Skip to main content

Showing 1–6 of 6 results for author: Abdelrahman, O

.
  1. arXiv:2204.05397  [pdf, other

    cs.AI cs.CY

    Accelerated Design and Deployment of Low-Carbon Concrete for Data Centers

    Authors: Xiou Ge, Richard T. Goodwin, Haizi Yu, Pablo Romero, Omar Abdelrahman, Amruta Sudhalkar, Julius Kusuma, Ryan Cialdella, Nishant Garg, Lav R. Varshney

    Abstract: Concrete is the most widely used engineered material in the world with more than 10 billion tons produced annually. Unfortunately, with that scale comes a significant burden in terms of energy, water, and release of greenhouse gases and other pollutants; indeed 8% of worldwide carbon emissions are attributed to the production of cement, a key ingredient in concrete. As such, there is interest in c… ▽ More

    Submitted 11 April, 2022; originally announced April 2022.

    Comments: 18 pages. arXiv admin note: text overlap with arXiv:1905.08222

  2. Storms in Mobile Networks

    Authors: Gokce Gorbil, Omer H. Abdelrahman, Mihajlo Pavloski, Erol Gelenbe

    Abstract: Mobile networks are vulnerable to signalling attacks and storms that are caused by traffic patterns that overload the control plane, and differ from distributed denial of service (DDoS) attacks in the Internet since they directly attack the control plane, and also reserve wireless bandwidth without actually using it. Such attacks can result from malware and mobile botnets, as well as from poorly d… ▽ More

    Submitted 5 November, 2014; originally announced November 2014.

    Comments: Submitted to the IEEE TETC special issue on "Emerging topics in Cyber Security"

  3. Search in the Universe of Big Networks and Data

    Authors: Erol Gelenbe, Omer H. Abdelrahman

    Abstract: Searching in the Internet for some object characterised by its attributes in the form of data, such as a hotel in a certain city whose price is less than something, is one of our most common activities when we access the Web. We discuss this problem in a general setting, and compute the average amount of time and the energy it takes to find an object in an infinitely large search space. We conside… ▽ More

    Submitted 12 May, 2014; originally announced May 2014.

    Comments: IEEE Network Magazine - Special Issue on Networking for Big Data, July-August 2014

  4. arXiv:1405.2735  [pdf, other

    cs.NI cs.CR cs.PF

    Signalling Storms in 3G Mobile Networks

    Authors: Omer H. Abdelrahman, Erol Gelenbe

    Abstract: We review the characteristics of signalling storms that have been caused by certain common apps and recently observed in cellular networks, leading to system outages. We then develop a mathematical model of a mobile user's signalling behaviour which focuses on the potential of causing such storms, and represent it by a large Markov chain. The analysis of this model allows us to determine the key p… ▽ More

    Submitted 12 May, 2014; originally announced May 2014.

    Comments: IEEE ICC 2014 - Communications and Information Systems Security Symposium

  5. arXiv:1305.4210  [pdf, other

    cs.CR cs.NI

    Mobile Network Anomaly Detection and Mitigation: The NEMESYS Approach

    Authors: Omer H. Abdelrahman, Erol Gelenbe, Gökçe Görbil, Boris Oklander

    Abstract: Mobile malware and mobile network attacks are becoming a significant threat that accompanies the increasing popularity of smart phones and tablets. Thus in this paper we present our research vision that aims to develop a network-based security solution combining analytical modelling, simulation and learning, together with billing and control-plane data, to detect anomalies and attacks, and elimina… ▽ More

    Submitted 17 May, 2013; originally announced May 2013.

    Comments: To Appear in the Proceedings of the 28th International Symposium on Computer and Information Sciences (ISCIS 2013), Springer LNEE

  6. arXiv:1305.3578  [pdf, other

    cond-mat.stat-mech cs.PF

    Search in Random Media with Lévy Flights

    Authors: Erol Gelenbe, Omer H. Abdelrahman

    Abstract: We review some of our work regarding search which has been motivated by a variety of applications in engineering and technology, including traffic routing and security in communication networks, explosive mine detection and removal, tactical operations as well as emergency management. We develop the basic mathematical model representing N searchers that proceed independently, and which can be affe… ▽ More

    Submitted 15 July, 2013; v1 submitted 15 May, 2013; originally announced May 2013.

    Comments: To appear in the special volume "First-Passage Phenomena and Their Applications", Eds. R. Metzler, G. Oshanin, S. Redner. World Scientific (2013); Final version, added two figures