Folgen
Abdelrahman Eldosouky
Titel
Zitiert von
Zitiert von
Jahr
Drones in distress: A game-theoretic countermeasure for protecting uavs against gps spoofing
AR Eldosouky, A Ferdowsi, W Saad
IEEE Internet of Things Journal 7 (4), 2840-2854, 2019
962019
Resilient critical infrastructure: Bayesian network analysis and contract-based optimization
AR Eldosouky, W Saad, N Mandayam
Reliability Engineering & System Safety 205, 107243, 2021
472021
On the cybersecurity of m-Health IoT systems with LED bitslice implementation
AR Eldosouky, W Saad
2018 IEEE International Conference on Consumer Electronics (ICCE), 1-6, 2018
242018
Single controller stochastic games for optimized moving target defense
AR Eldosouky, W Saad, D Niyato
2016 IEEE International Conference on Communications (ICC), 1-6, 2016
202016
Game theory and machine learning for cyber security
CA Kamhoua, CD Kiekintveld, F Fang, Q Zhu
John Wiley & Sons, 2021
182021
Environment-aware deployment of wireless drones base stations with google earth simulator
A French, M Mozaffari, A Eldosouky, W Saad
2019 IEEE international conference on pervasive computing and communications …, 2019
182019
Blockchain-based privacy preserving and energy saving mechanism for electricity prosumers
HA Abdelsalam, AK Srivastava, A Eldosouky
IEEE Transactions on Sustainable Energy 13 (1), 302-314, 2021
172021
Interdependence-aware game-theoretic framework for secure intelligent transportation systems
A Ferdowsi, A Eldosouky, W Saad
IEEE Internet of Things Journal 8 (22), 16395-16405, 2020
142020
Contract-theoretic resource allocation for critical infrastructure protection
AR Eldosouky, W Saad, C Kamhoua, K Kwiat
2015 IEEE Global Communications Conference (GLOBECOM), 1-6, 2015
132015
Enhancing distribution system resiliency with microgrids formation using weighted average consensus
HA Abdelsalam, A Eldosouky, AK Srivastava
International Journal of Electrical Power & Energy Systems 141, 108161, 2022
42022
Every anonymization begins with k: A game-theoretic approach for optimized k selection in k-anonymization
A Kotra, AR Eldosouky, S Sengupta
2020 International Conference on Advances in Computing and Communication …, 2020
42020
Think smart, play dumb: Analyzing deception in hardware trojan detection using game theory
T Das, AR Eldosouky, S Sengupta
2020 International Conference on Cyber Security and Protection of Digital …, 2020
42020
Security of Critical Cyber-Physical Systems: Fundamentals and Optimization
A Salama, EM Abdelrahman
Virginia Tech, 2019
32019
Performance Measurement of IoT Traffic Through SRv6 Network Programming
SK Kuri, A Eldosouky, M Ibnkahla
2022 IEEE International Conference on Communications Workshops (ICC …, 2022
22022
Moving Target defense games for cyber security: theory and applications
AR Eldosouky, S Sengupta
Game Theory and Machine Learning for Cyber Security, 160-179, 2021
22021
Security of Critical Cyber-Physical Systems: Fundamentals and Optimization
AR Eldosouky
Virginia Tech, 2019
22019
Open Source Horizontal IoT Platforms: A Comparative Study on Functional Requirements
A Farhat, A Eldosouky, J Jaskolka, M Ibnkahla, A Matrawy
arXiv preprint arXiv:2209.06384, 2022
12022
Integrating Medical and Wearable Devices with E-Health Systems Using Horizontal IoT Platforms
MA Issa, A Eldosouky, M Ibnkahla, J Jaskolka, A Matrawy
2023 IEEE Sensors Applications Symposium (SAS), 1-6, 2023
2023
Finding the Sweet Spot for Data Anonymization: A Mechanism Design Perspective
A Eldosouky, T Das, A Kotra, S Sengupta
IEEE Access 10, 103718-103732, 2022
2022
Security of Critical Cyber-Physical Systems: Fundamentals and Optimization
AA Eldosouky Mahmoud Salama
Virginia Tech, 2019
2019
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20