Portfolio item number 1
Short description of portfolio item number 1
Short description of portfolio item number 1
Short description of portfolio item number 2
Published in The Journal of chemical physics, 1996
Use Google Scholar for full citation
Recommended citation: Hikmat Farhat, Byung Chan, "Integral equation theory of molecular liquids: Kirkwood hierarchy approach to diatomic and polyatomic liquids." The Journal of chemical physics, 1996.
Published in Physical Review E, 1997
Use Google Scholar for full citation
Recommended citation: Byung Eu, Hikmat Farhat, "Kinetic theory of fluidized granular matter." Physical Review E, 1997.
Published in The Journal of chemical physics, 1998
Use Google Scholar for full citation
Recommended citation: Hikmat Farhat, Byung Eu, "Nonequilibrium statistical thermodynamics: Nonequilibrium grand ensemble method for sheared dilute gases." The Journal of chemical physics, 1998.
Published in The Journal of chemical physics, 1999
Use Google Scholar for full citation
Recommended citation: Hikmat Farhat, Byung Eu, "Monte Carlo method and the nonequilibrium structure and non-Newtonian viscosity of a sheared simple liquid." The Journal of chemical physics, 1999.
Published in In the proceedings of Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense, 2006
Use Google Scholar for full citation
Recommended citation: Hikmat Farhat, "Protecting TCP services from denial of service attacks." In the proceedings of Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense, 2006.
Published in In the proceedings of New Technologies, Mobility and Security, 2007
Use Google Scholar for full citation
Recommended citation: Hikmat Farhat, "An Effective Defense Against Spoofed IP Traffic." In the proceedings of New Technologies, Mobility and Security, 2007.
Published in In the proceedings of Innovations and Advanced Techniques in Computer and Information Sciences and Engineering, 2007
Use Google Scholar for full citation
Recommended citation: Hikmat Farhat, "ITS: A DDoS Mitigating Architecture." In the proceedings of Innovations and Advanced Techniques in Computer and Information Sciences and Engineering, 2007.
Published in Journal of Information Assurance and Security, 2008
Use Google Scholar for full citation
Recommended citation: Hikmat Farhat, "A Memory Efficient Anti-Spoofing Method." Journal of Information Assurance and Security, 2008.
Published in In the proceedings of 2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT), 2008
Use Google Scholar for full citation
Recommended citation: Hikmat Farhat, "A scalable method to protect from IP spoofing." In the proceedings of 2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT), 2008.
Published in In the proceedings of 2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT), 2008
Use Google Scholar for full citation
Recommended citation: Hikmat Farhat, "Optimizing the performance of multi-homed networks." In the proceedings of 2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT), 2008.
Published in In the proceedings of 2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT), 2008
Use Google Scholar for full citation
Recommended citation: H. {Farhat}, "A scalable method to protect from IP spoofing." In the proceedings of 2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT), 2008.
Published in In the proceedings of 2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT), 2008
Use Google Scholar for full citation
Recommended citation: H. {Farhat}, "Optimizing the performance of multi-homed networks." In the proceedings of 2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT), 2008.
Published in In the proceedings of 2009 Second International Conference on the Applications of Digital Information and Web Technologies, 2009
Use Google Scholar for full citation
Recommended citation: Hikmat Farhat, "On the use of path identification to block attack packets." In the proceedings of 2009 Second International Conference on the Applications of Digital Information and Web Technologies, 2009.
Published in In the proceedings of 2009 Second International Conference on the Applications of Digital Information and Web Technologies, 2009
Use Google Scholar for full citation
Recommended citation: H. {Farhat}, "On the use of path identification to block attack packets." In the proceedings of 2009 Second International Conference on the Applications of Digital Information and Web Technologies, 2009.
Published in In the proceedings of 2010 First International Conference on Integrated Intelligent Computing, 2010
Use Google Scholar for full citation
Recommended citation: Khalil Challita, Hikmat Farhat, Khaldoun Khaldi, "Biometric authentication for intrusion detection systems." In the proceedings of 2010 First International Conference on Integrated Intelligent Computing, 2010.
Published in In the proceedings of 2010 First International Conference on Integrated Intelligent Computing, 2010
Use Google Scholar for full citation
Recommended citation: Khalil Challita, Hikmat Farhat, Khaldoun Khaldi, "Integrating Mobile Agents into Network Access Control." In the proceedings of 2010 First International Conference on Integrated Intelligent Computing, 2010.
Published in In the proceedings of 2010 First International Conference on Integrated Intelligent Computing, 2010
Use Google Scholar for full citation
Recommended citation: K. {Challita}, H. {Farhat}, K. {Khaldi}, "Biometric Authentication for Intrusion Detection Systems." In the proceedings of 2010 First International Conference on Integrated Intelligent Computing, 2010.
Published in In the proceedings of 2010 First International Conference on Integrated Intelligent Computing, 2010
Use Google Scholar for full citation
Recommended citation: K. {Challita}, H. {Farhat}, K. {Khaldi}, "Integrating Mobile Agents into Network Access Control." In the proceedings of 2010 First International Conference on Integrated Intelligent Computing, 2010.
Published in In the proceedings of International Conference on Networked Digital Technologies, 2011
Use Google Scholar for full citation
Recommended citation: Khalil Challita, Hikmat Farhat, Joseph Zalaket, "Authentication and Authorization in Web Services." In the proceedings of International Conference on Networked Digital Technologies, 2011.
Published in International Journal on New Computer Architectures and Their Applications (IJNCAA), 2011
Use Google Scholar for full citation
Recommended citation: Khalil Challita, Hikmat Farhat, "Combining steganography and cryptography: new directions." International Journal on New Computer Architectures and Their Applications (IJNCAA), 2011.
Published in In the proceedings of International Conference on Digital Information and Communication Technology and Its Applications, 2011
Use Google Scholar for full citation
Recommended citation: Hikmat Farhat, Khalil Challita, Joseph Zalaket, "Static parsing steganography." In the proceedings of International Conference on Digital Information and Communication Technology and Its Applications, 2011.
Published in In the proceedings of 2012 2nd International Conference on Advances in Computational Tools for Engineering Applications (ACTEA), 2012
Use Google Scholar for full citation
Recommended citation: Hikmat Farhat, Guillaume Feuillade, "A symbolic method for the web service composition problem." In the proceedings of 2012 2nd International Conference on Advances in Computational Tools for Engineering Applications (ACTEA), 2012.
Published in In the proceedings of International Conference on Networked Digital Technologies, 2012
Use Google Scholar for full citation
Recommended citation: Salam Barbary, Hikmat Farhat, Khalil Challita, "Fast Algorithm for Deep Packet Inspection." In the proceedings of International Conference on Networked Digital Technologies, 2012.
Published in In the proceedings of ICAART 2014 - Proceedings of the 6th International Conference on Agents and Artificial Intelligence, 2014
Use Google Scholar for full citation
Recommended citation: Hikmat Farhat, Guillaume Feuillade, "Modal Specifications for Composition of Agent Behaviors." In the proceedings of ICAART 2014 - Proceedings of the 6th International Conference on Agents and Artificial Intelligence, 2014.
Published in In the proceedings of 2015 7th International Conference on New Technologies, Mobility and Security (NTMS), 2015
Use Google Scholar for full citation
Recommended citation: Hikmat Farhat, Guillaume Feuillade, "On-the-fly algorithm for the service composition problem." In the proceedings of 2015 7th International Conference on New Technologies, Mobility and Security (NTMS), 2015.
Published in IEEE Access, 2018
Use Google Scholar for full citation
Recommended citation: Hikmat Farhat, "Composition of Partially-Observable Services." IEEE Access, 2018.
Published in IEEE Access, 2018
Use Google Scholar for full citation
Recommended citation: Hikmat Farhat, "Web service composition via supervisory control theory." IEEE Access, 2018.
Published in Journal of Artificial Intelligence, 2019
Use Google Scholar for full citation
Recommended citation: Khalil Challita, Hikmat Farhat, "Monitoring the Relative Positions of Cars in a Two-Dimensional Space." Journal of Artificial Intelligence, 2019.
Published in IEEE Transactions on Automatic Control, 2020
Use Google Scholar for full citation
Recommended citation: Hikmat Farhat, "Control of Nondeterministic Systems for Bisimulation Equivalence Under Partial Information." IEEE Transactions on Automatic Control, 2020.
Published:
This is a description of your talk, which is a markdown files that can be all markdown-ified like any other post. Yay markdown!
Published:
This is a description of your conference proceedings talk, note the different field in type. You can put anything in this field.
Undergraduate course, NDU, 2014
This is a description of a teaching experience. You can use markdown like any other post.
Undergraduate course, NDU, Department, 2014
This is a description of a teaching experience. You can use markdown like any other post.
Undergraduate course, University 1, Department, 2014
This is a description of a teaching experience. You can use markdown like any other post.
, Notre Dame University-Louaize, 2020
This is a description of a teaching experience. You can use markdown like any other post.
Undergraduate, Notre Dame University-Louaize, 2020
This course provides a detailed coverage of standard data structures with an emphasis on complexity analysis. Topics include: Asymptotic analysis, vectors, linked lists, stacks, queues, trees and balanced trees, hashing, priority queues and heaps, sorting. Standard graph algorithms such as DFS, BFS, shortest paths and minimum spanning trees are also covered. We will be making heavy use of C++ so it is important you read the c++ review early before the course really takes off.