Ahmed M. Fawaz

According to our database1, Ahmed M. Fawaz authored at least 16 papers between 2012 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Data-driven Model-based Detection of Malicious Insiders via Physical Access Logs.
ACM Trans. Model. Comput. Simul., 2019

Revisiting Client Puzzles for State Exhaustion Attacks Resilience.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

2018
Revisiting Client Puzzles for State Exhaustion Attacks Resilience.
CoRR, 2018

Peer-to-peer Detection of DoS Attacks on City-Scale IoT Mesh Networks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Modeling Humans: A General Agent Model for the Evaluation of Security.
Proceedings of the Quantitative Evaluation of Systems - 15th International Conference, 2018

Determining Tolerable Attack Surfaces that Preserves Safety of Cyber-Physical Systems.
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018

Detecting monitor compromise using evidential reasoning: poster.
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, 2018

POWERALERT: Integrity Checking Using Power Measurement and a Game-Theoretic Strategy.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

2017
PowerAlert: An Integrity Checker using Power Measurement.
CoRR, 2017

An Unsupervised Multi-Detector Approach for Identifying Malicious Lateral Movement.
Proceedings of the 36th IEEE Symposium on Reliable Distributed Systems, 2017

Learning Process Behavioral Baselines for Anomaly Detection.
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017

2016
A Response Cost Model for Advanced Metering Infrastructures.
IEEE Trans. Smart Grid, 2016

Lateral Movement Detection Using Distributed Data Fusion.
Proceedings of the 35th IEEE Symposium on Reliable Distributed Systems, 2016

A Game-Theoretic Approach to Respond to Attacker Lateral Movement.
Proceedings of the Decision and Game Theory for Security - 7th International Conference, 2016

2013
A Multi-Sensor Energy Theft Detection Framework for Advanced Metering Infrastructures.
IEEE J. Sel. Areas Commun., 2013

2012
Cost modeling of response actions for automated response and recovery in AMI.
Proceedings of the IEEE Third International Conference on Smart Grid Communications, 2012


  Loading...