dregistration&amp;data=05%7C02%7CSabaPourhanifeh%40cmail.carleton.ca%7Ce6bd3615e99241e1639708dd425cbc67%7C6ad91895de06485ebc51fce126cc8530%7C0%7C0%7C638739688232142708%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=BQOqCvO5MeyZQxNZY5r1CX7Tmjv3YnFF4%2BkSPh3ZIx8%3D&amp;reserved=0\">Link\u00a0<\/a><\/li>\n<\/ul>\n<p><strong>2024: The Interdisciplinary Research Center for Intelligent Secure Systems,<br \/>\n<\/strong><em>KFUPM, Dhahran, KSA<\/em><\/p>\n<ul>\n<li>5G Slice Isolation Through Resource Allocation. <a href=\"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/5G-Slice-Isolation-Through-Resource-Allocation-compressed.pdf\">Link<\/a><\/li>\n<li>Introducing Perturb-ability Score (PS) to Enhance Robustness Against Evasion Adversarial Attacks on ML-NIDS. <a href=\"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/Introducing-Perturb-ability-Score-PS-to-Enhance-Robustness-Against-Evasion-Adversarial-Attacks-on-ML-NIDS.pdf\">Link<\/a><\/li>\n<li>Using Machine Learning in Network Security: A New Investigation of Adversarial Evasion Attacks. <a href=\"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/Using-Machine-Learning-in-Network-Security-A-New-Investigation-of-Adversarial-Evasion-Attacks.pdf\">Link<\/a><\/li>\n<\/ul>\n<h2 class=\"wp-block-latest-posts__post-excerpt\">Under Review and Pre-prints<\/h2>\n<p>Etuk, Stella, and Ashraf Matrawy. &#8220;SA-ADP: Sensitivity-Aware Adaptive Differential Privacy for Large Language Models.&#8221; <a href=\"https:\/\/arxiv.org\/pdf\/2512.01748\">Link<\/a><\/p>\n<p>Alalade, Emmanuel Dare, and Ashraf Matrawy. &#8220;PTMF: A Privacy Threat Modeling Framework for IoT with Expert-Driven Threat Propagation Analysis.&#8221; <a href=\"https:\/\/arxiv.org\/abs\/2510.21601\">Link<\/a><\/p>\n<p>Saif, Darius, and Ashraf Matrawy. &#8220;Demystifying QUIC from the Specifications.&#8221; <a href=\"https:\/\/arxiv.org\/abs\/2511.08375\">Link<\/a><\/p>\n<p>ElShehaby, Mohamed, and Ashraf Matrawy. &#8220;Exploring the Effect of DNN Depth on Adversarial Attacks in Network Intrusion Detection Systems.&#8221; <a href=\"https:\/\/arxiv.org\/abs\/2510.19761\">Link<\/a><\/p>\n<p>Alalade, Emmanuel, and Ashraf Matrawy. &#8220;Privacy Preservation Techniques (PPTs) in IoT Systems: A Scoping Review and Future Directions.&#8221; <a href=\"https:\/\/arxiv.org\/abs\/2503.02455\">Link<\/a><\/p>\n<p>E. Alalade, M. Mahyoub, and\u00a0 A. Matrawy, &#8220;Privacy Engineering in Smart Home (SH) Systems: A Comprehensive Privacy Threat Analysis and Risk Management Approach.&#8221; <a href=\"https:\/\/arxiv.org\/abs\/2401.09519\">Link<\/a><\/p>\n<p>M. Shehaby, and A. Matrawy, &#8220;SoK: Adversarial Evasion Attacks Practicality in NIDS Domain and the Impact of Dynamic Learning.&#8221; <a href=\"https:\/\/arxiv.org\/abs\/2306.05494\">Link<\/a><\/p>\n<p>AbdulGhaffar, AbdulAziz, and Ashraf Matrawy. &#8220;LLMs&#8217; Suitability for Network Security: A Case Study of STRIDE Threat Modeling.&#8221; <a href=\"https:\/\/arxiv.org\/pdf\/2505.04101\">Link<\/a><\/p>\n<p>Jawad, Alvi, Jason Jaskolka, Ashraf Matrawy, and Mohamed Ibnkahla. &#8220;strideSEA: A STRIDE-centric Security Evaluation Approach.&#8221; <a href=\"https:\/\/arxiv.org\/pdf\/2503.19030\">Link<\/a><\/p>\n<h2 class=\"wp-block-latest-posts__post-excerpt\">Journal Publications<\/h2>\n<p>elShehaby, Mohamed, and Ashraf Matrawy. &#8220;<span data-teams=\"true\">A Novel Perturb-ability Score to Mitigate Evasion Adversarial Attacks on Flow-Based ML-NIDS<\/span>.&#8221; Accepted in <span data-teams=\"true\">Elsevier Journal of Information Security and Applications<\/span> <a href=\"https:\/\/arxiv.org\/abs\/2409.07448\">Link<\/a><\/p>\n<p>Zubairu, Hussaini, Abdelrahaman Abdou, and Ashraf Matrawy. &#8220;Evaluation Metrics for Misinformation Warning Interventions: Challenges and Prospects.&#8221; International Journal of Human-Computer Interaction 2025. <a href=\"https:\/\/arxiv.org\/abs\/2505.09526\">Link<\/a><\/p>\n<p><span data-teams=\"true\">A. Gharib, J. Jaskolka, M. Ibnkahla, and A. Matrawy, \u201cSecurity Management Through Horizontal Standard-based IoT Platforms: A Survey and Comparison.&#8221; ACM Computing Surveys 2025. <a href=\"https:\/\/dl.acm.org\/doi\/10.1145\/3766888\">Link<\/a><\/span><\/p>\n<p><span data-teams=\"true\"><span class=\"ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak\" dir=\"ltr\">D. Sattar, A. Matrawy, and AA. Abdul Ghaffar, &#8220;Secure 5G Core Network Slicing for DDoS Mitigation.&#8221; IEEE Systems Journal 2025. <a href=\"https:\/\/ieeexplore.ieee.org\/document\/11163606\">Link<\/a><\/span><\/span><\/p>\n<p>Saif, Darius, and Ashraf Matrawy. &#8220;A Datagram Extension to DNS over QUIC: Proven Resource Conservation in the Internet of Things.&#8221; <span data-olk-copy-source=\"MessageBody\">IEEE Internet of Things Journal 2025 <a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/11062607\">Link<\/a><\/span><\/p>\n<p>Mohammed Mahyoub, AbdulAziz AbdulGhaffar, Emmanuel Alalade, and Ashraf Matrawy. A Security-Aware Network Function Sharing Model for 5G Slicing. Wiley Online Security and Privacy journal 2025 <a href=\"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/A-Security-aware-Network-Function-Sharing-Model-for-5G-slicing.pdf\">Link<\/a><\/p>\n<p>M. Mahyoub, A. Matrawy, K. Isleem, O. Ibitoye, &#8220;Cybersecurity Challenge Analysis of Work-from-Anywhere (WFA) and Recommendations guided by a User Study&#8221; IEEE Transactions on Human-Machine Systems 2025\u00a0 <a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/10949601?casa_token=Usqh7cR1MWAAAAAA:5HVf-J61H2gJJ40Aw9I1MWTQ1GBaHght5CU_rcBUfS780pRl7LYsUNjtER21lz7-cQ2rBQCoD8QO\">Link<\/a><\/p>\n<p class=\"x_MsoNormal\"><span data-olk-copy-source=\"MessageBody\">A. Farhat, A. Eldosouky, M. Ibnkahla, and A. Matrawy, &#8220;Interaction-aware Trust Management Scheme for IoT Systems with Machine Learning-based Attack Detection,&#8221; <\/span>IEEE IoT Journal 2025 <a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/10877713?casa_token=RGCm-UmqgNoAAAAA:1KOyBZD6oB9rgEvjOCZldkTHGnLIA79RJOA8g56V7wvqXvwuhqpm50-TO_cbS3wQ8mUmXIwCzhv8\">Link<\/a><\/p>\n<p>Olakunle Ibitoye, Rana Abou-Khamis, Mohamed elShehaby, M. Omair Shafiq and Ashraf Matrawy. &#8220;The Threat of Adversarial Attacks on Machine Learning in Network Security&#8211;A Survey&#8221; Journal of Electronics and Electrical Engineering. 2025 <a href=\"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/The-Threat-of-Adversarial-Attacks-on-Machine-Learning-in-Network-Security-A-Survey.pdf\">Link<\/a><\/p>\n<p>M. elShehaby, A. Kotha and A. Matrawy, &#8220;Introducing Adaptive Continuous Adversarial Training (ACAT) to Enhance Machine Learning Robustness,&#8221; IEEE Networking Letters, vol. 6, no. 3, pp. 208-212, Sept. 2024, doi: 10.1109\/LNET.2024.3442833. <a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/10634900?casa_token=rNPpGlFawAIAAAAA:b-1kGotnKxLYzZ4UjtAmpZz0eicKkdHc6necStOPHzD3m4pR3Ft2bTru17clgB4N7CXUfFL_nA0x\">Link<\/a><\/p>\n<p>M. Mahyoub, A. AbdulGhaffar, E. Alalade, E. Ndubisi and A. Matrawy, (2024) &#8220;Security Analysis of Critical 5G Interfaces&#8221; IEEE Communications Surveys &amp; Tutorials, doi: 10.1109\/COMST.2024.3377161. <a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/10472310?casa_token=w7iB-sqZRgsAAAAA:JttMdJlVfmE0nw7rS2A0smvc3iNjZrPXtFaeyTRDt17nyN5D6jryEsN8M_QWm7sQ6XEhSOVPwi-x\">Link<\/a><\/p>\n<p>D. Saif and A. Matrawy, &#8220;An Experimental Investigation of Tuning QUIC-Based Publish\u2013Subscribe Architectures in IoT&#8221; IEEE Internet of Things Journal, vol. 11, no. 3, pp. 4924-4933, 1 Feb.1, 2024, doi: 10.1109\/JIOT.2023.3302160. <a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/10208155?casa_token=sH083jcbQwsAAAAA:t05FS4TOO-FBFKbTZu3Zo3jIKWk0NhrnJ35Nt64FZOkgiw8vf8KMJX-OnucK7MzluCtY2qV58ZhL\">Link<\/a><\/p>\n<p>Ibitoye, Olakunle, M. Omair Shafiq, and Ashraf Matrawy. &#8220;Differentially private self-normalizing neural networks for adversarial robustness in federated learning.&#8221;\u00a0<i>Computers &amp; Security<\/i> 116 (2022): 102631. <a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S016740482200030X\">Link<\/a><\/p>\n<p>A. Raoof, C. -H. Lung and A. Matrawy, \u201cSecuring RPL Using Network Coding: The Chained Secure Mode (CSM)\u201d IEEE Internet of Things Journal, vol. 9, no. 7, pp. 4888-4898, 1 April 1, 2022, doi: 10.1109\/JIOT.2021.3109109.1 <a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9525440?casa_token=I8Radm0pLHkAAAAA:DhYCDElMNI1qWp8XKZiz_YIDBnFAX7b99SkDpnf14ZLjrEorWEufgT6Py0nQwJOoHnxuy9Q1zcH2\">PDF Link<\/a><\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Julian Chukwu, Ashraf MJ. C. Chukwu, A. Matrawy, and D. Makrakis, \u201cConsolidating Policy Chains Using One Pass Packet Steering in Software-Defined Data Centers\u201d in IEEE Transactions on Cloud Computing, vol. 9, no. 2, pp. 518-531, 1 April-June 2021, doi: 10.1109\/TCC.2018.2881963. <a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8540018?casa_token=IDZpVcnyVo0AAAAA:LX4o-7efjYXONCaEHig161nee86G2dYfKAM57WR_h2m3ih-HRQ24LOXdGWRemGpvRIKQo-8L03PA\">PDF Link<\/a><\/p>\n<p>A. Raoof, A. Matrawy and C. -H. Lung, &#8220;Enhancing Routing Security in IoT: Performance Evaluation of RPL\u2019s Secure Mode Under Attacks&#8221; in IEEE Internet of Things Journal, vol. 7, no. 12, pp. 11536-11546, Dec. 2020, doi: 10.1109\/JIOT.2020.3022276. <a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/9187412?casa_token=D7eU8usqT7sAAAAA:egZPXlchb1jJmoISubf6vWzk506JnZIyDWQau-kyhd5lDxwZkO4XmMQL6d_q12BgUZa5R0DMbCSj\">PDF Link<\/a><\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Danish Sattar, and Ashraf Matrawy, \u201cOptimal Slice Allocation in 5G Core Networks\u201d IEEE Networking Letters Vol: 1, Issue: 2, PP. 48-51, June 2019. <a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8676260?casa_token=FFbDjb6AFmUAAAAA:NPYmxJPEVGQYTWd5WcGFvmOi4I_2BZLQSa04Ibj7qaaga4x0t6uLL-8j_0kzdBvDGjAwGVJT2NjT\">PDF Link<\/a><\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Mohamed Aslan, and Ashraf Matrawy, \u201cOn Maintaining an Up-to-date Network View in Software-Defined Clouds\u201d IEEE Transactions on Cloud Computing, (Accepted), March 2019.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Ahmed Raoof, Ashraf Matrawy, and Chung-Horng Lung, \u201cRouting Attacks and Mitigation Methods for RPL-Based Internet of Things,\u201d IEEE Communications Surveys and Tutorials, (Early Access), December 2019.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Manjinder Nir, Ashraf Matrawy, and Marc St-Hilaire, \u201cEconomic and Energy Considerations for Resource Augmentation in Mobile Cloud Computing,\u201d IEEE Transactions on Cloud Computing, Vol. 6, Issue: 1, PP. 99-113, First Quarter 2018.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">AbdelRahman Abdou, Ashraf Matrawy, and Paul C. van Oorschot, \u201cLocation Verification of Wireless Internet Clients: Evaluation and Improvements,\u201d IEEE Transactions on Emerging Topics in Computing, Vol. 5, Issue 4, PP. 563-575, Fourth Quarter 2017.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Abes Dabir, AbdelRahman Abdou, and Ashraf Matrawy, \u201cA Survey on Forensic Event Reconstruction Systems,\u201d International Journal of Information and Computer Security, Vol. 9, Issue: 4, PP. 337-360, Year: 2017.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">AbdelRahman Abdou, Ashraf Matrawy, and P. C. van Oorschot, \u201cCPV: Delay-Based Location Verification for the Internet,\u201d IEEE Transactions on Dependable and Secure Computing, Vol. 14, Issue: 2, PP. 130-144, March \u2013 April 2017.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Bruna Freitas, Ashraf Matrawy, and Robert Biddle, \u201cOnline Neighborhood Watch: The Impact of Social Network Advice on Software Security Decisions,\u201d Canadian Journal of Electrical and Computer Engineering, Vol. 39, Issue: 4, PP. 322-332, Fall 2016.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">M. Imam, Ashraf Matrawy, and M. Jassemuddin, \u201cA Collaborative Firewall-Based Approach for Botnet Mitigation,\u201d Journal of Information Assurance and Security.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Mohamed Aslan, and Ashraf Matrawy, \u201cOn the Impact of Network State Collection on the Performance of SDN Applications,\u201d IEEE Communications Letters, Vol. 20, Issue 1, PP. 5-8, Jan 2016.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">AbdelRahman Abdou, Ashraf Matrawy, and P. C. van Oorschot, \u201cAccurate One-Way Delay Estimation With Reduced Client Trustworthiness,\u201d IEEE Communications Letters, Vol. 19, Issue: 5, PP. 735-738, May 2015.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Muhammad Mahmoud, Manjinder Nir, and Ashraf Matrawy, \u201cA Survey on Botnet Architectures, Detection and Defences,\u201d International Journal of Network Security, Vol. 17, No. 3, PP. 272-289, 2015.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">AbdelRahman Abdou, Ashraf Matrawy, and Paul C. van Oorschot, \u201cTaxing the Queue: Hindering Middleboxes From Unauthorized Large-Scale Traffic Relaying,\u201d IEEE Communications Letters, Vol. 19, Issue: 1, PP. 42-45, January 2015.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Kashif Mahmood, Thomas Kunz and Ashraf Matrawy, \u201cBroadcasting in MANETs Using Multi-Source Random Linear Network Coding,\u201d Ad Hoc &amp; Sensor Wireless Networks, Vol. 16, No. 1-3, PP. 119-138, 2012.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Muhammad Mahmoud and Ashraf Matrawy, \u201cIRC Botchallenger, Creating Botnet-Resilient Networks,\u201d Journal of Information Assurance and Security, Vol. 6, Issue: 6, 2011.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Fadi El-Hassan, Ashraf Matrawy, Nabil Seddigh, and Biswajit Nandy, \u201cAn Experimental Approach to Network Monitoring using Quantitative Security Metrics,\u201d Journal of Information Assurance and Security, Vol. 6, Issue: 1, 2011.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Saeideh Ashtarifar and Ashraf Matrawy, \u201cA Link Layer Solution to Location Identification of Emergency VoIP Callers,\u201d International Journal of Computer Networks and Communications, Vol. 2, No. 5, September 2010.<\/p>\n<p><span data-teams=\"true\">C. Smith, A. Matrawy, S. Chow, B. Abdel-Aziz, \u201cComputer Worms: Architectures, Evasion Strategies, and Detection Mechanisms\u201d, Journal of Information Assurance and Security, Vol. 4, No. 1, 2009<\/span><\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Khurram Masood, Ashraf Matrawy, Bashar Bou-Diab, and Ross Kouhi, \u201cScalable XML Routed Network Topology Generation,\u201d Bell-Labs Technical Journal, Vol. 13, No. 3, Fall 2008.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Ashraf Matrawy and Ioannis Lambadaris, \u201cPerformance of Layered Multicast Video,\u201d Canadian Journal of Electrical and Computer Engineering, Vol. 32, Issue: 2, Spring 2007.<\/p>\n<p>Y. Osais, S. Abdala and A. Matrawy, &#8220;A Multilayer Peer-to-Peer Framework for Distributed Synchronous Collaboration,&#8221; in IEEE Internet Computing, vol. 10, no. 6, pp. 33-41, Nov.-Dec. 2006, doi: 10.1109\/MIC.2006.115.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Ashraf Matrawy and Ioannis Lambadaris, \u201cA Real-time Video Multicast Architecture for Assured Forwarding Services,\u201d IEEE Transactions on Multimedia, Vol. 7, Issue: 4, PP. 688 \u2013 699, Aug 2005.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Ashraf Matrawy and Ioannis Lambadaris, \u201cA Survey of Congestion Control Schemes for Multicast Video Applications,\u201d IEEE Communications Surveys &amp; Tutorials, Vol. 5, Issue: 2, PP. 22 \u2013 31, Q4 2003.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Ashraf Matrawy and Ioannis Lambadaris, \u201cA Rate Adaptation Algorithm for Multicast Sources in Priority-based IP Networks,\u201d IEEE Communications Letters, Vol. 7, Issue: 2, PP. 94 \u2013 96, Feb 2003.<\/p>\n<h2>Lecture Notes<\/h2>\n<p>Ashraf Matrawy, Paul C. van Oorschot, and Anil Somayaji, \u201cMitigating Network Denial-of-Service Through Diversity-Based Traffic Management\u201d, In: Ioannidis J., Keromytis A., Yung M. (eds) Applied Cryptography and Network Security, Lecture Notes in Computer Science, Vol. 3531. Springer, 2005.<\/p>\n<h2>Conference and Workshop Publications<\/h2>\n<p>Adam Ali Husseinat, Ashraf Matrawy, &#8220;Exploratory TEID-Based Defence against Flooding Attacks in 5G Slicing&#8221; (Accepted in IEEE International Conference on Communications 2026) <a href=\"https:\/\/carleton.ca\/ngn\/wp-content\/uploads\/ADAM_Exploratory_Solution_ICCaccepted_NGNversion_Feb42026.pdf\">PDF<\/a><\/p>\n<p><span data-olk-copy-source=\"MessageBody\">Ali Farhat, Mohannad Abu Issa, AbdelRahman Eldosouky, Mohamed Ibnkahla, Jason Jaskolka and Ashraf Matrawy, \u201cIoT-Enabled E-Health Testbed with System Level Security.\u201d (IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, 2025)<\/span><\/p>\n<p>Darius Saif, Ashraf Matrawy. Trimming the Fat: Introducing QUIC Thin-Apps for the Internet of Things. <i>TechRxiv<\/i>. <span class=\"publication-status__citation-doi\">DOI:\u00a0<a href=\"https:\/\/doi.org\/10.36227\/techrxiv.173143070.04378246\/v1\" target=\"_blank\" rel=\"noopener noreferrer\">10.36227\/techrxiv.173143070.04378246\/v1<\/a> <\/span>(<span data-teams=\"true\">IEEE ICC 2025<\/span>)<\/p>\n<p>Adam Ali Husseinat, AbdulAziz AbdulGhaffar, Ashraf Matrawy\u00a0.\u00a0A Study of XR Traffic Characteristics Under Flooding Attacks on 5G Slicing.\u00a0<i>TechRxiv.<\/i>\u00a0<span class=\"publication-status__citation-doi\">DOI:\u00a0<a href=\"https:\/\/doi.org\/10.36227\/techrxiv.173121385.53698824\/v1\" target=\"_blank\" rel=\"noopener noreferrer\">10.36227\/techrxiv.173121385.53698824\/v1<\/a> <\/span>(<span data-teams=\"true\">IEEE ICC 2025<\/span>)<\/p>\n<p>Mohamed elShehaby, Aditya Kotha, Ashraf Matrawy\u00a0.\u00a0Adaptive Continuous Adversarial Training (ACAT) to Enhance ML-NIDS Robustness.\u00a0<i>TechRxiv.<\/i>\u00a0<span class=\"publication-status__citation-doi\">DOI:\u00a0<a href=\"https:\/\/doi.org\/10.36227\/techrxiv.173144803.35072777\/v1\" target=\"_blank\" rel=\"noopener noreferrer\">10.36227\/techrxiv.173144803.35072777\/v1<\/a> <\/span>(<span data-teams=\"true\">IEEE ICC 2025<\/span>)<\/p>\n<p><span data-olk-copy-source=\"MessageBody\">Ali Farhat, Mohannad Abu Issa, AbdelRahman Eldosouky, Mohamed Ibnkahla, Jason Jaskolka, and Ashraf Matrawy, &#8220;IoT-Enabled e-Health Systems: Navigating Security Challenges and Strategic Recommendations&#8221;, IEEE 22nd International Multi-Conference on Systems, Signals &amp; Devices (SSD), 2025<\/span><\/p>\n<p>A. AbdulGhaffar, M. Mahyoub and A. Matrawy, &#8220;On the Impact of Flooding Attacks on 5G Slicing with Different VNF Sharing Configurations,&#8221; 2024 20th International Conference on the Design of Reliable Communication Networks (DRCN), Montreal, QC, Canada, 2024, pp. 136-142, doi: 10.1109\/DRCN60692.2024.10539153.<\/p>\n<p>M. Mahyoub, S. Hossain and A. Matrawy, &#8220;On the Impact of the RPL Decreased Rank Attack on 6TiSCH Networks,&#8221; 2024 20th International Conference on the Design of Reliable Communication Networks (DRCN), Montreal, QC, Canada, 2024, pp. 70-75, doi: 10.1109\/DRCN60692.2024.10539163.<\/p>\n<p>M. A. Issa, M. Ibnkahla, A. Matrawy and A. Eldosouky, &#8220;Temporal Partitioned Federated Learning for IoT Intrusion Detection Systems,&#8221; 2024 IEEE Wireless Communications and Networking Conference (WCNC), Dubai, United Arab Emirates, 2024, pp. 1-6, doi: 10.1109\/WCNC57260.2024.10570551.<\/p>\n<p>R. A. Khamis and A. Matrawy, &#8220;Could Min-Max Optimization be a General Defense Against Adversarial Attacks?,&#8221; 2024 International Conference on Computing, Networking and Communications (ICNC), Big Island, HI, USA, 2024, pp. 671-676, doi: 10.1109\/ICNC59896.2024.10556266.<\/p>\n<p>D. Saif and A. Matrawy, &#8220;Mass Configuration of Heterogeneous IIoT Nodes: A Proposal and Experimental Evaluation,&#8221; 2024 International Conference on Computing, Networking and Communications (ICNC), Big Island, HI, USA, 2024, pp. 932-937, doi: 10.1109\/ICNC59896.2024.10556270.<\/p>\n<p><span class=\"ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak\" dir=\"ltr\">Farhat A*, Ibnkahla M, Matrawy A, and Eldosouky A*. \u00a0IoT Trust Establishment through System LevelInteractions and Communication Attributes. IEEE Global Communications Conference (Globecom),\u2003December 2023<\/span><\/p>\n<p>A. AbdulGhaffar, S. K. Paul and A. Matrawy, &#8220;An Analysis of DHCP Vulnerabilities, Attacks, and Countermeasures,&#8221; 2023 Biennial Symposium on Communications (BSC), Montreal, QC, Canada, 2023, pp. 119-124, doi: 10.1109\/BSC57238.2023.10201458.<\/p>\n<p>M. A. Issa, A. Eldosouky, M. Ibnkahla, J. Jaskolka and A. Matrawy, &#8220;Integrating Medical and Wearable Devices with E-Health Systems Using Horizontal IoT Platforms,&#8221;\u00a0<em>2023 IEEE Sensors Applications Symposium (SAS)<\/em>, Ottawa, ON, Canada, 2023, pp. 1-6, doi: 10.1109\/SAS58821.2023.10254186.<\/p>\n<p>A. Jawad, L. Newton, A. Matrawy and J. Jaskolka, &#8220;A Formal Analysis of the Efficacy of Rebooting as a Countermeasure Against IoT Botnets,&#8221; ICC 2022 &#8211; IEEE International Conference on Communications, Seoul, Korea, Republic of, 2022, pp. 2206-2211, doi: 10.1109\/ICC45855.2022.9838865.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">D Saif, A Matrawy, \u201cA Pure HTTP\/3 Alternative to MQTT-over-QUIC in Resource-Constrained IoT\u201d,\u00a0IEEE Conference on Standards for Communications and Networking, December 2021<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">D. Saif, C-H. Lung, and A. Matrawy, \u201cAn Early Benchmark of Quality of Experience Between HTTP\/2 and HTTP\/3 using Lighthouse\u201d,\u00a0IEEE International Conference on Communications (ICC),\u00a02021.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">R. Maarouf, D. Sattar and A. Matrawy, \u201cEvaluating Resilience of Encrypted Traffic Classification against Adversarial Evasion Attacks,\u201d 2021 IEEE Symposium on Computers and Communications (ISCC), 2021, pp. 1-6, doi: 10.1109\/ISCC53001.2021.9631407.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">D. Sattar, A. H. Vasoukolaei, P. Crysdale, and A. Matrawy, \u201cA STRIDE Threat Model for 5G Core Slicing\u201d, Proc. 4th IEEE 5G World Forum (5GWF), October 2021, Montreal.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">A Raoof, CH Lung, A Matrawy, \u201cIntegrating 6LoWPAN Security with RPL Using the Chained Secure Mode Framework\u201d,\u00a0The 14th\u00a0IEEE International Conference on Internet of Things, 2021.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">A. H. Vasoukolaei, D. Sattar, and A. Matrawy, \u201cTLS Performance Evaluation in the Control Plane of a 5G Core Network Slice\u201d, IEEE Conf. on Standards for Comm. and Networking, December 2021<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">A. Raoof, C. -H. Lung and A. Matrawy, \u201cIntroducing Network Coding to RPL: The Chained Secure Mode (CSM),\u201d\u00a02020 IEEE 19th International Symposium on Network Computing and Applications (NCA), 2020, pp. 1-4, doi: 10.1109\/NCA51143.2020.9306744. January 2021<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Danish Sattar and Ashraf Matrawy, \u201cProactive and Dynamic Slice Allocation in Sliced 5G Core Networks\u201d, in Proc. of the IEEE International Symposium on Networks, Computers and Communications (ISNCC 2020), Montreal, Canada, 20 \u2013 22 October 2020 (this paper combines the work in these two documents Link1, Link2).- Best Paper Award at ISNCC 2020.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Dana Haj Hussein, Ragunath Anbarasu, Ashraf Matrawy, and Mohamed Ibnkahla, \u201cTowards a Decentralized Access Control System for IoT platforms based on Blockchain Technology\u201d, in Proc. of the IEEE International Symposium on Networks, Computers and Communications (ISNCC 2020), Montreal, Canada, 20 \u2013 22 October 2020.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Rana Abou-Khamis and Ashraf Matrawy \u201cEvaluation of Adversarial Training on Different Types of Neural Networks in Deep Learning-based IDSs\u201d, in Proc. of the IEEE International Symposium on Networks, Computers and Communications (ISNCC 2020), Montreal, Canada, 20 \u2013 22 October 2020.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Rana Abou-Khamis, Omair Shafiq, and Ashraf Matrawy, \u201cInvestigating Resistance of Deep Learning-based IDS against Adversaries using min-max Optimization\u201d, in Proc. of the IEEE International Conference on Communications (ICC 2020), Dublin, Ireland, 7 \u2013 11 June 2020.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Olakunle Ibitoye, M. Omair Shafiq and Ashraf Matrawy, \u201cAnalyzing Adversarial Attacks Against Deep Learning for Intrusion Detection in IoT Networks\u201d, in Proc. of the IEEE Global Communications Conference (GLOBECOM 2019) Waikoloa, HI, USA, 9 \u2013 13 December 2019.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Ahmed Raoof, Ashraf Matrawy and Chung-Horng Lung, \u201cSecure Routing in IoT: Evaluation of RPL\u2019s Secure Mode under Attacks\u201d, in Proc. of the IEEE Global Communications Conference (GLOBECOM 2019), Waikoloa, HI, USA, 9 \u2013 13 December 2019.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Thomas A.V. Sattolo, Saumil Macwan, Michael Vezina and Ashraf Matrawy, \u201cClassifying Poisoning Attacks in Software Defined Networking\u201d, in Proc. of the IEEE International Conference on Wireless for Space and Extreme Environments (WISEE 2019), Ottawa, ON, Canada, 16 \u2013 18 October 2019.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Danish Sattar, and Ashraf Matrawy, \u201cTowards Secure Slicing: Using Slice Isolation to Mitigate DDoS Attacks on 5G Core Network Slices\u201d, in Proc. of the 7th Annual IEEE Conference on Communications and Network Security (CNS 2019) Washington, DC, USA, 10 \u2013 12 June 2019.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Mohamed Aslan and Ashraf Matrawy, \u201cSDN-VSA: Modeling and Analysis of SDN Control Applications using Vector Spaces\u201d in Proc. of the IEEE International Conference on Communications (ICC 2018), Kansas City, MO, USA, May 2018., Errata for the paper (posted August 23, 2018)., This Errata also applies (page numbers might differ) to this older version.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Mohamed Aslan and Ashraf Matrawy, \u201cA Clustering-based Consistency Adaptation Strategy for Distributed SDN Controllers\u201d, in Proc. of the 4th IEEE Conference on Network Softwarization (NetSoft 2018) Workshop on Smart network Technologies and Edge computing for the Tactile Internet (STET 2018), Montreal, QC, Canada, June 2018.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Danish Sattar, Ashraf Matrawy, Troy Bryant, and Marc Kneppers, \u201cThreat Modeling in LTE Small Cell Networks\u201d, in Proc. of the IEEE Canadian Conference on Electrical &amp; Computer Engineering (CCECE 2018), Quebec City, QC, Canada, May 2018.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Darius Saif, Alexandre Cormier, Suranjit Banik, and Ashraf Matrawy, \u201cA Review of Recently Emerging Denial of Service Threats and Defences in the Transport Layer\u201d, in Proc. of the IEEE Canadian Conference on Electrical &amp; Computer Engineering (CCECE 2018), Quebec City, QC, Canada, May 2018.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Danish Sattar and Ashraf Matrawy, \u201cAn Empirical Model of Packet Processing Delay of the Open vSwitch\u201d, in Proc. of the IEEE 25th International Conference on Network Protocols (ICNP 2017), Toronto, ON, Canada, October 2017.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Mohamed Aslan and Ashraf Matrawy, \u201cCould Network View Inconsistency Affect Virtualized Network Security Functions?\u201d, IEEE 3rd Workshop on Security and Privacy in the Cloud (SPC 2017), Las Vegas, NV, USA, October 2017.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Julian Chukwu, Ashraf Matrawy and Dimitrios Makrakis, \u201cOne Pass Packet Steering (OPPS) for Stateless Policy Chains in Multi-subscriber SDN\u201d, in Proc. of the IEEE 2nd International INFOCOM Workshop on Software-Driven Flexible and Agile Networking (SWFAN 2017), Atlanta, GA, USA, May 1, 2017.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">AbdelRahman Abdou, Ashraf Matrawy and Paul C. van Oorschot, \u201cAccurate Manipulation of Delay-based Internet Geolocation\u201d, in Proc. of the ACM Asia Conference on Computer and Communications Security (ASIACCS 2017), Abu Dhabi, UAE, April 2017. Distiguished Paper Award<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Mohamed Aslan, and Ashraf Matrawy, \u201cAdaptive Consistency for Distributed SDN Controllers\u201d, in the Proc. of the 17th International Network Strategy and Planning Symposium (Networks 2016), Montreal, QC, Canada. September 2016.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Danish Sattar , Ashraf Matrawy, and Olufemi Adeojo, \u201cAdaptive Bubble Burst (ABB): Mitigating DDoS Attacks in Software-Defined Networks\u201d, in the Proc. of the 17th International Network Strategy and Planning Symposium (Networks 2016), Montreal, QC, Canada. September 2016.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Randika Upathilake, Yingkun Li, and Ashraf Matrawy, \u201cA Classification of Web Browser Fingerprinting Techniques\u201d, in the Proc. of the IFIP International Conference on New Technologies, Mobility and Security (NTMS 2015), Paris, France. July 2015.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Kevan Adlard, Tharanga Ekanayake, and Ashraf Matrawy, \u201cTowards Power Profiling of Android Permissions\u201d, in the Proc. of the IFIP International Conference on New Technologies, Mobility and Security (NTMS 2015), Paris, France. July 2015.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">AbdelRahman Abdou, Ashraf Matrawy and Paul C. van Oorschot, \u201cLocation Verification on the Internet: Towards Enforcing Location-aware Access Policies Over Internet Clients\u201d, in Proc. of the IEEE Conference on Communications and Network Security (CNS 2014), San Francisco, CA, USA, October 2014. Nominated for Best Paper Award<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Alejandro De Gante, Mohamed Aslan, and Ashraf Matrawy, \u201cSmart Wireless Sensor Network Management based on Software-Defined Networking\u201d, in the Proc. of the 27th Queen\u2019s Biennial Symposium on Communications (QBSC 2014), Kingston, ON, Canada. June 2014.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Manjinder Nir, Ashraf Matrawy, and Marc St-Hilaire, \u201cOptimizing Energy Consumption in Broker-Assisted Cyber Foraging Systems\u201d, in the Proc. of the 28th IEEE International Conference on Advanced Information Networking and Applications (AINA-2014), Victoria City, BC, Canada. May 2014.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Manjinder Nir, Ashraf Matrawy, and Marc St-Hilaire, \u201cAn Energy Optimizing Scheduler for Mobile Cloud Computing Environments\u201d, in the Proc. of the IEEE International Conference on Computer Communications (INFOCOM 2014) Workshop on Mobile Cloud Computing, Toronto, ON, Canada. April 2014.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Manjinder Nir and Ashraf Matrawy, \u201cCentralized Management of Scalable Cyber Foraging Systems\u201d, in the Proc. of the 4th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2013), Niagara Falls, ON, Canada. October 2013.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Manjinder Nir and Ashraf Matrawy, \u201cA Density Mapping Algorithm for Supporting Cyber Foraging Service Networks\u201d, in the Proc. of the 7th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA 2012), Victoria, BC, Canada. November 2012.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Muhammad Mahmoud, Sonia Chiasson, and Ashraf Matrawy, \u201cDoes Context Influence Responses to Firewall Warnings?\u201d, in the Proc. of the 7th IEEE eCrime Researchers Summit for the Anti-Phishing Working Group, Las Croabas, Puerto Rico, October 2012. Third Place Award for Best Paper<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Mohammad Faghani, Ashraf Matrawy, and Chung-Horng Lung, \u201cA Study of Trojan Propagation in Online Social Networks\u201d, in the Proc. of the 5th IFIP International Conference on New Technologies, Mobility and Security (NTMS 2012), Istanbul, Turkey, May 2012.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Ashraf Matrawy, Clifford Liem, Michael Wiener, Yuan Xiang Gu, and Andrew Wajs, \u201cA New Perspective on Providing Cloud Computing Security\u201d, in the Proc. of the 1st International Conference on Cloud Computing and Services Science (CLOSER 2011), Noordwijkerhout, The Netherlands, May 2011.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Issam Al-Dalati, Jose R. Gallardo, Dimitrios Makrakis, and Ashraf Matrawy, \u201cEnhanced QoS Support in Certified Wireless USB\u201d, in the Proc. of the 9th Annual Conference on Communications Networks and Services Research (CNSR 2011), Ottawa, ON, Canada, May 2011.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Kashif Mahmood, Thomas Kunz, and Ashraf Matrawy, \u201cAdaptive Random Linear Network Coding with Controlled Forwarding for Wireless Broadcast\u201d, in the Proc. of the IFIP Wireless Days, Venice, Italy, October 2010.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">S. Ashtarifar and Ashraf Matrawy, \u201cDetermining Host Location on the Internet: The Case of VoIP Emergency Calls\u201d, in the Proc. of the IEEE International Conference on Communications (ICC 2009) Workshops, Dresden, Germany, June 2009.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Craig Smith and Ashraf Matrawy, \u201cA Behaviour Study of Network-Aware Stealthy Worms\u201d, in the Proc. of the IEEE International Conference on Communications (ICC 2009), Dresden, Germany, June 2009.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Abes Dabir and Ashraf Matrawy, \u201cDesign and Analysis of a Hierarchical IP Traceback System\u201d, in the Proc. of the IEEE International Conference on Communications (ICC 2009), Dresden, Germany, June 2009.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Abes Dabir and Ashraf Matrawy, \u201cBottleneck Analysis of Traffic Monitoring using Wireshark\u201d, in the Proc. of the 4th International Conference on Innovations in Information Technology, Dubai, UAE. November 2008.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Craig Smith and Ashraf Matrawy, \u201cComparison of Operating System Implementations of SYN Flood Defenses (Cookies)\u201d, in the Proc. of the 24th Queen\u2019s Biennial Symposium on Communications (QBSC 2008), Kingston, ON, Canada. June 2008.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Abdulrahman Hijazi, Hajime Inoue, Ashraf Matrawy, Anil Somayaji, and Paul C. van Oorschot, \u201cDiscovering Packet Structure through Lightweight Hierarchical Clustering\u201d, in the Proc. of the IEEE International Conference on Communications (ICC 2008), Beijing, China, May 2008.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Issam Al-dalati and Ashraf Matrawy, \u201cDesigning Secure Peer-to-Peer Voice Applications in Ad Hoc Wireless Networks\u201d, in the Proc. of the 20th Canadian Conference on Electrical and Computer Engineering (CCECE 2007), Vancouver, BC, Canada. April 2007.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">F. El-Hassan, Ashraf Matrawy, Nabil Seddigh, and Biswajit Nandy, \u201cDesigning Secure Peer-to-Peer Voice Applications in Ad Hoc Wireless Networks\u201d, in the Proc. of the IASTED International Conference on Communication, Network and Information Security (CNIS 2006), Cambridge, MA, USA. October 2006.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Ashraf Matrawy, Wei Yi, Ioannis Lambadaris, and Chung-Horng Lung, \u201cMPLS-based Multicast Shared Trees\u201d, in the Proc. of the 4th Annual Communication Networks and Services Research Conference (CNSR 2006), Moncton, NB, Canada. May 2006.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">C. Al Sayeed and Ashraf Matrawy, \u201cGuaranteed Maximal Matching for Input Buffered Crossbar Switches\u201d, in the Proc. of the 4th Annual Communication Networks and Services Research Conference (CNSR 2006), Moncton, NB, Canada. May 2006.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Jian Zhu, Ashraf Matrawy, Ioannis Lambadaris, and Mohsen Ashourian, \u201cOptimization of Resilient Packet Ring Networks Scheduling for MPEG-4 Video Streaming\u201d, in the Proc. of the IEEE International Conference on Communications (ICC 2005), Seoul, Korea, May 2005.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Nabil Seddigh, Biswajit Nandy, Andrew Ross, Peter Pieda, Rupinder Makkar, Ashraf Matrawy, Ioannis Lambadaris, and Lathif Masood, \u201cMPLS-based Multicast Shared Trees\u201d, in the Proc. of the Workshop on Cyber Infrastructure \u2013 Emergency Preparedness Aspect, Ottawa, ON, Canada. April 2005.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Nabil Seddigh, Peter Pieda, Ashraf Matrawy, Biswajit Nandy, Ioannis Lambadaris, and Adam Hatfield, \u201cCurrent Trends and Advances in Information Assurance Metrics\u201d, in the Proc. of the Second Annual Conference on Privacy, Security, and Trust (PST 2004), Ottawa, ON, Canada. December 2004.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Ioannis Lambadaris, Rupinder. Makkar, Ashraf Matrawy, Nabil Seddigh, Biswajit Nandy, L. Paoletti, and D. Bennett, \u201cIssues in Internet-based Emergency Public Alerting\u201d, in the Proc. of the Workshop on Critical Infrastructure Protection and Emergency Preparedness, Ottawa, ON, Canada. December 2004.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Jian Zhu, Ashraf Matrawy, Ioannis Lambadaris, and Mohsen Ashourian, \u201cA New Scheduling Scheme for Resilient Packet Ring Networks With Single Transit Buffer\u201d, in the Proc. of the IEEE GLOBECOM Workshop on Computer-aided Modeling, Analysis, and Design of Communication Links and Networks (GLOBECOM 2014), Dallas, TX, November 2004.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Helen Tang, Ioannis Lambadaris, Hamid Mehrvar, Jerome Talim, and Ashraf Matrawy, \u201cA New Access Control Scheme for Metropolitan Packet Ring Networks\u201d, in the Proc. of the IEEE GLOBECOM Workshop on Computer-aided Modeling, Analysis, and Design of Communication Links and Networks (GLOBECOM 2014), Dallas, TX, November 2004.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Ashraf Matrawy, Chung-Horng Lung, and Ioannis Lambadaris, \u201cA Framework for MPLS Path Setup in Unidirectional Multicast Shared Trees\u201d, in the Proc. of the SPIE Conference on Performance, QoS, and Control of Next-Generation Communication Networks (ITCOM 2004), Philadelphia, PA, October 2004.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Han Zhu, Ashraf Matrawy, and Ioannis Lambadaris, \u201cModels and Tools for Simulation of Video Transmission on Wireless Networks\u201d, in Proc. of the IEEE Canadian Conference on Electrical &amp; Computer Engineering (CCECE 2004), Niagara Falls, ON, Canada, May 2004. Selected for the Special Session on Abstraction, Modeling, and Simulation<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Ashraf Matrawy and Ioannis Lambadaris, \u201cReal-time Transport for Assured Forwarding: An Architecture for Both Unicast and Multicast Applications\u201d, in the Proc. of the IEEE International Conference on Communications (ICC 2003), Alaska, AK, USA. May 2003.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Ashraf Matrawy and Ioannis Lambadaris, \u201cMulticast Flow Control in Priority-based IP Networks\u201d, in Proc. of the IEEE Canadian Conference on Electrical &amp; Computer Engineering (CCECE 2003), Montreal, QC, Canada, May 2003.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Ashraf Matrawy, Chung-Horng Lung, and Ioannis Lambadaris, \u201cComparison of the Use of Different ECN Techniques for IP Multicast Congestion Control\u201d, in the Proc. of the 2nd European Conference on Universal Multiservice Networks (ECUMN 2002), Colmar, France, April 2002.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Ashraf Matrawy, Chung-Horng Lung, and Ioannis Lambadaris, \u201cMulticasting of Adaptively-encoded MPEG4 Over QoS-aware IP Networks\u201d, in the Proc. of the IEEE International Conference on Communications (ICC 2002), New York, NY, USA. April 2002.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Ashraf Matrawy, Chung-Horng Lung, and Ioannis Lambadaris, \u201cMPEG4 Traffic Modeling Using the Transform Expand Sample Methodology\u201d, in the Proc. of the IEEE International Workshop on Networked Appliances (IWNA4), Gaithersburg, MD, USA. January 2002.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Ashraf Matrawy, Chung-Horng Lung, and Ioannis Lambadaris, \u201cOn Layered Video Fairness on IP Networks\u201d, in the Proc. of the IEEE Global Communications Conference (GLOBECOM 2001), San Antonio, TX, USA. November 2001.<\/p>\n<h2>Posters<\/h2>\n<p>M. E. Shehaby and A. Matrawy, &#8220;The Impact of Dynamic Learning on Adversarial Attacks in Networks (IEEE CNS 23 Poster),&#8221;\u00a0<em>2023 IEEE Conference on Communications and Network Security (CNS)<\/em>, Orlando, FL, USA, 2023, pp. 1-2, doi: 10.1109\/CNS59707.2023.10288658.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Olakunle Ibitoye, M. Omair Shafiq, and Ashraf Matrawy, \u201cA Convolutional Neural Network Based Solution For Pipeline Leak Detection\u201d, in Proc. of the\u00a0IEEE International Conference on Wireless for Space and Extreme Environments (WISEE 2019), Ottawa ON, Canada, 16 \u2013 18 October 2019.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Ahmed Raoof, Ashraf Matrawy, and Chung-Horng Lung\u00a0\u201cEvaluation of RPL Preinstalled Secure Mode Under Common Routing Attacks\u201d, in Proc. of the\u00a0IEEE Conference on Communications and Network Security (IEEE CNS2019), Washington DC, USA, June 2019.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">J.P. Houle, S. Ahmadi, B.C.A. Robart, and Ashraf Matrawy,\u00a0\u201cLeveraging Inter-controller Communication to Mitigate DDoS Attacks in SDN Networks\u201d, in Proc. of the\u00a0IEEE Conference on Communications and Network Security (IEEE CNS2017), Las Vegas, NV, USA, October 2017.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Danish Sattar, and Ashraf Matrawy, \u201cUsing Software Defined Networking to Support Security Functions\u201d, A Poster at the SERENE-RISC Fall Workshop. October 2016.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Julian Chukwu, Ose Osamudiamen, and Ashraf Matrawy,\u00a0\u201cIDSaaS in SDN: Intrusion Detection System as a Service in Software Defined Networks\u201d, in the Proc. of the\u00a0IEEE Conference on Communications and Network Security (CNS 2016), Philadelphia, PA, USA. October 2016.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">AbdelRahman Abdou, Ashraf Matrawy and Paul C. van Oorschot,\u00a0\u201cVerifying Geographic Location Presence of Internet Clients\u201d, in the Proc. of the\u00a037th IEEE Symposium on Security and Privacy, San Jose, CA, USA. May 2016.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Laura Mutu, Rania Saleh, and Ashraf Matrawy,\u00a0\u201cImproved SDN Responsiveness to UDP Flood Attacks\u201d, in the Proc. of the\u00a0IEEE Conference on Communications and Network Security (CNS 2015), Florence, Italy. September 2015.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">M. Nir, Ashraf Matrawy, and M. St-Hilaire, \u201cChallenges of Task Offloading in Mobile Cloud Computing Environments\u201d, a presentation referred on abstract, 56th Canadian Operational Research Society Annual Conference, May 2014.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">A. M. Abdou, Ashraf Matrawy and Paul C. van Oorschot. \u201cInternet Geolocation: An Adversarial Perspective\u201d, in the 4th annual ISSNet Workshop, 2012.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">I. Al-Dalati, D. Makrakis and Ashraf Matrawy, \u201cMedium Access Slot (MAS) Allocation to support QoS and Mobility in Wireless USB\u201d, Wisense Workshop, Kingston, ON, May 2010<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">A. Hijazi, H. Inoue, D. Jansens, Ashraf Matrawy, P.C. van Oorschot, and A. Somayaji, \u201cTowards Understanding Network Traffic through Whole Packet Analysis\u201d, a poster in USENIX Annual Technical Conference, Santa Clara, CA, June 2007.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Ashraf Matrawy and I. Lambadaris, \u201cAn Architecture for Real-time Multicast Video in Assured Forwarding Networks\u201d, a poster in MITACS Annual Conference 2003, Ottawa, ON, May 2003.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Ashraf Matrawy and I. Lambadaris, \u201cOn the Use of Network Support for IP Multicast\u201d, a poster in MITACS Annual General Meeting 2002, University of British Columbia, Vancouver, BC, May 2002.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">A. Matrawy, I. Lambadaris, and C. Huang, \u201cMulticasting of Adaptively-encoded MPEG4 over QoS-aware IP Networks\u201d,\u00a0winner of the best poster award\u00a0in CITO Knowledge Network Conference, Ottawa, ON, October 2001.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Ashraf Matrawy, I. Lambadaris, and C. Huang, \u201cLayered Video Multicasting over IP: A Study of the Trade-off between Fairness and Utilization\u201d, a poster in MITACS Annual General Meeting 2001, McGill University, Montreal, QC, May 2001.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">Invited\u00a0A. Matrawy and I. Lambadaris, \u201cQoS for Video Multicasting over IP Networks\u201d, a poster in 2nd IEEE Workshop on Network Operations and Management Systems (NOMS99), Montebello, QC, June 1999.<\/p>\n<h2>Technical Reports<\/h2>\n<p class=\"wp-block-latest-posts__post-excerpt\">M. Mahmoud, M. Nir, and Ashraf Matrawy, \u201cA Survey on Botnet Architecture, Detection and Defences\u201d, Carleton University Technical Report SCE-11-04, October 2011.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">F. El-Hassan, A. Matrawy, N. Seddigh, and B. Nandy, \u201cOn the Quantitative Evaluation Of Network Security: A Case Study of Intrusion Detection Metrics\u201d, Carleton University Technical Report SCE-08-05, May 2008<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">K. Masood and A. Matrawy, \u201cQuery Distribution Techniques For Application Aware Networking\u201d, Project Report to Alcatel-Lucent Canada, March 2007.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">A. Hijazi, H. Inoue, A. Matrawy, P.C. van Oorschot, A. Somayaji, \u201cTowards Understanding Network Traffic Through Whole Packet Analysis\u201d, Carleton University Technical Report TR-07-06, (School of Computer Science), February 2007.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">I. Al-Dalati and A. Matrawy, \u201cIssues in the Design of Secure Peer-to-Peer Voice Applications in Ad Hoc Networks\u201d, Carleton University Techincal Report SCE-07-01, January 2007.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">S. Henry, C. Kafka, D. Tudino, and A. Matrawy, \u201cA Comparison of Ad-Hoc Distributed Computing Technologies\u201d, Carleton University Technical Report, SCE-05-12, July 2005.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">B. Nandy, N. Seddigh, A. Ross, R. Makkar, A. Matrawy, and I. Lambadaris, \u201cGeospatial Mapping and Technology for Cyber Infrastructure Assurance\u201d, Solana Networks Technica Report, a research project funded by Public Safety and Emergency Preparedness Canada (PSEPC), February 2005.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">B. Nandy, P. Pieda, N. Seddigh, I. Lambadaris, A. Matrawy, and A. Hatfield, \u201cInformation Assurance Metrics\u201d, Solana Networks Technical Report, a research project funded by Public Safety and Emergency Preparedness Canada (PSEPC), March 2004.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">A. Matrawy, C. H. Lung, and I. Lambadaris, \u201cA Framework for MPLS Path Setup in Uni-Directional Multicast Shared Trees\u201d, Carleton University technical report, SCE-03-24, September 2003.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">I. Lambadaris, R. Makkar, and A. Matrawy, \u201cA study and proposal for Public Alert System using the Internet\u201d, SOMBRA LABS Technical report. Research funded by Industry Canada. June 2003.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">A. Matrawy and I. Lambadaris, \u201cSimulation results of Multicast Video in Assured Forwarding Networks\u201d, Carleton University technical report, SCE-02-09, October 2002.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">A. Matrawy and I. Lambadaris, \u201cRLM Interaction with TCP: Congestion Control and Fairness Issues\u201d, Carleton University technical report, SCE-02-05, December 2001.<\/p>\n<h2>Theses<\/h2>\n<p class=\"wp-block-latest-posts__post-excerpt\">\u201cNetwork-supported Congestion Control for Video Multicasting over IP Networks\u201d, Ph.D. Thesis, Department of Systems and Computer Engineering, Faculty of Engineering, Carleton University.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">\u201cExtraction of Control Rules for Constructing a Ship Collision Avoidance System using a Fuzzy-Neural Approach\u201d, M.Sc. Thesis, Department of Computer Science and Automatic Control, Faculty of Engineering, Alexandria University, Alexandria, Egypt.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">\u201cDocument Image Analysis and OCR\u201d, B.Sc. Graduation Project thesis, Department of Computer Science and Automatic Control, Alexandria University, Egypt.<\/p>\n<h2>Talks<\/h2>\n<p>\u201cEnabling IoT Services Through Secure 5G Core Slices\u201d, IEEE Ottawa Section, October 2019.<\/p>\n<p>\u201cEnabling IoT Services Through Secure 5G Core Slices\u201d, Faculty of Computer Science, Dalhousie University, Halifax, October 2019.<\/p>\n<p>Invited to give a seminar on \u201cEnabling IoT Services Through Secure 5G Core Slices\u201d. The seminar was hosted by the Montreal Chapter of the IEEE Systems, Man &amp; Cybernetics Society and was given at the Concordia Institute for Information Systems Engineering (CIISE), February 2019.<\/p>\n<p>Hosted by the IEEE Circuits and Systems Society joint Chapter of the Vancouver\/Victoria Sections: Presented our research on Resource Augmentation in Mobile Environments at Simon Fraser University\u2019s School of Engineering Science (Host: Prof. Trjkovic) and at the University of Victoria\u2019s Department of Computer Science (Host: Prof. Pan) .<\/p>\n<p>\u201cResearch Problems in Supporting Network Applications\u201d, School of Computing, Queen\u2019s University, August 2010.<\/p>\n<p>\u201cDesigning NDoS-Resilient Data Networks\u201d, School of Engineering, York University, March 2006.<\/p>\n<p>\u201cNetwork Denial-of-Service\u201d, the University of Ontario Institute of Technology, February 2006.<\/p>\n<p>\u201cOn the Use of Network Support to Enhance the Performance of Multimedia Applications and Network Security\u201d, Department of Computer Science, University of Calgary, April 2005.<\/p>\n<p>\u201cArchitectures for Group Communications in IP Networks\u201d, Department of Computing and Information Science, University of Guelph, August 2004.<\/p>\n<p>\u201cArchitectures for Multicast Communications in IP Networks\u201d, Concordia Institute of Information Systems Engineering, Concordia University, February 2004.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">\u201cCongestion Control for Multicast Video in IP Networks\u201d, Department of Computer Science, York University, June 2003.<\/p>\n<p class=\"wp-block-latest-posts__post-excerpt\">\u201cCongestion Control for Multicast Video in IP Networks\u201d, School of Engineering Science, Simon Fraser University, March 2003.<\/p>\n<h2>Patents<\/h2>\n<p><strong>Method of xml router network overlay topology creation<\/strong><\/p>\n<p>Bashar Bou-Diab, Khurram Masood, and Ashraf Matrawy, Patents No.WO2009040780A3. Filed on September 28, 2007.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Keynotes by Prof. Matrawy 2025: The 9th International Conference on Advanced Machine Learning Technologies and Applications, AMLTA 2025, Cairo, Egypt, Remote presentation Using Machine Learning in Network Security: A New Investigation of Adversarial Evasion Attacks. Conference Link, Presentation Link 2024: The International Conference on the Design of Reliable Communication Networks, DRCN, Montreal, Canada Using Machine [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","_mi_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":"","_links_to":"","_links_to_target":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Publications - Next Generation Networks Lab<\/title>\n<meta name=\"description\" content=\"Keynotes by Prof. Matrawy 2025: The 9th International Conference on Advanced Machine Learning Technologies and Applications, AMLTA 2025, Cairo, Egypt,\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/carleton.ca\/ngn\/publications\/\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"24 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/carleton.ca\/ngn\/publications\/\",\"url\":\"https:\/\/carleton.ca\/ngn\/publications\/\",\"name\":\"Publications - Next Generation Networks Lab\",\"isPartOf\":{\"@id\":\"https:\/\/carleton.ca\/ngn\/#website\"},\"datePublished\":\"2022-09-19T16:12:22+00:00\",\"dateModified\":\"2026-02-06T21:07:33+00:00\",\"description\":\"Keynotes by Prof. Matrawy 2025: The 9th International Conference on Advanced Machine Learning Technologies and Applications, AMLTA 2025, Cairo, Egypt,\",\"breadcrumb\":{\"@id\":\"https:\/\/carleton.ca\/ngn\/publications\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/carleton.ca\/ngn\/publications\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/carleton.ca\/ngn\/publications\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/carleton.ca\/ngn\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Publications\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/carleton.ca\/ngn\/#website\",\"url\":\"https:\/\/carleton.ca\/ngn\/\",\"name\":\"Next Generation Networks Lab\",\"description\":\"Carleton University\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/carleton.ca\/ngn\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Publications - Next Generation Networks Lab","description":"Keynotes by Prof. Matrawy 2025: The 9th International Conference on Advanced Machine Learning Technologies and Applications, AMLTA 2025, Cairo, Egypt,","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/carleton.ca\/ngn\/publications\/","twitter_misc":{"Est. reading time":"24 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/carleton.ca\/ngn\/publications\/","url":"https:\/\/carleton.ca\/ngn\/publications\/","name":"Publications - Next Generation Networks Lab","isPartOf":{"@id":"https:\/\/carleton.ca\/ngn\/#website"},"datePublished":"2022-09-19T16:12:22+00:00","dateModified":"2026-02-06T21:07:33+00:00","description":"Keynotes by Prof. Matrawy 2025: The 9th International Conference on Advanced Machine Learning Technologies and Applications, AMLTA 2025, Cairo, Egypt,","breadcrumb":{"@id":"https:\/\/carleton.ca\/ngn\/publications\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/carleton.ca\/ngn\/publications\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/carleton.ca\/ngn\/publications\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/carleton.ca\/ngn\/"},{"@type":"ListItem","position":2,"name":"Publications"}]},{"@type":"WebSite","@id":"https:\/\/carleton.ca\/ngn\/#website","url":"https:\/\/carleton.ca\/ngn\/","name":"Next Generation Networks Lab","description":"Carleton University","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/carleton.ca\/ngn\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"acf":{"banner_image_type":"none","banner_button":"no","banner_hosted_image":"eng-electrical","banner_opacity":"default"},"_links":{"self":[{"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/pages\/35"}],"collection":[{"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/comments?post=35"}],"version-history":[{"count":5,"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/pages\/35\/revisions"}],"predecessor-version":[{"id":1061,"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/pages\/35\/revisions\/1061"}],"wp:attachment":[{"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/media?parent=35"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}