Folgen
Abdelrahman Eldosouky
Titel
Zitiert von
Zitiert von
Jahr
Drones in distress: A game-theoretic countermeasure for protecting uavs against gps spoofing
AR Eldosouky, A Ferdowsi, W Saad
IEEE Internet of Things Journal 7 (4), 2840-2854, 2019
1312019
Resilient critical infrastructure: Bayesian network analysis and contract-based optimization
AR Eldosouky, W Saad, N Mandayam
Reliability Engineering & System Safety 205, 107243, 2021
562021
Game theory and machine learning for cyber security
CA Kamhoua, CD Kiekintveld, F Fang, Q Zhu
John Wiley & Sons, 2021
452021
On the cybersecurity of m-Health IoT systems with LED bitslice implementation
AR Eldosouky, W Saad
2018 IEEE International Conference on Consumer Electronics (ICCE), 1-6, 2018
262018
Blockchain-based privacy preserving and energy saving mechanism for electricity prosumers
HA Abdelsalam, AK Srivastava, A Eldosouky
IEEE Transactions on Sustainable Energy 13 (1), 302-314, 2021
242021
Environment-aware deployment of wireless drones base stations with google earth simulator
A French, M Mozaffari, A Eldosouky, W Saad
2019 IEEE international conference on pervasive computing and communications …, 2019
242019
Single controller stochastic games for optimized moving target defense
AR Eldosouky, W Saad, D Niyato
2016 IEEE International Conference on Communications (ICC), 1-6, 2016
222016
Interdependence-aware game-theoretic framework for secure intelligent transportation systems
A Ferdowsi, A Eldosouky, W Saad
IEEE Internet of Things Journal 8 (22), 16395-16405, 2020
182020
Contract-theoretic resource allocation for critical infrastructure protection
AR Eldosouky, W Saad, C Kamhoua, K Kwiat
2015 IEEE Global Communications Conference (GLOBECOM), 1-6, 2015
122015
Enhancing distribution system resiliency with microgrids formation using weighted average consensus
HA Abdelsalam, A Eldosouky, AK Srivastava
International Journal of Electrical Power & Energy Systems 141, 108161, 2022
112022
Think smart, play dumb: Analyzing deception in hardware trojan detection using game theory
T Das, AR Eldosouky, S Sengupta
2020 International Conference on Cyber Security and Protection of Digital …, 2020
72020
A cyber-layer based on weighted average consensus in blockchain environment for accurate sharing of power systems’ dynamic states
HA Abdelsalam, A Eldosouky, AE ElGebaly, M Khalaf, AAZ Diab, ...
International Journal of Electrical Power & Energy Systems 155, 109558, 2024
52024
Every anonymization begins with k: A game-theoretic approach for optimized k selection in k-anonymization
A Kotra, AR Eldosouky, S Sengupta
2020 International Conference on Advances in Computing and Communication …, 2020
42020
Performance measurement of iot traffic through srv6 network programming
SK Kuri, A Eldosouky, M Ibnkahla
2022 IEEE International Conference on Communications Workshops (ICC …, 2022
32022
Security of Critical Cyber-Physical Systems: Fundamentals and Optimization
A Salama, EM Abdelrahman
Virginia Tech, 2019
32019
Moving Target defense games for cyber security: theory and applications
AR Eldosouky, S Sengupta
Game Theory and Machine Learning for Cyber Security, 160-179, 2021
22021
Security of Critical Cyber-Physical Systems: Fundamentals and Optimization
AR Eldosouky
Virginia Tech, 2019
22019
Open source horizontal iot platforms: A comparative study on functional requirements
A Farhat, A Eldosouky, J Jaskolka, M Ibnkahla, A Matrawy
arXiv preprint arXiv:2209.06384, 2022
12022
Temporal Partitioned Federated Learning for IoT Intrusion Detection Systems
MA Issa, M Ibnkahla, A Matrawy, A Eldosouky
2024 IEEE Wireless Communications and Networking Conference (WCNC), 1-6, 2024
2024
IoT Trust Establishment Through System Level Interactions and Communication Attributes
A Farhat, A Eldosouky, M Ibnkahla, A Matrawy
GLOBECOM 2023-2023 IEEE Global Communications Conference, 5919-5924, 2023
2023
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20