Posts by Collection

publications

Protecting TCP services from denial of service attacks

Published in In the proceedings of Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense, 2006

Use Google Scholar for full citation

Recommended citation: Hikmat Farhat, "Protecting TCP services from denial of service attacks." In the proceedings of Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense, 2006.

An Effective Defense Against Spoofed IP Traffic

Published in In the proceedings of New Technologies, Mobility and Security, 2007

Use Google Scholar for full citation

Recommended citation: Hikmat Farhat, "An Effective Defense Against Spoofed IP Traffic." In the proceedings of New Technologies, Mobility and Security, 2007.

ITS: A DDoS Mitigating Architecture

Published in In the proceedings of Innovations and Advanced Techniques in Computer and Information Sciences and Engineering, 2007

Use Google Scholar for full citation

Recommended citation: Hikmat Farhat, "ITS: A DDoS Mitigating Architecture." In the proceedings of Innovations and Advanced Techniques in Computer and Information Sciences and Engineering, 2007.

A Memory Efficient Anti-Spoofing Method

Published in Journal of Information Assurance and Security, 2008

Use Google Scholar for full citation

Recommended citation: Hikmat Farhat, "A Memory Efficient Anti-Spoofing Method." Journal of Information Assurance and Security, 2008.

A scalable method to protect from IP spoofing

Published in In the proceedings of 2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT), 2008

Use Google Scholar for full citation

Recommended citation: H. {Farhat}, "A scalable method to protect from IP spoofing." In the proceedings of 2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT), 2008.

Optimizing the performance of multi-homed networks

Published in In the proceedings of 2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT), 2008

Use Google Scholar for full citation

Recommended citation: H. {Farhat}, "Optimizing the performance of multi-homed networks." In the proceedings of 2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT), 2008.

On the use of path identification to block attack packets

Published in In the proceedings of 2009 Second International Conference on the Applications of Digital Information and Web Technologies, 2009

Use Google Scholar for full citation

Recommended citation: H. {Farhat}, "On the use of path identification to block attack packets." In the proceedings of 2009 Second International Conference on the Applications of Digital Information and Web Technologies, 2009.

Biometric Authentication for Intrusion Detection Systems

Published in In the proceedings of 2010 First International Conference on Integrated Intelligent Computing, 2010

Use Google Scholar for full citation

Recommended citation: K. {Challita}, H. {Farhat}, K. {Khaldi}, "Biometric Authentication for Intrusion Detection Systems." In the proceedings of 2010 First International Conference on Integrated Intelligent Computing, 2010.

Integrating Mobile Agents into Network Access Control

Published in In the proceedings of 2010 First International Conference on Integrated Intelligent Computing, 2010

Use Google Scholar for full citation

Recommended citation: K. {Challita}, H. {Farhat}, K. {Khaldi}, "Integrating Mobile Agents into Network Access Control." In the proceedings of 2010 First International Conference on Integrated Intelligent Computing, 2010.

Authentication and Authorization in Web Services

Published in In the proceedings of International Conference on Networked Digital Technologies, 2011

Use Google Scholar for full citation

Recommended citation: Khalil Challita, Hikmat Farhat, Joseph Zalaket, "Authentication and Authorization in Web Services." In the proceedings of International Conference on Networked Digital Technologies, 2011.

Combining steganography and cryptography: new directions

Published in International Journal on New Computer Architectures and Their Applications (IJNCAA), 2011

Use Google Scholar for full citation

Recommended citation: Khalil Challita, Hikmat Farhat, "Combining steganography and cryptography: new directions." International Journal on New Computer Architectures and Their Applications (IJNCAA), 2011.

Static parsing steganography

Published in In the proceedings of International Conference on Digital Information and Communication Technology and Its Applications, 2011

Use Google Scholar for full citation

Recommended citation: Hikmat Farhat, Khalil Challita, Joseph Zalaket, "Static parsing steganography." In the proceedings of International Conference on Digital Information and Communication Technology and Its Applications, 2011.

A symbolic method for the web service composition problem

Published in In the proceedings of 2012 2nd International Conference on Advances in Computational Tools for Engineering Applications (ACTEA), 2012

Use Google Scholar for full citation

Recommended citation: Hikmat Farhat, Guillaume Feuillade, "A symbolic method for the web service composition problem." In the proceedings of 2012 2nd International Conference on Advances in Computational Tools for Engineering Applications (ACTEA), 2012.

Fast Algorithm for Deep Packet Inspection

Published in In the proceedings of International Conference on Networked Digital Technologies, 2012

Use Google Scholar for full citation

Recommended citation: Salam Barbary, Hikmat Farhat, Khalil Challita, "Fast Algorithm for Deep Packet Inspection." In the proceedings of International Conference on Networked Digital Technologies, 2012.

Modal Specifications for Composition of Agent Behaviors

Published in In the proceedings of ICAART 2014 - Proceedings of the 6th International Conference on Agents and Artificial Intelligence, 2014

Use Google Scholar for full citation

Recommended citation: Hikmat Farhat, Guillaume Feuillade, "Modal Specifications for Composition of Agent Behaviors." In the proceedings of ICAART 2014 - Proceedings of the 6th International Conference on Agents and Artificial Intelligence, 2014.

On-the-fly algorithm for the service composition problem

Published in In the proceedings of 2015 7th International Conference on New Technologies, Mobility and Security (NTMS), 2015

Use Google Scholar for full citation

Recommended citation: Hikmat Farhat, Guillaume Feuillade, "On-the-fly algorithm for the service composition problem." In the proceedings of 2015 7th International Conference on New Technologies, Mobility and Security (NTMS), 2015.

teaching

Theory of Computation

Undergraduate course, Notre Dame University-Louaize, 2020

The course material can be found here. Short Description This is the standard theory of computation course: automata, regular expressions and languages, context-free languages (Grammars, PDA), Turing machines, computability, and complexity.

Analysis of Algorithms

Undergraduate course, Notre Dame University-Louaize, 2020

The course material can be found here. Short description: This is the standard algorithm course where the student is introduced to thedifferent algorithm design paradigms: divide-and-conquer, greedy and dynamic programming. Network flows and applications are covered as well. In addition NP compleness is introduced from the theoretical, e.g. reductions, and practical perspective. Different methods for dealing with NP complete problems such as backtracking, branch and bound and using SAT solvers are covered.

Parallel and Distributed Computing

Undergraduate course, Notre Dame University-Louaize, 2020

The programming part can be found here. Decomposition techniques, tasks and dependency graphs, parallel models. C++ thread model (threads, mutexes, condition-variables, barriers, tasks), C++17 execution policy, lock-free data structures, shared memory with openMP, distributed memory with MPI. CPU vs GPU, GPU programming with hands on experience using CUDA and Thrust.

CSC313 Data Structures

Undergraduate, Notre Dame University-Louaize, 2020

The course material can be found here. Short Description: This course provides a detailed coverage of standard data structures with an emphasis on complexity analysis. Topics include: Asymptotic analysis, vectors, linked lists, stacks, queues,trees and balanced trees, hashing, priority queues and heaps, sorting. Standard graph algorithms such as DFS, BFS, shortest paths and minimum spanning trees are also covered. We will be making heavy use of C++ so it is important you read the c++ review early before the course really takes off.

Machine Learning Workshop

Workshop, Notre Dame University-Louaize, 2020

The course material can be found here. Short description: This is a four day workshop on Neural Networks funded by DAAD(germany). It start by developing Neural Networks from scratch in Python with a view of what is “under the hood” including backpropagation. After that the students are introduced to Tensorflow/Keras and all the applications are done with that framework. Topics include: Convolution Networks, Recurrent Networks, Generative Adversarial Networks, Autoencoders including Variational Autoencoders.