Sitemap

A list of all the posts and pages found on the site. For you robots out there is an XML version available for digesting as well.

Pages

Posts

Future Blog Post

less than 1 minute read

Published:

This post will show up by default. To disable scheduling of future posts, edit config.yml and set future: false.

portfolio

publications

Protecting TCP services from denial of service attacks

Published in In the proceedings of Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense, 2006

Use Google Scholar for full citation

Recommended citation: Hikmat Farhat, "Protecting TCP services from denial of service attacks." In the proceedings of Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense, 2006.

An Effective Defense Against Spoofed IP Traffic

Published in In the proceedings of New Technologies, Mobility and Security, 2007

Use Google Scholar for full citation

Recommended citation: Hikmat Farhat, "An Effective Defense Against Spoofed IP Traffic." In the proceedings of New Technologies, Mobility and Security, 2007.

ITS: A DDoS Mitigating Architecture

Published in In the proceedings of Innovations and Advanced Techniques in Computer and Information Sciences and Engineering, 2007

Use Google Scholar for full citation

Recommended citation: Hikmat Farhat, "ITS: A DDoS Mitigating Architecture." In the proceedings of Innovations and Advanced Techniques in Computer and Information Sciences and Engineering, 2007.

A Memory Efficient Anti-Spoofing Method

Published in Journal of Information Assurance and Security, 2008

Use Google Scholar for full citation

Recommended citation: Hikmat Farhat, "A Memory Efficient Anti-Spoofing Method." Journal of Information Assurance and Security, 2008.

A scalable method to protect from IP spoofing

Published in In the proceedings of 2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT), 2008

Use Google Scholar for full citation

Recommended citation: Hikmat Farhat, "A scalable method to protect from IP spoofing." In the proceedings of 2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT), 2008.

Optimizing the performance of multi-homed networks

Published in In the proceedings of 2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT), 2008

Use Google Scholar for full citation

Recommended citation: Hikmat Farhat, "Optimizing the performance of multi-homed networks." In the proceedings of 2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT), 2008.

A scalable method to protect from IP spoofing

Published in In the proceedings of 2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT), 2008

Use Google Scholar for full citation

Recommended citation: H. {Farhat}, "A scalable method to protect from IP spoofing." In the proceedings of 2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT), 2008.

Optimizing the performance of multi-homed networks

Published in In the proceedings of 2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT), 2008

Use Google Scholar for full citation

Recommended citation: H. {Farhat}, "Optimizing the performance of multi-homed networks." In the proceedings of 2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT), 2008.

On the use of path identification to block attack packets

Published in In the proceedings of 2009 Second International Conference on the Applications of Digital Information and Web Technologies, 2009

Use Google Scholar for full citation

Recommended citation: Hikmat Farhat, "On the use of path identification to block attack packets." In the proceedings of 2009 Second International Conference on the Applications of Digital Information and Web Technologies, 2009.

On the use of path identification to block attack packets

Published in In the proceedings of 2009 Second International Conference on the Applications of Digital Information and Web Technologies, 2009

Use Google Scholar for full citation

Recommended citation: H. {Farhat}, "On the use of path identification to block attack packets." In the proceedings of 2009 Second International Conference on the Applications of Digital Information and Web Technologies, 2009.

Biometric authentication for intrusion detection systems

Published in In the proceedings of 2010 First International Conference on Integrated Intelligent Computing, 2010

Use Google Scholar for full citation

Recommended citation: Khalil Challita, Hikmat Farhat, Khaldoun Khaldi, "Biometric authentication for intrusion detection systems." In the proceedings of 2010 First International Conference on Integrated Intelligent Computing, 2010.

Integrating Mobile Agents into Network Access Control

Published in In the proceedings of 2010 First International Conference on Integrated Intelligent Computing, 2010

Use Google Scholar for full citation

Recommended citation: Khalil Challita, Hikmat Farhat, Khaldoun Khaldi, "Integrating Mobile Agents into Network Access Control." In the proceedings of 2010 First International Conference on Integrated Intelligent Computing, 2010.

Biometric Authentication for Intrusion Detection Systems

Published in In the proceedings of 2010 First International Conference on Integrated Intelligent Computing, 2010

Use Google Scholar for full citation

Recommended citation: K. {Challita}, H. {Farhat}, K. {Khaldi}, "Biometric Authentication for Intrusion Detection Systems." In the proceedings of 2010 First International Conference on Integrated Intelligent Computing, 2010.

Integrating Mobile Agents into Network Access Control

Published in In the proceedings of 2010 First International Conference on Integrated Intelligent Computing, 2010

Use Google Scholar for full citation

Recommended citation: K. {Challita}, H. {Farhat}, K. {Khaldi}, "Integrating Mobile Agents into Network Access Control." In the proceedings of 2010 First International Conference on Integrated Intelligent Computing, 2010.

Authentication and Authorization in Web Services

Published in In the proceedings of International Conference on Networked Digital Technologies, 2011

Use Google Scholar for full citation

Recommended citation: Khalil Challita, Hikmat Farhat, Joseph Zalaket, "Authentication and Authorization in Web Services." In the proceedings of International Conference on Networked Digital Technologies, 2011.

Combining steganography and cryptography: new directions

Published in International Journal on New Computer Architectures and Their Applications (IJNCAA), 2011

Use Google Scholar for full citation

Recommended citation: Khalil Challita, Hikmat Farhat, "Combining steganography and cryptography: new directions." International Journal on New Computer Architectures and Their Applications (IJNCAA), 2011.

Static parsing steganography

Published in In the proceedings of International Conference on Digital Information and Communication Technology and Its Applications, 2011

Use Google Scholar for full citation

Recommended citation: Hikmat Farhat, Khalil Challita, Joseph Zalaket, "Static parsing steganography." In the proceedings of International Conference on Digital Information and Communication Technology and Its Applications, 2011.

A symbolic method for the web service composition problem

Published in In the proceedings of 2012 2nd International Conference on Advances in Computational Tools for Engineering Applications (ACTEA), 2012

Use Google Scholar for full citation

Recommended citation: Hikmat Farhat, Guillaume Feuillade, "A symbolic method for the web service composition problem." In the proceedings of 2012 2nd International Conference on Advances in Computational Tools for Engineering Applications (ACTEA), 2012.

Fast Algorithm for Deep Packet Inspection

Published in In the proceedings of International Conference on Networked Digital Technologies, 2012

Use Google Scholar for full citation

Recommended citation: Salam Barbary, Hikmat Farhat, Khalil Challita, "Fast Algorithm for Deep Packet Inspection." In the proceedings of International Conference on Networked Digital Technologies, 2012.

Modal Specifications for Composition of Agent Behaviors

Published in In the proceedings of ICAART 2014 - Proceedings of the 6th International Conference on Agents and Artificial Intelligence, 2014

Use Google Scholar for full citation

Recommended citation: Hikmat Farhat, Guillaume Feuillade, "Modal Specifications for Composition of Agent Behaviors." In the proceedings of ICAART 2014 - Proceedings of the 6th International Conference on Agents and Artificial Intelligence, 2014.

On-the-fly algorithm for the service composition problem

Published in In the proceedings of 2015 7th International Conference on New Technologies, Mobility and Security (NTMS), 2015

Use Google Scholar for full citation

Recommended citation: Hikmat Farhat, Guillaume Feuillade, "On-the-fly algorithm for the service composition problem." In the proceedings of 2015 7th International Conference on New Technologies, Mobility and Security (NTMS), 2015.

talks

teaching

Analysis of Algorithms

Undergraduate course, NDU, Department, 2014

This is a description of a teaching experience. You can use markdown like any other post.

Operating Systems

Undergraduate course, University 1, Department, 2014

This is a description of a teaching experience. You can use markdown like any other post.

Theory of Computation

, Notre Dame University-Louaize, 2020

This is a description of a teaching experience. You can use markdown like any other post.

CSC313 Data Structures

Undergraduate, Notre Dame University-Louaize, 2020

This course provides a detailed coverage of standard data structures with an emphasis on complexity analysis. Topics include: Asymptotic analysis, vectors, linked lists, stacks, queues, trees and balanced trees, hashing, priority queues and heaps, sorting. Standard graph algorithms such as DFS, BFS, shortest paths and minimum spanning trees are also covered. We will be making heavy use of C++ so it is important you read the c++ review early before the course really takes off.