Guevara Noubir
Guevara Noubir
Professor of Computer Science, Northeastern University
Verified email at
Cited by
Cited by
Mobility models for ad hoc network simulation
G Lin, G Noubir, R Rajaraman
IEEE INFOCOM 2004. Twenty-third Annual Joint Conference of the IEEE Computer …, 2004
Performance of IEEE 802.11 under jamming
E Bayraktaroglu, C King, X Liu, G Noubir, R Rajaraman, B Thapa
Mobile Networks and Applications 18 (5), 678-696, 2013
Low-power DoS attacks in data wireless LANs and countermeasures
G Noubir, G Lin
ACM SIGMOBILE Mobile Computing and Communications Review 7 (3), 29-30, 2003
Application-awareness in SDN
ZA Qazi, J Lee, T Jin, G Bellala, M Arndt, G Noubir
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM, 487-488, 2013
Inferring user routes and locations using zero-permission mobile sensors
S Narain, TD Vo-Huu, K Block, G Noubir
2016 IEEE Symposium on Security and Privacy (SP), 397-413, 2016
On link layer denial of service in data wireless LANs
G Lin, G Noubir
Wireless Communications and Mobile Computing 5 (3), 273-284, 2005
Fingerprinting Wi-Fi devices using software defined radios
TD Vo-Huu, TD Vo-Huu, G Noubir
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and …, 2016
On connectivity in ad hoc networks under jamming using directional antennas and mobility
G Noubir
International Conference on Wired/Wireless Internet Communications, 186-200, 2004
Broadcast control channel jamming: Resilience and identification of traitors
A Chan, X Liu, G Noubir, B Thapa
2007 IEEE International Symposium on Information Theory, 2496-2500, 2007
Secure multicast groups on ad hoc networks
T Kaya, G Lin, G Noubir, A Yilmaz
Proceedings of the 1st ACM workshop on security of ad hoc and sensor …, 2003
Wizi-cloud: Application-transparent dual zigbee-wifi radios for low power internet access
T Jin, G Noubir, B Sheng
2011 Proceedings IEEE INFOCOM, 1593-1601, 2011
Spread: Foiling smart jammers using multi-layer agility
X Liu, G Noubir, R Sundaram, S Tan
IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007
Universal approximations for TSP, Steiner tree, and set cover
L Jia, G Lin, G Noubir, R Rajaraman, R Sundaram
Proceedings of the thirty-seventh annual ACM symposium on Theory of …, 2005
Hierarchy-based access control in distributed environments
JC Birget, X Zou, G Noubir, B Ramamurthy
ICC 2001. IEEE International Conference on Communications. Conference Record …, 2001
A Practical, Targeted, and Stealthy Attack Against WPA Enterprise Authentication.
A Cassola, WK Robertson, E Kirda, G Noubir
NDSS, 2013
On the robustness of IEEE 802.11 rate adaptation algorithms against smart jamming
G Noubir, R Rajaraman, B Sheng, B Thapa
Proceedings of the fourth ACM conference on Wireless network security, 97-108, 2011
Toward robust hidden volumes using write-only oblivious ram
EO Blass, T Mayberry, G Noubir, K Onarlioglu
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
Single-stroke language-agnostic keylogging using stereo-microphones and domain specific machine learning
S Narain, A Sanatinia, G Noubir
Proceedings of the 2014 ACM conference on Security and privacy in wireless …, 2014
Linear programming models for jamming attacks on network traffic flows
P Tague, D Slater, R Poovendran, G Noubir
2008 6th International Symposium on Modeling and Optimization in Mobile, Ad …, 2008
Zero pre-shared secret key establishment in the presence of jammers
T Jin, G Noubir, B Thapa
Proceedings of the tenth ACM international symposium on Mobile ad hoc …, 2009
The system can't perform the operation now. Try again later.
Articles 1–20