{"id":202,"date":"2017-09-26T07:47:22","date_gmt":"2017-09-26T04:47:22","guid":{"rendered":"http:\/\/qufaculty.qu.edu.qa\/goligeri\/?page_id=202"},"modified":"2017-11-08T11:29:09","modified_gmt":"2017-11-08T08:29:09","slug":"projects","status":"publish","type":"page","link":"http:\/\/qufaculty.qu.edu.qa\/goligeri\/projects\/","title":{"rendered":"Projects"},"content":{"rendered":"<p><strong>Active\u00a0projects:<\/strong><\/p>\n<hr \/>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #0000ff\"><em><strong>Classification of encrypted data transmitted over WiFi: attacks and mitigation techniques.<\/strong><\/em><\/span><\/p>\n<p>Objectives:<\/p>\n<ul>\n<li>Categorization of encrypted WiFi traffic.<\/li>\n<li>Applications de-anonymization.<\/li>\n<li>Encrypted traffic analytics.<\/li>\n<\/ul>\n<p>Students:\u00a0Ahmed Mohamed Hussain,\u00a0Sayyaf Saleh.<\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #0000ff\"><em><strong>Data exfiltration via USB: study, analysis and mitigation techniques<\/strong><\/em><\/span><\/p>\n<p>Objectives:<\/p>\n<ul>\n<li>Study and analyze data exfiltration techniques by exploiting malicious USB dongles.<\/li>\n<li>Proposing mitigation techniques.<\/li>\n<\/ul>\n<p>Students:\u00a0Mohammad Hossein Saeid Shakerpour,\u00a0Faher M.Fadi Bakri.<\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #0000ff\"><em><strong>Opinion guessing through eye tracking<\/strong><\/em><\/span><\/p>\n<p class=\"p1\">Objectives:<\/p>\n<ul>\n<li class=\"p1\">Demonstrate the feasibility of an automated algorithm to infer on opinions and thoughts of users by exploiting eye tracking,<\/li>\n<li class=\"p1\">Setting up a proof-of-concept demonstrator.<\/li>\n<\/ul>\n<p>Students:\u00a0Ali Abdulhafiz Farhat, Anas Tahir.<\/p>\n<p>&nbsp;<\/p>\n<p><strong><em><span style=\"color: #0000ff\">Physical Layer Security for Power Line Communications (Collaboration with Iberdrola-QSTP)<\/span><\/em><\/strong><\/p>\n<p>Objectives: Study, analysis, and development of techniques to enforce security and privacy on power line communications.<\/p>\n<p>Students:\u00a0Faryal Asadulla, Hafsa Amin,\u00a0Aisha Mohammad Jaffar, Afnan Abdullah, Aisha Mohammed Hag.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Past projects<\/strong><\/p>\n<hr \/>\n<p><span style=\"color: #0000ff\"><strong><em>Using visible light communications (VLC) to authenticate Wi-Fi access points<\/em><\/strong><\/span><\/p>\n<p>Objectives: The aim of this project is to authenticate WiFi Access Points by exploiting Visible Light Communications.<\/p>\n<p>Students:\u00a0Faryal Asadulla, Hafsa Amin,\u00a0Aisha Mohammad Jaffar.<\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #0000ff\"><em><strong>Data acquisition techniques and privacy issues in wireless networks\u00a0<\/strong><\/em><\/span><\/p>\n<p>Objectives: Development of an integrated environment for collecting wireless data and exploit them for several purposes, e.g, taking attendance, malicious activities, and users tracking.<\/p>\n<p>Students:\u00a0Dana Adel Abumoza,\u00a0Sadaf Hanif Baji,\u00a0Siti Nur Ummu Hani Binti Daud.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Active\u00a0projects: &nbsp; Classification of encrypted data transmitted over WiFi: attacks and mitigation techniques. Objectives: Categorization of encrypted WiFi traffic. Applications [&hellip;]<\/p>\n","protected":false},"author":356,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-202","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"http:\/\/qufaculty.qu.edu.qa\/goligeri\/wp-json\/wp\/v2\/pages\/202","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/qufaculty.qu.edu.qa\/goligeri\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/qufaculty.qu.edu.qa\/goligeri\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/qufaculty.qu.edu.qa\/goligeri\/wp-json\/wp\/v2\/users\/356"}],"replies":[{"embeddable":true,"href":"http:\/\/qufaculty.qu.edu.qa\/goligeri\/wp-json\/wp\/v2\/comments?post=202"}],"version-history":[{"count":21,"href":"http:\/\/qufaculty.qu.edu.qa\/goligeri\/wp-json\/wp\/v2\/pages\/202\/revisions"}],"predecessor-version":[{"id":249,"href":"http:\/\/qufaculty.qu.edu.qa\/goligeri\/wp-json\/wp\/v2\/pages\/202\/revisions\/249"}],"wp:attachment":[{"href":"http:\/\/qufaculty.qu.edu.qa\/goligeri\/wp-json\/wp\/v2\/media?parent=202"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}