Ahmed H. Anwar

Orcid: 0000-0001-8907-3043

Affiliations:
  • DEVCOM Army Research Laboratory, Adelphi, MD, USA


According to our database1, Ahmed H. Anwar authored at least 37 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
GaTeBaSep: game theory-based security protocol against ARP spoofing attacks in software-defined networks.
Int. J. Inf. Sec., February, 2024

Decision Theory-Guided Deep Reinforcement Learning for Fast Learning.
CoRR, 2024

2023
Resisting Multiple Advanced Persistent Threats via Hypergame-Theoretic Defensive Deception.
IEEE Trans. Netw. Serv. Manag., September, 2023

Honeypot Allocation for Cyber Deception in Dynamic Tactical Networks: A Game Theoretic Approach.
CoRR, 2023

Optimal Honeypot Allocation using Core Attack Graph in Cyber Deception Games.
Proceedings of the 34th IEEE Annual International Symposium on Personal, 2023

Deception in Drone Surveillance Missions: Strategic vs. Learning Approaches.
Proceedings of the Twenty-fourth International Symposium on Theory, 2023

Mitigating Energy Depletion Attack In Wireless Sensor Network Using Signaling Game.
Proceedings of the IEEE International Conference on Communications, 2023

Optimizing Honeypot Placement Strategies with Graph Neural Networks for Enhanced Resilience via Cyber Deception.
Proceedings of the 2nd on Graph Neural Networking Workshop 2023, 2023

2022
Foureye: Defensive Deception Against Advanced Persistent Threats via Hypergame Theory.
IEEE Trans. Netw. Serv. Manag., 2022

Honeypot Allocation for Cyber Deception Under Uncertainty.
IEEE Trans. Netw. Serv. Manag., 2022

Honeypot-Based Cyber Deception Against Malicious Reconnaissance via Hypergame Theory.
Proceedings of the IEEE Global Communications Conference, 2022

A Network Centrality Game for Epidemic Control.
Proceedings of the Decision and Game Theory for Security - 13th International Conference, 2022

Cyber Deception Against Zero-Day Attacks: A Game Theoretic Approach.
Proceedings of the Decision and Game Theory for Security - 13th International Conference, 2022

Cyber Deception using Honeypot Allocation and Diversity: A Game Theoretic Approach.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022

2021
A Game-Theoretic Framework for the Virtual Machines Migration Timing Problem.
IEEE Trans. Cloud Comput., 2021

Game-Theoretic and Machine Learning-based Approaches for Defensive Deception: A Survey.
CoRR, 2021

Foureye: Defensive Deception based on Hypergame Theory Against Advanced Persistent Threats.
CoRR, 2021

A Survey of Defensive Deception: Approaches Using Game Theory and Machine Learning.
IEEE Commun. Surv. Tutorials, 2021

Deep Learning for Cyber Deception in Wireless Networks.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

Honeypot Allocation for Cyber Deception in Internet of Battlefield Things Systems.
Proceedings of the 2021 IEEE Military Communications Conference, 2021

2020
Honeypot Allocation over Attack Graphs in Cyber Deception Games.
Proceedings of the International Conference on Computing, Networking and Communications, 2020

Software Diversity for Cyber Deception.
Proceedings of the IEEE Global Communications Conference, 2020

A Game Theoretic Framework for Software Diversity for Network Security.
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020

Game Theory on Attack Graph for Cyber Deception.
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020

2019
Pinball attacks against Dynamic Channel assignment in wireless networks.
Comput. Commun., 2019

A game-theoretic framework for dynamic cyber deception in internet of battlefield things.
Proceedings of the MobiQuitous 2019, 2019

Identifying Stealthy Attackers in a Game Theoretic Framework Using Deception.
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019

2018
Adaptive topologies against jamming attacks in wireless networks: A game-theoretic approach.
J. Netw. Comput. Appl., 2018

Toward a Protected Cloud Against Side Channel Attacks: A Game-Theoretic Framework.
Proceedings of the 56th Annual Allerton Conference on Communication, 2018

It's Time to Migrate! A Game-Theoretic Framework for Protecting a Multi-Tenant Cloud against Collocation Attacks.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018

2017
Dynamic game-theoretic defense approach against stealthy Jamming attacks in wireless networks.
Proceedings of the 55th Annual Allerton Conference on Communication, 2017

2016
Effective Capacity of Delay-Constrained Cognitive Radio Links Exploiting Primary Feedback.
IEEE Trans. Veh. Technol., 2016

Game theoretic defense approach to wireless networks against stealthy decoy attacks.
Proceedings of the 54th Annual Allerton Conference on Communication, 2016

2015
Stealthy edge decoy attacks against dynamic channel assignment in wireless networks.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Interference-based optimal power-efficient access scheme for cognitive radio networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

On the Effective Capacity of Delay Constrained Cognitive Radio Networks with Relaying Capability.
Proceedings of the Cognitive Radio Oriented Wireless Networks, 2015

2014
Effective capacity of cognitive radio links: Accessing primary feedback erroneously.
Proceedings of the 11th International Symposium on Wireless Communications Systems, 2014


  Loading...