A taxonomy of wireless micro-sensor network models S Tilak, NB Abu-Ghazaleh, W Heinzelman ACM SIGMOBILE Mobile Computing and Communications Review 6 (2), 28-36, 2002 | 1782 | 2002 |
Algorithms and protocols for wireless sensor networks A Boukerche | 814 | 2009 |
Preemptive routing in ad hoc networks T Goff, NB Abu-Ghazaleh, DS Phatak, R Kahvecioglu Proceedings of the 7th annual international conference on Mobile computing …, 2001 | 500 | 2001 |
Infrastructure tradeoffs for sensor networks S Tilak, NB Abu-Ghazaleh, W Heinzelman Proceedings of the 1st ACM international workshop on Wireless sensor …, 2002 | 414 | 2002 |
Spectre returns! speculation attacks using the return stack buffer EM Koruyeh, KN Khasawneh, C Song, N Abu-Ghazaleh 12th USENIX Workshop on Offensive Technologies (WOOT 18), 2018 | 380 | 2018 |
Jump over ASLR: Attacking branch predictors to bypass ASLR D Evtyushkin, D Ponomarev, N Abu-Ghazaleh 2016 49th Annual IEEE/ACM International Symposium on Microarchitecture …, 2016 | 357 | 2016 |
Branchscope: A new side-channel attack on directional branch predictor D Evtyushkin, R Riley, N Abu-Ghazaleh, D Ponomarev Proc. ASPLOS 2018 53 (2), 693-707, 2018 | 348 | 2018 |
Guide to wireless sensor networks M Sudip, W Isaac, MS Chandra Computer Communication and Network Series, Springer, London 2, 422-426, 2009 | 326* | 2009 |
Automatic clustering for self-organizing grids N Abu-Ghazaleh, W Yang, M Lewis US Patent 8,041,773, 2011 | 321 | 2011 |
Mobile, wireless, and sensor networks: technology, applications, and future directions R Shorey, A Ananda, MC Chan, WT Ooi John Wiley & Sons, 2006 | 308 | 2006 |
Non-monopolizable caches: Low-complexity mitigation of cache side channel attacks L Domnitser, A Jaleel, J Loew, N Abu-Ghazaleh, D Ponomarev ACM Transactions on Architecture and Code Optimization (TACO) 8 (4), 1-21, 2012 | 303 | 2012 |
Wireless software defined networking: A survey and taxonomy IT Haque, N Abu-Ghazaleh IEEE Communications Surveys & Tutorials 18 (4), 2713-2737, 2016 | 302 | 2016 |
Guide to wireless ad hoc networks S Misra, I Woungang, SC Misra Springer Science & Business Media, 2009 | 231 | 2009 |
Malware-aware processors: A framework for efficient online malware detection M Ozsoy, C Donovick, I Gorelik, N Abu-Ghazaleh, D Ponomarev 2015 IEEE 21st International Symposium on High Performance Computer …, 2015 | 198 | 2015 |
Rendered insecure: Gpu side channel attacks are practical H Naghibijouybari, A Neupane, Z Qian, N Abu-Ghazaleh Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018 | 192 | 2018 |
GPS: a general peer-to-peer simulator and its use for modeling BitTorrent W Yang, N Abu-Ghazaleh 13th IEEE International Symposium on Modeling, Analysis, and Simulation of …, 2005 | 166 | 2005 |
A high-resolution side-channel attack on last-level cache M Kayaalp, N Abu-Ghazaleh, D Ponomarev, A Jaleel Proceedings of the 53rd Annual Design Automation Conference, 1-6, 2016 | 162 | 2016 |
Safespec: Banishing the spectre of a meltdown with leakage-free speculation KN Khasawneh, EM Koruyeh, C Song, D Evtyushkin, D Ponomarev, ... 2019 56th ACM/IEEE Design Automation Conference (DAC), 1-6, 2019 | 155 | 2019 |
Location verification and trust management for resilient geographic routing K Liu, N Abu-Ghazaleh, KD Kang Journal of parallel and distributed computing 67 (2), 215-228, 2007 | 147 | 2007 |
Branch regulation: Low-overhead protection from code reuse attacks M Kayaalp, M Ozsoy, N Abu-Ghazaleh, D Ponomarev ACM SIGARCH Computer Architecture News 40 (3), 94-105, 2012 | 132 | 2012 |