Now showing items 1-17 of 17

    • 5G RAN/MEC Slicing and Admission Control using Deep Reinforcement Learning 

      Moayyedi, Arash (University of Waterloo, 2023-01-19)
      The 5G RAN functions can be virtualized and distributed across the radio unit (RU), distributed unit (DU), and centralized unit (CU) to facilitate flexible resource management. Complemented by multi-access edge computing ...
    • Adapting to Data Drift in Encrypted Traffic Classification Using Deep Learning 

      Malekghaini, Navid (University of Waterloo, 2023-01-12)
      Deep learning models have shown to achieve high performance in encrypted traffic classification. However, when it comes to production use, multiple factors challenge the performance of these models. The emergence of new ...
    • BotChase: Graph-Based Bot Detection Using Machine Learning 

      Abou Daya, Abbas (University of Waterloo, 2019-05-21)
      Bot detection using machine learning (ML), with network flow-level features, has been extensively studied in the literature. However, existing flow-based approaches typically incur a high computational overhead and do not ...
    • Detecting Network Intrusions from Authentication Logs 

      Bian, Haibo (University of Waterloo, 2019-09-19)
      Recently, network infiltrations due to advanced persistent threats (APTs) have grown significantly, resulting in considerable loses to businesses and organizations. APTs are stealthy attacks with the primary objective of ...
    • Dynamic Security Orchestration System Leveraging Machine Learning 

      Jalalpour, Elaheh (University of Waterloo, 2018-09-20)
      A Content Delivery Network (CDN) employs edge-servers caching content close to end-users to provide high Quality of Service (QoS) in serving digital content. Attacks against edge-servers are known to cause QoS degradation ...
    • Encrypted Web Traffic Classification Using Deep Learning 

      Akbari Azirani, Iman (University of Waterloo, 2021-05-19)
      Traffic classification is essential in network management for operations ranging from capacity planning, performance monitoring, volumetry, and resource provisioning, to anomaly detection and security. Recently, it has ...
    • On the Integration of Unmanned Aerial Vehicles into Public Airspace 

      Gharibi, Mirmojtaba (University of Waterloo, 2020-05-28)
      Unmanned Aerial Vehicles will soon be integrated in the airspace and start serving us in various capacities such as package delivery, surveillance, search and rescue missions, inspection of infrastructure, precision ...
    • Resource Management in Softwarized Networks 

      Chowdhury, Shihabur (University of Waterloo, 2021-02-23)
      Communication networks are undergoing a major transformation through softwarization, which is changing the way networks are designed, operated, and managed. Network Softwarization is an emerging paradigm where software ...
    • Resource Orchestration in Softwarized Networks 

      Bari, Md. Faizul (University of Waterloo, 2018-09-24)
      Network softwarization is an emerging research area that is envisioned to revolutionize the way network infrastructure is designed, operated, and managed today. Contemporary telecommunication networks are going through a ...
    • Scalable and Reliable Middlebox Deployment 

      Ghaznavi, Milad (University of Waterloo, 2020-05-28)
      Middleboxes are pervasive in modern computer networks providing functionalities beyond mere packet forwarding. Load balancers, intrusion detection systems, and network address translators are typical examples of middleboxes. ...
    • Security Configuration Management in Intrusion Detection and Prevention Systems 

      Alsubhi, Khalid (University of Waterloo, 2016-04-18)
      Intrusion Detection and/or Prevention Systems (IDPS) represent an important line of defense against a variety of attacks that can compromise the security and proper functioning of an enterprise information system. IDPSs ...
    • Soteria: An Approach for Detecting Multi-Institution Attacks 

      Zabarah, Saif (University of Waterloo, 2023-01-02)
      We present Soteria, a data processing pipeline for detecting multi-institution attacks. Multi-institution attacks contact large number of potential targets looking for vulnerabilities that span multiple institutions. Soteria ...
    • SURF: Software Update Registration Framework 

      Kim, Woojung (University of Waterloo, 2018-10-25)
      BlockSURF (Blockchain-based Secure Update Registration Framework) or SURF, in short, is a software framework designed to enable developers to build a blockchain-based secure update system which distributes trust over a ...
    • Survivable Virtual Network Embedding in Transport Networks 

      Shahriar, Nashid (University of Waterloo, 2020-07-28)
      Network Virtualization (NV) is perceived as an enabling technology for the future Internet and the 5th Generation (5G) of mobile networks. It is becoming increasingly difficult to keep up with emerging applications’ Quality ...
    • Themelio: a new blockchain paradigm 

      Dong, Yuhao (University of Waterloo, 2023-10-10)
      Public blockchains hold great promise in building protocols that uphold security properties like transparency and consistency based on internal, incentivized cryptoeconomic mechanisms rather than preexisting trust in ...
    • UNiS: A User-space Non-intrusive Workflow-aware Virtual Network Function Scheduler 

      Anthony, Anthony (University of Waterloo, 2019-01-16)
      Network Function Virtualization (NFV) has gained a significant research interest in both academia and industry since its inception in the late 2012. One of the key research issues in NFV is the development of systems for ...
    • Virtual Network Embedding with Path-based Latency Guarantees in Elastic Optical Networks 

      Taeb, Sepehr (University of Waterloo, 2019-10-21)
      Elastic Optical Network (EON) virtualization has recently emerged as an enabling technology for 5G network slicing. A fundamental problem in EON slicing (known as Virtual Network Embedding (VNE)) is how to efficiently map ...


      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages