Amr M. Youssef
According to our database1,
Amr M. Youssef
authored at least 186 papers
between 1995 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2021
2020
Binary Code Fingerprinting for Cybersecurity - Application to Malicious Code Fingerprinting
Advances in Information Security 78, Springer, ISBN: 978-3-030-34237-1, 2020
IEEE Trans. Veh. Technol., 2020
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Internet Things J., 2020
IEEE Internet Things J., 2020
IET Cyper-Phys. Syst.: Theory & Appl., 2020
IET Cyper-Phys. Syst.: Theory & Appl., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Multiple-Association Supporting HTC/MTC in Limited-Backhaul Capacity Ultra-Dense Networks.
CoRR, 2020
IEEE Commun. Surv. Tutorials, 2020
Proceedings of the Security and Privacy in Communication Networks, 2020
Proceedings of the IEEE Globecom Workshops, 2020
Proceedings of the IEEE Global Communications Conference, 2020
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2020
Proceedings of the 9th IEEE International Conference on Cloud Networking, 2020
Set-Theoretic Control for Active Detection of Replay Attacks with Applications to Smart Grid.
Proceedings of the 2020 IEEE Conference on Control Technology and Applications, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
IEEE Trans. Smart Grid, 2019
IEEE Internet Things J., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
On MILP-Based Automatic Search for Differential Trails Through Modular Additions with Application to Bel-T.
IACR Cryptol. ePrint Arch., 2019
Security Monitoring of IEC 61850 Substations Using IEC 62351-7 Network and System Management<sup>1</sup>.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the International Conference on Communications, 2019
Proceedings of the Financial Cryptography and Data Security, 2019
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2019
Detecting, Fingerprinting and Tracking Reconnaissance Campaigns Targeting Industrial Control Systems.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
Attack Detection for Load Frequency Control Systems Using Stochastic Unknown Input Estimators.
IEEE Trans. Inf. Forensics Secur., 2018
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
IACR Cryptol. ePrint Arch., 2018
Smart But Unsafe: Experimental Evaluation of Security and Privacy Practices in Smart Toys.
CoRR, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the Selected Areas in Cryptography - SAC 2018, 2018
Detection of false data injection attacks in smart grids using Recurrent Neural Networks.
Proceedings of the 2018 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2018
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the Foundations and Practice of Security - 11th International Symposium, 2018
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
2017
MILP Modeling for (Large) S-boxes to Optimize Probability of Differential Characteristics.
IACR Trans. Symmetric Cryptol., 2017
ACM Trans. Cyber Phys. Syst., 2017
IEEE Trans. Commun., 2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and Trust, 2017
Proceedings of the Selected Areas in Cryptography - SAC 2017, 2017
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017
Proceedings of the 29th International Conference on Microelectronics, 2017
Proceedings of the 29th International Conference on Microelectronics, 2017
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Coverage and Capacity Analysis with Stretched Exponential Path Loss in Ultra-Dense Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the Progress in Cryptology - AFRICACRYPT 2017, 2017
2016
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
IEICE Trans. Inf. Syst., 2016
IACR Cryptol. ePrint Arch., 2016
Security Tradeoffs in Cyber Physical Systems: A Case Study Survey on Implantable Medical Devices.
IEEE Access, 2016
Proceedings of the International Conference on Selected Topics in Mobile & Wireless Networking, 2016
Proceedings of the Information Security - 19th International Conference, 2016
Proceedings of the Information Security - 19th International Conference, 2016
Proceedings of the 2016 IEEE International Conference on Communications, 2016
2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2015
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2015
Improved Key Recovery Attack on Round-reduced Hierocrypt-L1 in the Single-Key Setting.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2015
Proceedings of the Lightweight Cryptography for Security and Privacy, 2015
Proceedings of the Progress in Cryptology - LATINCRYPT 2015, 2015
Proceedings of the Information Security Practice and Experience, 2015
Proceedings of the Codes, Cryptology, and Information Security, 2015
Proceedings of the Codes, Cryptology, and Information Security, 2015
2014
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014
Differential Sieving for 2-Step Matching Meet-in-the-Middle Attack with Application to LBlock.
Proceedings of the Lightweight Cryptography for Security and Privacy, 2014
Proceedings of the IEEE International Conference on Communications, 2014
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014
2013
Strengthening hardware implementations of NTRUEncrypt against fault analysis attacks.
J. Cryptogr. Eng., 2013
Inf. Secur. J. A Glob. Perspect., 2013
Inf. Process. Lett., 2013
IACR Cryptol. ePrint Arch., 2013
A Comparison between Two Off-the-Shelf Algebraic Tools for Extraction of Cryptographic Keys from Corrupted Memory Images.
Proceedings of the Security Engineering and Intelligence Informatics, 2013
2012
IEEE Trans. Smart Grid, 2012
Inf. Secur. J. A Glob. Perspect., 2012
Cryptanalysis of a <i>GL</i>(<i>r</i>, <i>Z<sub>n</sub></i>)-Based Public Key System.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
IACR Cryptol. ePrint Arch., 2012
Cryptanalysis of a key exchange protocol based on the endomorphisms ring End (ℤ<sub>p</sub> × ℤ<sub>p<sup>2</sup></sub>).
Appl. Algebra Eng. Commun. Comput., 2012
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012
Proceedings of the Progress in Cryptology - LATINCRYPT 2012, 2012
Proceedings of IEEE International Conference on Communications, 2012
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012
Proceedings of the Seventh International Conference on Availability, 2012
Proceedings of the Seventh International Conference on Availability, 2012
2011
IET Commun., 2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
Comput. Electr. Eng., 2011
Differential Fault Analysis of Hummingbird.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011
Proceedings of the Progress in Cryptology - AFRICACRYPT 2011, 2011
2010
A Channel-Estimation and Data-Detection Scheme for Multiuser MIMO-CDMA Systems in Fading Channels.
IEEE Trans. Veh. Technol., 2010
IEEE Trans. Veh. Technol., 2010
IEICE Trans. Inf. Syst., 2010
IACR Cryptol. ePrint Arch., 2010
Comput. Electr. Eng., 2010
EM Channel Estimation and Data Detection for MIMO-CDMA Systems over Slow-Fading Channels.
Proceedings of the 72nd IEEE Vehicular Technology Conference, 2010
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010
A framework to strengthen password authentication using mobile devices and browser extensions.
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2010
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2010
Proceedings of the Global Communications Conference, 2010
Joint Iterative Channel Estimation and Data Detection for MIMO-CDMA Systems over Frequency-Selective Fading Channels.
Proceedings of the Global Communications Conference, 2010
Proceedings of the Progress in Cryptology, 2010
2009
IEEE Trans. Inf. Theory, 2009
BER analysis of space-time diversity in CDMA systems over frequency-selective fading channels.
IET Commun., 2009
Cryptogr. Commun., 2009
Proceedings of the Third International Conference on Emerging Security Information, 2009
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
2008
Wirel. Commun. Mob. Comput., 2008
IEEE Trans. Circuits Syst. II Express Briefs, 2008
On the Security of a Cryptosystem Based on Multiple-Parameters Discrete Fractional Fourier Transform.
IEEE Signal Process. Lett., 2008
Cryptanalysis of the parameterized improved fast encryption algorithm for multimedia.
IEEE Commun. Lett., 2008
Proceedings of the 67th IEEE Vehicular Technology Conference, 2008
Proceedings of the Second International Conference on Emerging Security Information, 2008
2007
IEEE Trans. Circuits Syst. I Regul. Pap., 2007
Space-time spreading and diversity in asynchronous CDMA systems over frequency-selective fading channels.
Proceedings of the 9th International Symposium on Signal Processing and Its Applications, 2007
Proceedings of the 9th International Symposium on Signal Processing and Its Applications, 2007
Proceedings of IEEE International Conference on Communications, 2007
Performance of Space-Time Diversity in CDMA Over Frequency-Selective Fading Channels.
Proceedings of the Global Communications Conference, 2007
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007
2006
IEEE Trans. Inf. Theory, 2006
Theor. Comput. Sci., 2006
Proceedings of the Medical Imaging 2006: Image Processing, 2006
Proceedings of the Image Analysis and Recognition, Third International Conference, 2006
Artificial life feature selection techniques for spam e-mail filters.
Proceedings of the Second IASTED International Conference on Computational Intelligence, 2006
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006
Proceedings of the IEEE International Conference on Evolutionary Computation, 2006
Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2006
Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2006
Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2006
2005
Artificial Life Feature Selection Techniques for Prostrate Cancer Diagnosis Using TRUS Images.
Proceedings of the Image Analysis and Recognition, Second International Conference, 2005
2003
IEEE Trans. Consumer Electron., 2003
2002
IEEE Trans. Inf. Theory, 2002
IACR Cryptol. ePrint Arch., 2002
2001
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001
Proceedings of the Progress in Cryptology, 2001
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001
2000
Cryptanalysis of the "Augmented Family of Cryptographic Parity Circuits" Proposed at ISW'97.
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000
1996
Comment on "Bounds on the Number of Functions Satisfying the Strict Avalanche Criterion".
Inf. Process. Lett., 1996
1995
Inf. Process. Lett., 1995
Proceedings of the Information Theory and Applications II, 1995