Skip to main content

Showing 1–24 of 24 results for author: Afifi, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2303.13532  [pdf, other

    cs.AI

    Enhanced Iterated local search for the technician routing and scheduling problem

    Authors: Ala-Eddine Yahiaoui, Sohaib Afifi, Hamid Afifi

    Abstract: Most public facilities in the European countries, including France, Germany, and the UK, were built during the reconstruction projects between 1950 and 1980. Owing to the deteriorating state of such vital infrastructure has become relatively expensive in the recent decades. A significant part of the maintenance operation costs is spent on the technical staff. Therefore, the optimal use of the avai… ▽ More

    Submitted 12 March, 2023; originally announced March 2023.

    Comments: Submitted manuscript to Computers and Operations Research journal. 34 pages, 7 figures, 6 tables

  2. arXiv:2110.01262  [pdf, other

    cs.NI cs.LG

    Reinforcement Learning for Admission Control in Wireless Virtual Network Embedding

    Authors: Haitham Afifi, Fabian Sauer, Holger Karl

    Abstract: Using Service Function Chaining (SFC) in wireless networks became popular in many domains like networking and multimedia. It relies on allocating network resources to incoming SFCs requests, via a Virtual Network Embedding (VNE) algorithm, so that it optimizes the performance of the SFC. When the load of incoming requests -- competing for the limited network resources - increases, it becomes chall… ▽ More

    Submitted 4 October, 2021; originally announced October 2021.

  3. arXiv:2011.04723  [pdf, other

    cs.SI cs.LG

    F-FADE: Frequency Factorization for Anomaly Detection in Edge Streams

    Authors: Yen-Yu Chang, Pan Li, Rok Sosic, M. H. Afifi, Marco Schweighauser, Jure Leskovec

    Abstract: Edge streams are commonly used to capture interactions in dynamic networks, such as email, social, or computer networks. The problem of detecting anomalies or rare events in edge streams has a wide range of applications. However, it presents many challenges due to lack of labels, a highly dynamic nature of interactions, and the entanglement of temporal and structural changes in the network. Curren… ▽ More

    Submitted 5 February, 2021; v1 submitted 9 November, 2020; originally announced November 2020.

    Comments: WSDM 2021

  4. arXiv:2007.14030  [pdf, other

    cs.CR cs.SI

    A Large-Scale Analysis of Attacker Activity in Compromised Enterprise Accounts

    Authors: Neil Shah, Grant Ho, Marco Schweighauser, M. H. Afifi, Asaf Cidon, David Wagner

    Abstract: We present a large-scale characterization of attacker activity across 111 real-world enterprise organizations. We develop a novel forensic technique for distinguishing between attacker activity and benign activity in compromised enterprise accounts that yields few false positives and enables us to perform fine-grained analysis of attacker behavior. Applying our methods to a set of 159 compromised… ▽ More

    Submitted 28 July, 2020; originally announced July 2020.

    Comments: Extended report of workshop paper presented at the 1st MLHat Workshop (MLHat Security and ML 2020). KDD, 2020

  5. Driving Path Stability in VANETs

    Authors: Mohammed Laroui, Akrem Sellami, Boubakr Nour, Hassine Moungla, Hossam Afifi, Sofiane B. Hacene

    Abstract: Vehicular Ad Hoc Network has attracted both research and industrial community due to its benefits in facilitating human life and enhancing the security and comfort. However, various issues have been faced in such networks such as information security, routing reliability, dynamic high mobility of vehicles, that influence the stability of communication. To overcome this issue, it is necessary to in… ▽ More

    Submitted 19 June, 2019; originally announced June 2019.

  6. arXiv:1712.06676  [pdf, other

    cs.NI

    MARVELO: Wireless Virtual Network Embedding for Overlay Graphs with Loops

    Authors: Haitham Afifi, Sebastien Auroux, Holger Karl

    Abstract: When deploying resource-intensive signal processing applications in wireless sensor or mesh networks, distributing processing blocks over multiple nodes becomes promising. Such distributed applications need to solve the placement problem (which block to run on which node), the routing problem (which link between blocks to map on which path between nodes), and the scheduling problem (which transmis… ▽ More

    Submitted 18 December, 2017; originally announced December 2017.

    Comments: 6 pages

  7. arXiv:1608.08365  [pdf, other

    cs.NI

    Scalable and Cost Efficient Algorithms for Virtual CDN Migration

    Authors: Hatem Ibn-Khedher, Makhlouf Hadji, Emad Abd-Elrahman, Hossam Afifi, Ahmed E. Kamal

    Abstract: Virtual Content Delivery Network (vCDN) migration is necessary to optimize the use of resources and improve the performance of the overall SDN/NFV-based CDN function in terms of network operator cost reduction and high streaming quality. It requires intelligent and enticed joint SDN/NFV migration algorithms due to the evident huge amount of traffic to be delivered to end customers of the network.… ▽ More

    Submitted 30 August, 2016; originally announced August 2016.

    Comments: 9 pages, 11 figures, 4 tableaux, conference Local Computer Networks (LCN), class A

  8. arXiv:1602.08472  [pdf, ps, other

    cs.CR

    ExpSOS: Secure and Verifiable Outsourcing of Exponentiation Operations for Mobile Cloud Computing

    Authors: Kai Zhou, M. H. Afifi, Jian Ren

    Abstract: Discrete exponential operation, such as modular exponentiation and scalar multiplication on elliptic curves, is a basic operation of many public-key cryptosystems. However, the exponential operations are considered prohibitively expensive for resource-constrained mobile devices. In this paper, we address the problem of secure outsourcing of exponentiation operations to one single untrusted server.… ▽ More

    Submitted 26 February, 2016; originally announced February 2016.

    Comments: 28 pages, journal paper

  9. arXiv:1602.00448  [pdf

    cs.NI

    Network planning tool based on network classification and load prediction

    Authors: Seif eddine Hammami, Hossam Afifi, Michel Marot, Vincent Gauthier

    Abstract: Real Call Detail Records (CDR) are analyzed and classified based on Support Vector Machine (SVM) algorithm. The daily classification results in three traffic classes. We use two different algorithms, K-means and SVM to check the classification efficiency. A second support vector regression (SVR) based algorithm is built to make an online prediction of traffic load using the history of CDRs. Then,… ▽ More

    Submitted 1 February, 2016; originally announced February 2016.

    Comments: The article has 6 pages, 8 figures and is accepted to be presented at WCNC'16

  10. On the Maximal Shortest Path in a Connected Component in V2V

    Authors: Michel Marot, Adel Mounir Saïd, Hossam Afifi

    Abstract: In this work, a VANET (Vehicular Ad-hoc NETwork) is considered to operate on a simple lane, without infrastructure. The arrivals of vehicles are assumed to be general with any traffic and speed assumptions. The vehicles communicate through the shortest path. In this paper, we study the probability distribution of the number of hops on the maximal shortest path in a connected component of vehicles.… ▽ More

    Submitted 8 October, 2015; originally announced October 2015.

    Comments: Accepted for publication in Performance Evaluation

  11. arXiv:1508.02679  [pdf, other

    cs.NI

    Network Issues in Virtual Machine Migration

    Authors: Hatem Ibn-Khedher, Emad Abd-Elrahman, Hossam Afifi, Jacky Forestier

    Abstract: Software Defined Networking (SDN) is based basically on three features: centralization of the control plane, programmability of network functions and traffic engineering. The network function migration poses interesting problems that we try to expose and solve in this paper. Content Distribution Network virtualization is presented as use case.

    Submitted 6 January, 2017; v1 submitted 11 August, 2015; originally announced August 2015.

    Comments: 6 pages, 8 figures

  12. arXiv:1502.05817  [pdf

    cs.NI

    A Hybrid Model to Extend Vehicular Intercommunication V2V through D2D Architecture

    Authors: Emad Abd-Elrahman, Adel Mounir Said, Thouraya Toukabri, Hossam Afifi, Michel Marot

    Abstract: In the recent years, many solutions for Vehicle to Vehicle (V2V) communication were proposed to overcome failure problems (also known as dead ends). This paper proposes a novel framework for V2V failure recovery using Device-to-Device (D2D) communications. Based on the unified Intelligent Transportation Systems (ITS) architecture, LTE-based D2D mechanisms can improve V2V dead ends failure recovery… ▽ More

    Submitted 20 February, 2015; originally announced February 2015.

    Comments: 6 pages

  13. arXiv:1502.01496  [pdf

    cs.NI

    Assisting V2V failure recovery using Device-to-Device Communications

    Authors: Emad Abd-Elrahman, Adel Mounir Said, Thouraya Toukabri, Hossam Afifi, Michel Marot

    Abstract: This paper aims to propose a new solution for failure recovery (dead-ends) in Vehicle to Vehicle (V2V) communications through LTE-assisted Device-to-Device communications (D2D). Based on the enhanced networking capabilities offered by Intelligent Transportation Systems (ITS) architecture, our solution can efficiently assist V2V communications in failure recovery situations. We also derive an analy… ▽ More

    Submitted 5 February, 2015; originally announced February 2015.

    Comments: 3 pages

  14. arXiv:1502.01122  [pdf

    cs.CR cs.MM cs.NI

    Hash Chain Links Resynchronization Methods in Video Streaming Security Performance Comparison

    Authors: Emad Abd-Elrahman, Mohamed Boutabia, Hossam Afifi

    Abstract: Hash chains provide a secure and light way of security to data authentication including two aspects: Data Integrity and Data Origin Authentication. The real challenge of using the hash chains is how it could recover the synchronization state and continue kee** the hash link in case of packet loss? Based on the packet loss tolerance and some accepted delay of video delivery which are representing… ▽ More

    Submitted 4 February, 2015; originally announced February 2015.

    Comments: 12 pages

  15. arXiv:1502.01120  [pdf

    cs.NI cs.MM

    Optimization of Quality of Experience through File Duplication in Video Sharing Servers

    Authors: Emad Abd-Elrahman, Tarek Rekik, Hossam Afifi

    Abstract: Consumers of short videos on Internet can have a bad Quality of Experience QoE due to the long distance between the consumers and the servers that hosting the videos. We propose an optimization of the file allocation in telecommunication operators content sharing servers to improve the QoE through files duplication, thus bringing the files closer to the consumers. This optimization allows the netw… ▽ More

    Submitted 4 February, 2015; originally announced February 2015.

    Comments: 6 pages

    ACM Class: C.2.1

  16. Hybrid model for LTE Network-Assisted D2D communications

    Authors: Thouraya Toukabri Gunes, Hossam Afifi

    Abstract: New Architecture to support D2D communications, where discovery is made directly between devices while communications occur with the help of the E-Node B

    Submitted 31 January, 2015; originally announced February 2015.

  17. arXiv:1305.5675  [pdf, other

    cs.NI

    Large Scale Model for Information Dissemination with Device to Device Communication using Call Details Records

    Authors: Rachit Agarwal, Vincent Gauthier, Monique Becker, Thouraya Toukabri, Hossam Afifi

    Abstract: In a network of devices in close proximity such as Device to Device ($D2D$) communication, we study the dissemination of public safety information at country scale level. In order to provide a realistic model for the information dissemination, we extract a spatial distribution of the population of Ivory Coast from census data and determine migration pattern from the Call Detail Records ($CDR$) obt… ▽ More

    Submitted 30 December, 2014; v1 submitted 24 May, 2013; originally announced May 2013.

    Comments: Accepted in Computer Communications journal

  18. arXiv:1301.1268  [pdf, other

    cs.NI cs.GT

    Cooperation Optimized Design for Information Dissemination in Vehicular Networks using Evolutionary Game Theory

    Authors: Abhik Banerjee, Vincent Gauthier, Houda Labiod, Hossam Afifi

    Abstract: We present an evolutionary game theoretic approach to study node cooperation behavior in wireless ad hoc networks. Evolutionary game theory (EGT) has been used to study the conditions governing the growth of cooperation behavior in biological and social networks. We propose a model of node cooperation behavior in dynamic wireless networks such as vehicular networks. Our work is motivated by the fa… ▽ More

    Submitted 7 January, 2013; originally announced January 2013.

  19. arXiv:1206.1358  [pdf, ps, other

    cs.NI

    Broadcast-based Directional Routing in Vehicular Ad-Hoc Networks

    Authors: Ahmed Soua, Walid Ben Ameur, Hossam Afifi

    Abstract: An optimized broadcast protocol is proposed for VANETs. It is based on two key information: the direction to the destination and the beamforming angle θ. The efficiency of this technique is demonstrated in terms of packet delivery, bandwidth gain and probability of transmission success. An analytical model is developed to calculate the transmission area. This model allows capturing the propagation… ▽ More

    Submitted 6 June, 2012; originally announced June 2012.

  20. A Cross-Layer Design Based on Geographic Information for Cooperative Wireless Networks

    Authors: Teck Aguilar, Mohamed Chedly Ghedira, Syue-Ju Syue, Vincent Gauthier, Hossam Afifi, Chin-Liang Wang

    Abstract: Most of geographic routing approaches in wireless ad hoc and sensor networks do not take into consideration the medium access control (MAC) and physical layers when designing a routing protocol. In this paper, we focus on a cross-layer framework design that exploits the synergies between network, MAC, and physical layers. In the proposed CoopGeo, we use a beaconless forwarding scheme where the nex… ▽ More

    Submitted 5 June, 2012; originally announced June 2012.

    Comments: in 2010 IEEE 71st Vehicular Technology Conference, 2010

  21. CoopGeo: A Beaconless Geographic Cross-Layer Protocol for Cooperative Wireless Ad Hoc Networks

    Authors: Teck Aguilar, Syue-Ju Syue, Vincent Gauthier, Hossam Afifi, Chin-Liang Wang

    Abstract: Cooperative relaying has been proposed as a promising transmission technique that effectively creates spatial diversity through the cooperation among spatially distributed nodes. However, to achieve efficient communications while gaining full benefits from cooperation, more interactions at higher protocol layers, particularly the MAC (Medium Access Control) and network layers, are vitally required… ▽ More

    Submitted 17 May, 2012; originally announced May 2012.

    Journal ref: IEEE Transactions on Wireless Communications (2011)

  22. A Self-Organization Framework for Wireless Ad Hoc Networks as Small Worlds

    Authors: Abhik Banerjee, Rachit Agarwal, Vincent Gauthier, Chai Kiat Yeo, Hossam Afifi, Bu Sung Lee

    Abstract: Motivated by the benefits of small world networks, we propose a self-organization framework for wireless ad hoc networks. We investigate the use of directional beamforming for creating long-range short cuts between nodes. Using simulation results for randomized beamforming as a guideline, we identify crucial design issues for algorithm design. Our results show that, while significant path length r… ▽ More

    Submitted 6 March, 2012; originally announced March 2012.

    Comments: Submitted to IEEE Transactions on Vehicular Technology

  23. Self-Organization of Wireless Ad Hoc Networks as Small Worlds Using Long Range Directional Beams

    Authors: Abhik Banerjee, Rachit Agarwal, Vincent Gauthier, Chai Kiat Yeo, Hossam Afifi, Bu Sung Lee

    Abstract: We study how long range directional beams can be used for self-organization of a wireless network to exhibit small world properties. Using simulation results for randomized beamforming as a guideline, we identify crucial design issues for algorithm design. Subsequently, we propose an algorithm for deterministic creation of small worlds. We define a new centrality measure that estimates the structu… ▽ More

    Submitted 25 September, 2011; originally announced September 2011.

    Comments: Accepted to Joint workshop on complex networks and pervasive group communication (CCNet/PerGroup), in conjunction with IEEE Globecom 2011

  24. arXiv:1004.0762  [pdf

    cs.CR cs.MM

    Integrating identity-based cryptography in IMS service authentication

    Authors: Mohamed Abid, Songbo Song, Hassnaa Moustafa, Hossam Afifi

    Abstract: Nowadays, the IP Multimedia Subsystem (IMS) is a promising research field. Many ongoing works related to the security and the performances of its employment are presented to the research community. Although, the security and data privacy aspects are very important in the IMS global objectives, they observe little attention so far. Secure access to multimedia services is based on SIP and HTTP diges… ▽ More

    Submitted 5 April, 2010; originally announced April 2010.

    Comments: 13Pages

    Journal ref: International Journal of Network Security & Its Applications 1.3 (2009) 1-13