default search action
Farah I. Kandah
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c25]Brennan Huber, Farah I. Kandah:
DECAY: Dynamic Evaluation and Component Analysis for Enhancing Trust Management. ICCE 2024: 1-6 - [c24]Brennan Huber, Farah I. Kandah:
Zero Trust+: A Trusted-based Zero Trust architecture for IoT at Scale. ICCE 2024: 1-6 - [c23]Lalith Medury, Farah I. Kandah:
B2-C2: Blockchain-based Flow Control Consistency for Multi-Controller SDN Architecture. ICCE 2024: 1-6 - [c22]William Luke Lambert, Sheikh K. Ghafoor, Haley Burnell, Brennan Huber, Farah I. Kandah, Anthony Skjellum:
Design and Development of XiveNet: A Hybrid CAN Research Testbed. ISPDC 2024: 1-8 - [c21]Haofan Wang, Farah I. Kandah:
Multi-Critics Generative Adversarial Networks for Imbalanced Data in Intrusion Detection System. SmartNets 2024: 1-6 - 2023
- [j11]Brennan Huber, Farah I. Kandah, Anthony Skjellum:
BEAST: Behavior as a Service for Trust management in IoT devices. Future Gener. Comput. Syst. 144: 165-178 (2023) - 2022
- [j10]Joshua H. Tyler, Donald R. Reising, Farah I. Kandah, Erkan Kaplanoglu, Mohamed K. M. Fadul:
Physical Layer-Based IoT Security: An Investigation Into Improving Preamble-Based SEI Performance When Using Multiple Waveform Collections. IEEE Access 10: 133601-133616 (2022) - [c20]Adam Dean, Brennan Huber, Farah I. Kandah:
Mitigating Location-based Attacks Using Predication Models in Vehicular Ad-Hoc Networks. CCNC 2022: 605-610 - [c19]Jonathan Hunter, Brennan Huber, Farah I. Kandah:
Towards feasibility of Deep-Learning based Intrusion Detection System for IoT Embedded Devices. CCNC 2022: 947-948 - [c18]Joshua H. Tyler, Mohamed K. M. Fadul, Donald R. Reising, Farah I. Kandah:
An Analysis of Signal Energy Impacts and Threats to Deep Learning Based SEI. ICC 2022: 2077-2083 - 2021
- [j9]Donald R. Reising, Joseph Cancelleri, T. Daniel Loveless, Farah I. Kandah, Anthony Skjellum:
Radio Identity Verification-Based IoT Security Using RF-DNA Fingerprints and SVM. IEEE Internet Things J. 8(10): 8356-8371 (2021) - 2020
- [j8]Farah I. Kandah, Jesse Whitehead, Peyton Ball:
Towards trusted and energy-efficient data collection in unattended wireless sensor networks. Wirel. Networks 26(7): 5455-5471 (2020) - [c17]Jacob Coleman, Farah I. Kandah, Brennan Huber:
Behavioral Model Anomaly Detection in Automatic Identification Systems (AIS). CCWC 2020: 481-487 - [c16]Farah I. Kandah, Ilker Özçelik, Brennan Huber:
MARS: Machine learning based Adaptable and Robust Network Management for Software-defined Networks. CCWC 2020: 586-591 - [c15]Amani Altarawneh, Tom Herschberg, Sai Medury, Farah I. Kandah, Anthony Skjellum:
Buterin's Scalability Trilemma viewed through a State-change-based Classification for Common Consensus Algorithms. CCWC 2020: 727-736 - [c14]Brennan Huber, Farah I. Kandah:
Behavioral Model based Trust Management design for IoT at Scale. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2020: 9-17 - [i1]Donald R. Reising, Joseph Cancelleri, T. Daniel Loveless, Farah I. Kandah, Anthony Skjellum:
Pre-print: Radio Identity Verification-based IoT Security Using RF-DNA Fingerprints and SVM. CoRR abs/2005.09503 (2020)
2010 – 2019
- 2019
- [j7]Steven Schmitt, Farah I. Kandah:
Denial of Service Attacks Prevention using Traffic Pattern Recognition over Software-Defined Network. EAI Endorsed Trans. Ambient Syst. 6(18): e1 (2019) - [c13]Farah I. Kandah, Brennan Huber, Anthony Skjellum, Amani Altarawneh:
A Blockchain-based Trust Management Approach for Connected Autonomous Vehicles in Smart Cities. CCWC 2019: 544-549 - [c12]Farah I. Kandah, Brennan Huber, Amani Altarawneh, Sai Medury, Anthony Skjellum:
BLAST: Blockchain-based Trust Management in Smart Cities and Connected Vehicles Setup. HPEC 2019: 1-7 - [c11]Steven Schmitt, Farah I. Kandah, Dylan Brownell:
Intelligent Threat Hunting in Software-Defined Networking. ICCE 2019: 1-5 - [c10]Farah I. Kandah, Joseph Cancelleri, Donald R. Reising, Amani Altarawneh, Anthony Skjellum:
A Hardware-Software Codesign Approach to Identity, Trust, and Resilience for IoT/CPS at Scale. iThings/GreenCom/CPSCom/SmartData 2019: 1125-1134 - 2017
- [c9]Farah I. Kandah, Oliver Nichols, Li Yang:
Efficient key management for Big Data gathering in dynamic sensor networks. ICNC 2017: 667-671 - [c8]Farah I. Kandah, Jesse Whitehead:
Cluster-Based Dynamic Backup in Cognitive Radio Networks. ICNC 2017: 740-744 - 2015
- [c7]Farah I. Kandah, Jesse Whitehead:
Energy-aware Multipath Provisioning in wireless mesh networks. CCNC 2015: 473-478 - [c6]Farah I. Kandah, Adrian Powell:
Ultimate control and security over data localization in the cloud. ICNC 2015: 123-127 - 2013
- [j6]Farah I. Kandah, Yashaswi Singh, Weiyi Zhang, Chonggang Wang:
Mitigating colluding injected attack using monitoring verification in mobile ad-hoc networks. Secur. Commun. Networks 6(4): 539-547 (2013) - [c5]Farah I. Kandah, Yashaswi Singh, Weiyi Zhang, Yulu Ma:
Mitigating Misleading Routing Attack using path signature in Mobile Ad-Hoc Networks. GLOBECOM 2013: 617-622 - 2012
- [j5]Farah I. Kandah, Yashaswi Singh, Weiyi Zhang, Tie Wang:
A misleading active routing attack in mobile ad-hoc networks. Int. J. Secur. Networks 7(1): 17-29 (2012) - [j4]Farah I. Kandah, Yashaswi Singh, Weiyi Zhang:
Mitigating Eavesdropping Attack Using Secure Key Management Scheme in Wireless Mesh Networks. J. Commun. 7(8): 596-605 (2012) - [j3]Farah I. Kandah, Weiyi Zhang, Chonggang Wang, Juan Li:
Diverse Path Routing with Interference and Reusability Consideration in Wireless Mesh Networks. Mob. Networks Appl. 17(1): 100-109 (2012) - [j2]Weiyi Zhang, Farah I. Kandah, Xiaojiang Du, Chonggang Wang:
Self-protecting networking using dynamic p-cycle construction within link capacity constraint. Secur. Commun. Networks 5(6): 689-708 (2012) - 2011
- [j1]Weiyi Zhang, Farah I. Kandah, Chonggang Wang, Hongxiang Li:
Dynamic light trail routing in WDM optical networks. Photonic Netw. Commun. 21(1): 78-89 (2011) - [c4]Farah I. Kandah, Yashaswi Singh, Weiyi Zhang, Tie Wang:
MIRA: Misleading Routing Attack in Mobile Ad-Hoc Networks. GLOBECOM 2011: 1-5 - [c3]Farah I. Kandah, Weiyi Zhang, Xiaojiang Du, Yashaswi Singh:
A Secure Key Management Scheme in Wireless Mesh Networks. ICC 2011: 1-5 - 2010
- [c2]Weiyi Zhang, Farah I. Kandah, Jian Tang, Kendall E. Nygard:
Interference-Aware Robust Topology Design in Multi-Channel Wireless Mesh Networks. CCNC 2010: 1-5 - [c1]Farah I. Kandah, Weiyi Zhang, Yashaswi Singh, Juan Li:
Interference-Aware Robust Wireless Mesh Network Design. GLOBECOM 2010: 1-5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-04 20:40 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint