91 Dr. Stulman Ariel Telephone: 02-6751062 Cell phone: 0526609597 Email: stulman@jct.ac.il Website: www.jct.ac.il/~stulman Google Scholar: https://scholar.google.co.il/citations?user=P6tqpNsAAAAJ&hl=en My research deals with identifying potential attacks on different MANET (mobile adhoc networks) routing protocols (OLSR, OSPF-m, DSDV, DVR, AODV, etc.). These networks include IoT, UAV, VANETs, WSN, and others. To these attacks, I search for a solution; either general or tailored. The solutions must adhere to the following constraints for them to be of any real significance: They must not alter the protocol itself; i.e. no new packet types introduced They must prefer computation (CPU time) over transmission Peer-Reviewed Papers in Refereed Journals 1. Fuchs, A., Stulman, A., Gurtov, A., “IOT and HIP’s Opportunistic Mode”, in IEEE Transactions on Mobile Computing, vol. 20, no. 4, pp. 1434-1448, April 2021. doi: 10.1109/TMC.2020.2967044. IF: 5.112, Rank: Q1 2. Stulman, A., Stulman, A., “Secured by Fluctuating Topology, Using the Fluctuating Topology of MANETs to Secure Key Exchange”, in Electronics, vol. 8, no. 10, pp. 1172, October 2019. doi: 10.3390:electronics8101172. IF=2.412, Rank: Q1 3. Schweitzer, N., Stulman, A., Hirst, T., Margalit, R.D., Shabtai, A., “Network Bottlenecks in OLSR Based Ad-hoc Networks”, in Elsevier Ad Hoc Networks, vol. 88, pp. 36-54, May 2019. Doi: 10.1016/j.adhoc.2018.12.002. IF=3.643, Rank: Q1 4. Schweitzer, N., Stulman, A., Shabtai, A, Margalit, R.D., "Contradiction Based GrayHole Attack Minimization for Ad-Hoc Networks," in IEEE Transactions on Mobile Computing, vol.16, no.8, pp.2174-2183, August 2017. doi: 10.1109/TMC.2016.2622707. IF=5.112, Rank: Q1 Peer-Reviewed Papers in Refereed Conference Proceedings 1. Schweitzer, N., Stulman, A., Effectiveness of DCFM on different mobility models. In Proceedings of the 8th International Conference on Wireless and Mobile Communications (WinCom’20). October 28 – 29, 2020. Reims, France. 2. Goldstein, M., Stulman, A., Did you also fall asleep during a priciples of programming languages course? In Proceedings of the 2019 Informing Science and IT Education (InSITE'19). June 30 – July 4, 2019, Jerusalem, Israel, 111-117. doi: https://doi.org/10.28945/4329. 3. Fuchs, A., Stulman, A., and Gurtov, A., Hardening Opportunistic HIP. In Proceedings of the 20th ACM International Conference on Modelling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM '17). November 21-25, 2017, Miami Beach, USA. ACM, New York, NY, USA, 123-127. doi: https://doi.org/10.1145/3127540.3127571 4. Porat, E., Tikochinski, S., Stulman, A., Authorization Enforcement Detection. In Proceedings of the 22nd ACM Symposium on Access Control Models and Technologies (SACMAT'17). July 21-23, 2017, Indianapolis, IN, USA. doi: https://dx.doi.org/10.1145/3078861.3084172.
RkJQdWJsaXNoZXIy MjgzNzA=