scispace - formally typeset
Search or ask a question
Author

Manar Mohaisen

Bio: Manar Mohaisen is an academic researcher from Northeastern Illinois University. The author has contributed to research in topics: MIMO & Precoding. The author has an hindex of 13, co-authored 71 publications receiving 649 citations. Previous affiliations of Manar Mohaisen include Inha University & Association for Computing Machinery.


Papers
More filters
Journal ArticleDOI
TL;DR: An evaluation of both AutoMal and MaLabel based on medium-scale and large-scale datasets shows AMAL's effectiveness in accurately characterizing, classifying, and grouping malware samples, and several benchmarks, cost estimates and measurements highlight the merits of AMAL.

177 citations

Journal ArticleDOI
TL;DR: The key features of the IEEE 802.15.6 standard are presented, and the MAC, PHY, and security specifications of the standard are explained in detail.
Abstract: IEEE 802.15.6 is the first international Wireless Body Area Network (WBAN) standard that supports communications in the vicinity of or inside a human body to serve a variety of medical and nonmedical applications. The standard defines a Medium Access Control (MAC) layer that supports several Physical (PHY) layers. In this paper, the key features of the IEEE 802.15.6 standard are presented. The MAC, PHY, and security specifications of the standard are explained in detail. Different communication modes and access mechanisms are presented. The Narrowband (NB), Ultra-wideband (UWB), and Human Body Communications (HBC) specifications are reviewed in terms of frame structure, modulation, and other important parameters. Finally, the security paradigm and services of the standard are highlighted.

130 citations

Posted Content
Manar Mohaisen1, Bing Hui1, KyungHi Chang1, Seunghwan Ji, Jinsoup Joung 
TL;DR: In this article, the authors combine the block diagonalization (BD) technique with two deterministic vector perturbation (VP) algorithms that reduce the transmit power in MU-MIMO systems with linear precoding.
Abstract: Block diagonalization (BD) is an attractive technique that transforms the multi-user multiple-input multiple-output (MU-MIMO) channel into parallel single-user MIMO (SU-MIMO) channels with zero inter-user interference (IUI). In this paper, we combine the BD technique with two deterministic vector perturbation (VP) algorithms that reduce the transmit power in MU-MIMO systems with linear precoding. These techniques are the fixed-complexity sphere encoder (FSE) and the QR-decomposition with M-algorithm encoder (QRDM-E). In contrast to the conventional BD VP technique, which is based on the sphere encoder (SE), the proposed techniques have fixed complexity and a tradeoff between performance and complexity can be achieved by controlling the size of the set of candidates for the perturbation vector. Simulation results and analysis demonstrate the properness of the proposed techniques for the next generation mobile communications systems which are latency and computational complexity limited. In MU-MIMO system with 4 users each equipped with 2 receive antennas, simulation results show that the proposed BD-FSE and BD-QRDM-E outperforms the conventional BD-THP (Tomlinson Harashima precoding) by 5.5 and 7.4dB, respectively, at a target BER of 10^{-4}.

28 citations

Proceedings ArticleDOI
24 Jun 2019
TL;DR: A comprehensive probing over the entire IPv4 address space is conducted and found that more than 3 million open resolvers still exist in the wild and it is found that many of them work in a way that deviates from the standard.
Abstract: Open DNS resolvers are resolvers that perform recursive resolution on behalf of any user. They can be exploited by adversaries because they are open to the public and require no authorization to use. Therefore, it is important to understand the state of open resolvers to gauge their potentially negative impact on the security and stability of the Internet. In this study, we conducted a comprehensive probing over the entire IPv4 address space and found that more than 3 million open resolvers still exist in the wild. Moreover, we found that many of them work in a way that deviates from the standard. More importantly, we found that many open resolvers answer queries with the incorrect, even malicious, responses. Contrasting to results obtained in 2013, we found that while the number of open resolvers has decreased significantly, the number of resolvers providing incorrect responses is almost the same, while the number of open resolvers providing malicious responses has increased, highlighting the prevalence of their threat.

25 citations

Proceedings ArticleDOI
22 Apr 2008
TL;DR: In this paper, the performance of the encoding and the modulation processes in the downlink and uplink of the EPCglobal Gen2 system through the analysis and simulation is analyzed and the synchronization issues on time and frequency domain and the preamble architecture are evaluated.
Abstract: In this paper, we analyze the performance of the encoding and the modulation processes in the downlink and uplink of the EPCglobal Gen2 system through the analysis and simulation. Furthermore, the synchronization issues on time and frequency domain and the preamble architecture are evaluated. Through the simulation in the uplink, we find that the detection probability of FM0 and Miller coding approaches 1 at 13 dB Eb/N0.

24 citations


Cited by
More filters
Journal Article
Michael Ley1
TL;DR: The DBLP Computer Science Bibliography of the University of Trier as discussed by the authors is a large collection of bibliographic information used by thousands of computer scientists, which is used for scientific communication.
Abstract: Publications are essential for scientific communication. Access to publications is provided by conventional libraries, digital libraries operated by learned societies or commercial publishers, and a huge number of web sites maintained by the scientists themselves or their institutions. Comprehensive meta-indices for this increasing number of information sources are missing for most areas of science. The DBLP Computer Science Bibliography of the University of Trier has grown from a very specialized small collection of bibliographic information to a major part of the infrastructure used by thousands of computer scientists. This short paper first reports the history of DBLP and sketches the very simple software behind the service. The most time-consuming task for the maintainers of DBLP may be viewed as a special instance of the authority control problem; how to normalize different spellings of person names. The third section of the paper discusses some details of this problem which might be an interesting research issue for the information retrieval community.

397 citations

Journal ArticleDOI
TL;DR: This survey aims at providing an overview on the way machine learning has been used so far in the context of malware analysis in Windows environments, i.e. for the analysis of Portable Executables.

316 citations

Journal ArticleDOI
TL;DR: This survey aims at providing a systematic and detailed overview of machine learning techniques for malware detection and in particular, deep learning techniques with special emphasis on deep learning approaches.

291 citations

Journal ArticleDOI
TL;DR: A systematic and detailed survey of the malware detection mechanisms using data mining techniques and classifies the malware Detection approaches in two main categories including signature-based methods and behavior-based detection.
Abstract: Data mining techniques have been concentrated for malware detection in the recent decade. The battle between security analyzers and malware scholars is everlasting as innovation grows. The proposed methodologies are not adequate while evolutionary and complex nature of malware is changing quickly and therefore turn out to be harder to recognize. This paper presents a systematic and detailed survey of the malware detection mechanisms using data mining techniques. In addition, it classifies the malware detection approaches in two main categories including signature-based methods and behavior-based detection. The main contributions of this paper are: (1) providing a summary of the current challenges related to the malware detection approaches in data mining, (2) presenting a systematic and categorized overview of the current approaches to machine learning mechanisms, (3) exploring the structure of the significant methods in the malware detection approach and (4) discussing the important factors of classification malware approaches in the data mining. The detection approaches have been compared with each other according to their importance factors. The advantages and disadvantages of them were discussed in terms of data mining models, their evaluation method and their proficiency. This survey helps researchers to have a general comprehension of the malware detection field and for specialists to do consequent examinations.

272 citations

Journal ArticleDOI
TL;DR: This paper reviewed WBAN communication architecture, security and privacy requirements and security threats and the primary challenges in WBANs to these systems based on the latest standards and publications and covers the state-of-art security measures and research.

263 citations