Personal Information
Organization / Workplace
Lebanon Lebanon
Occupation
Computer Scientist - Cyberspace Engineering and Defense
About
I am a research scientist working on world class cyber-security research and cutting-edge technology. I had research grants from US Air Force Research Laboratory, Nevada NASA Space and National Security Agency (NSA) Information Assurance and European Union.
I am fortunate to have had the opportunity to work with academic scientists from Princeton University, MIT and Rutgers University and University of Oxford. I collaborated as well with industrial research engineers from Orange Labs in France, Nokia Bell labs and Honeywell Inc ACS Labs.
I published my research findings in scientific journals and conferences such as IEEE Communications Magazine journal (top 1 Journal in Computer Ne...
Tags
game theory
testing
wireless security
dos
jamming
evaluation
countermeasures
transport protocol
internet
ddos
learning networking
computer networks
denialofservice
cybersecurity
tcp
telecommunication security
computer crime
ip networks
distributed denial of service attack
distributed processing
cyber attacks
See more
Personal Information
Organization / Workplace
Lebanon Lebanon
Occupation
Computer Scientist - Cyberspace Engineering and Defense
About
I am a research scientist working on world class cyber-security research and cutting-edge technology. I had research grants from US Air Force Research Laboratory, Nevada NASA Space and National Security Agency (NSA) Information Assurance and European Union.
I am fortunate to have had the opportunity to work with academic scientists from Princeton University, MIT and Rutgers University and University of Oxford. I collaborated as well with industrial research engineers from Orange Labs in France, Nokia Bell labs and Honeywell Inc ACS Labs.
I published my research findings in scientific journals and conferences such as IEEE Communications Magazine journal (top 1 Journal in Computer Ne...
Tags
game theory
testing
wireless security
dos
jamming
evaluation
countermeasures
transport protocol
internet
ddos
learning networking
computer networks
denialofservice
cybersecurity
tcp
telecommunication security
computer crime
ip networks
distributed denial of service attack
distributed processing
cyber attacks
See more