Welcome to my acadmic webpage

Announcements

Monday, September 3, 2018 - 15:58
Overview: Security Concepts, Types of attacks, Services; Cryptography: Block ciphers, Public-Key; Authentication: Hash functions, User authentication Protocols; Transport-Level Security;...
Review of Network Technologies for LANs and WANs. Inter-networking. IP, UDP, and TCP protocols, broadcasting and multi-casting, MPLS, Internet Addressing, Internet Routing Protocols:...
Solutions to analysis and synthesis problems that may be formulated as flow problems in capacity constrained (or cost constrained) networks. Tools for network flow theory using graph...
Improving resilience against failures and targeted attacks is an important aspect of network design. The resilience and cost of networks are two opposing objectives in which a designer...
Communication networks are prone to failures due to targeted attacks or large-scale disasters. Networks can be improved to withstand challenges using mechanisms such as diversity, which can...
Backbone networks are prone to failures due to targeted attacks or large-scale disasters. Network resilience can be improved by adding new links to increase network connectivity and...