default search action
Omar Nakhila
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [j2]Omar Nakhila, Muhammad Faisal Amjad, Erich Dondyk, Cliff C. Zou:
Gateway independent user-side wi-fi Evil Twin Attack detection using virtual wireless clients. Comput. Secur. 74: 41-54 (2018) - [i1]Dean Wasil, Omar Nakhila, Salih Safa Bacanli, Cliff C. Zou, Damla Turgut:
Exposing Vulnerabilities in Mobile Networks: A Mobile Data Consumption Attack. CoRR abs/1801.08185 (2018) - 2017
- [c10]Kutalmis Akpinar, Fereshteh Jafariakinabad, Kien A. Hua, Omar Nakhila, Jun Ye, Cliff C. Zou:
Fault-Tolerant Network-Server Architecture for Time-Critical Web Applications. DASC/PiCom/DataCom/CyberSciTech 2017: 377-384 - [c9]Dean Wasil, Omar Nakhila, Salih Safa Bacanli, Cliff C. Zou, Damla Turgut:
Exposing Vulnerabilities in Mobile Networks: A Mobile Data Consumption Attack. MASS 2017: 550-554 - [c8]Omar Nakhila, Cliff C. Zou:
Circumvent traffic shaping using virtual wireless clients in IEEE 802.11 wireless local area network. MILCOM 2017: 52-56 - 2016
- [j1]Muhammad Faisal Amjad, Mainak Chatterjee, Omar Nakhila, Cliff C. Zou:
Evolutionary non-cooperative spectrum sharing game: long-term coexistence for collocated cognitive radio networks. Wirel. Commun. Mob. Comput. 16(15): 2166-2178 (2016) - [c7]Afraa Attiah, Muhammad Faisal Amjad, Omar Nakhila, Cliff C. Zou:
ADP: An adaptive feedback approach for energy-efficient wireless sensor networks. ICNC 2016: 1-7 - [c6]Omar Nakhila, Cliff C. Zou:
Parallel active dictionary attack on IEEE 802.11 enterprise networks. MILCOM 2016: 265-270 - [c5]Omar Nakhila, Cliff C. Zou:
User-side Wi-Fi evil twin attack detection using random wireless channel monitoring. MILCOM 2016: 1243-1248 - 2015
- [c4]Erich Dondyk, Omar Nakhila, Cliff C. Zou:
SPS: An SMS-based push service for energy saving in smartphone's idle state. CCNC 2015: 53-58 - [c3]Omar Nakhila, Erich Dondyk, Muhammad Faisal Amjad, Cliff C. Zou:
User-side Wi-Fi Evil Twin Attack detection using SSL/TCP protocols. CCNC 2015: 239-244 - [c2]Omar Nakhila, Afraa Attiah, Yier Jin, Cliff C. Zou:
Parallel active dictionary attack on WPA2-PSK Wi-Fi networks. MILCOM 2015: 665-670 - 2014
- [c1]Muhammad Faisal Amjad, Mainak Chatterjee, Omar Nakhila, Cliff C. Zou:
An evolutionary game theoretic framework for coexistence in Cognitive Radio Networks. GlobalSIP 2014: 278-282
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:55 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint