Drones in distress: A game-theoretic countermeasure for protecting uavs against gps spoofing AR Eldosouky, A Ferdowsi, W Saad IEEE Internet of Things Journal 7 (4), 2840-2854, 2019 | 119 | 2019 |
Resilient critical infrastructure: Bayesian network analysis and contract-based optimization AR Eldosouky, W Saad, N Mandayam Reliability Engineering & System Safety 205, 107243, 2021 | 51 | 2021 |
Game theory and machine learning for cyber security CA Kamhoua, CD Kiekintveld, F Fang, Q Zhu John Wiley & Sons, 2021 | 39 | 2021 |
On the cybersecurity of m-Health IoT systems with LED bitslice implementation AR Eldosouky, W Saad 2018 IEEE International Conference on Consumer Electronics (ICCE), 1-6, 2018 | 25 | 2018 |
Environment-aware deployment of wireless drones base stations with google earth simulator A French, M Mozaffari, A Eldosouky, W Saad 2019 IEEE international conference on pervasive computing and communications …, 2019 | 24 | 2019 |
Single controller stochastic games for optimized moving target defense AR Eldosouky, W Saad, D Niyato 2016 IEEE International Conference on Communications (ICC), 1-6, 2016 | 22 | 2016 |
Blockchain-based privacy preserving and energy saving mechanism for electricity prosumers HA Abdelsalam, AK Srivastava, A Eldosouky IEEE Transactions on Sustainable Energy 13 (1), 302-314, 2021 | 20 | 2021 |
Interdependence-aware game-theoretic framework for secure intelligent transportation systems A Ferdowsi, A Eldosouky, W Saad IEEE Internet of Things Journal 8 (22), 16395-16405, 2020 | 16 | 2020 |
Contract-theoretic resource allocation for critical infrastructure protection AR Eldosouky, W Saad, C Kamhoua, K Kwiat 2015 IEEE Global Communications Conference (GLOBECOM), 1-6, 2015 | 12 | 2015 |
Enhancing distribution system resiliency with microgrids formation using weighted average consensus HA Abdelsalam, A Eldosouky, AK Srivastava International Journal of Electrical Power & Energy Systems 141, 108161, 2022 | 11 | 2022 |
Think smart, play dumb: Analyzing deception in hardware trojan detection using game theory T Das, AR Eldosouky, S Sengupta 2020 International Conference on Cyber Security and Protection of Digital …, 2020 | 6 | 2020 |
Every anonymization begins with k: A game-theoretic approach for optimized k selection in k-anonymization A Kotra, AR Eldosouky, S Sengupta 2020 International Conference on Advances in Computing and Communication …, 2020 | 4 | 2020 |
A cyber-layer based on weighted average consensus in blockchain environment for accurate sharing of power systems’ dynamic states HA Abdelsalam, A Eldosouky, AE ElGebaly, M Khalaf, AAZ Diab, ... International Journal of Electrical Power & Energy Systems 155, 109558, 2024 | 3 | 2024 |
Performance measurement of iot traffic through srv6 network programming SK Kuri, A Eldosouky, M Ibnkahla 2022 IEEE International Conference on Communications Workshops (ICC …, 2022 | 3 | 2022 |
Security of Critical Cyber-Physical Systems: Fundamentals and Optimization A Salama, EM Abdelrahman Virginia Tech, 2019 | 3 | 2019 |
Moving Target defense games for cyber security: theory and applications AR Eldosouky, S Sengupta Game Theory and Machine Learning for Cyber Security, 160-179, 2021 | 2 | 2021 |
Security of Critical Cyber-Physical Systems: Fundamentals and Optimization AR Eldosouky Virginia Tech, 2019 | 2 | 2019 |
Open source horizontal iot platforms: A comparative study on functional requirements A Farhat, A Eldosouky, J Jaskolka, M Ibnkahla, A Matrawy arXiv preprint arXiv:2209.06384, 2022 | 1 | 2022 |
IoT Trust Establishment Through System Level Interactions and Communication Attributes A Farhat, A Eldosouky, M Ibnkahla, A Matrawy GLOBECOM 2023-2023 IEEE Global Communications Conference, 5919-5924, 2023 | | 2023 |
Integrating Medical and Wearable Devices with E-Health Systems Using Horizontal IoT Platforms MA Issa, A Eldosouky, M Ibnkahla, J Jaskolka, A Matrawy 2023 IEEE Sensors Applications Symposium (SAS), 1-6, 2023 | | 2023 |