% csauthors.net - beta - BibTeX bibliography of Amr M. Youssef
@inproceedings{conf/ita/YoussefT95,
title = {Information Leakage of a Randomly Selected Boolean Function.},
year = {1995},
booktitle = {Information Theory and Applications},
author = {{Amr M. Youssef} and {Stafford E. Tavares}},
publisher = {Springer},
booktitle = {Information Theory and Applications II, 4th Canadian Workshop, Lac Delage, Québec, Canada, May 28-30, 1995, Selected Papers}
}
@article{journals/ipl/YoussefT95,
title = {Resistance of Balanced s-Boxes to Linear and Differential Cryptanalysis.},
year = {1995},
journal = {Inf. Process. Lett.},
author = {{Amr M. Youssef} and {Stafford E. Tavares}}
}
@article{journals/ipl/YoussefT96,
title = {Comment on "Bounds on the Number of Functions Satisfying the Strict Avalanche Criterion".},
year = {1996},
journal = {Inf. Process. Lett.},
author = {{Amr M. Youssef} and {Stafford E. Tavares}}
}
@inproceedings{conf/fse/YoussefG00,
title = {On the Interpolation Attacks on Block Ciphers.},
year = {2000},
booktitle = {FSE},
author = {{Amr M. Youssef} and {Guang Gong}},
publisher = {Springer},
booktitle = {Fast Software Encryption, 7th International Workshop, FSE 2000, New York, NY, USA, April 10-12, 2000, Proceedings}
}
@inproceedings{conf/sacrypt/GongY00,
title = {On Welch-Gong Transformation Sequence Generators.},
year = {2000},
booktitle = {Selected Areas in Cryptography},
author = {{Guang Gong} and {Amr M. Youssef}},
publisher = {Springer},
booktitle = {Selected Areas in Cryptography, 7th Annual International Workshop, SAC 2000, Waterloo, Ontario, Canada, August 14-15, 2000, Proceedings}
}
@inproceedings{conf/sacrypt/Youssef00,
title = {Cryptanalysis of the "Augmented Family of Cryptographic Parity Circuits" Proposed at ISW'97.},
year = {2000},
booktitle = {Selected Areas in Cryptography},
author = {{Amr M. Youssef}},
publisher = {Springer},
booktitle = {Selected Areas in Cryptography, 7th Annual International Workshop, SAC 2000, Waterloo, Ontario, Canada, August 14-15, 2000, Proceedings}
}
@inproceedings{conf/acisp/YoussefG01,
title = {Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000.},
year = {2001},
booktitle = {ACISP},
author = {{Amr M. Youssef} and {Guang Gong}},
publisher = {Springer},
booktitle = {Information Security and Privacy, 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001, Proceedings}
}
@inproceedings{conf/eurocrypt/YoussefG01,
title = {Hyper-bent Functions.},
year = {2001},
booktitle = {EUROCRYPT},
author = {{Amr M. Youssef} and {Guang Gong}},
publisher = {Springer},
booktitle = {Advances in Cryptology - EUROCRYPT 2001, International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceeding}
}
@inproceedings{conf/indocrypt/YoussefG01,
title = {Cryptanalysis of Imai and Matsumoto Scheme B Asymmetric Cryptosystem.},
year = {2001},
booktitle = {INDOCRYPT},
author = {{Amr M. Youssef} and {Guang Gong}},
publisher = {Springer},
booktitle = {Progress in Cryptology - INDOCRYPT 2001, Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings}
}
@inproceedings{conf/sacrypt/YoussefG01,
title = {Boolean Functions with Large Distance to All Bijective Monomials: N Odd Case.},
year = {2001},
booktitle = {Selected Areas in Cryptography},
author = {{Amr M. Youssef} and {Guang Gong}},
publisher = {Springer},
booktitle = {Selected Areas in Cryptography, 8th Annual International Workshop, SAC 2001 Toronto, Ontario, Canada, August 16-17, 2001, Revised Papers}
}
@article{journals/iacr/YoussefT02,
title = {On Some Algebraic Structures in the AES Round Function.},
year = {2002},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Amr M. Youssef} and {Stafford E. Tavares}}
}
@article{journals/tit/GongY02,
title = {Cryptographic properties of the Welch-Gong transformation sequence generators.},
year = {2002},
journal = {IEEE Trans. Inf. Theory},
author = {{Guang Gong} and {Amr M. Youssef}}
}
@article{journals/tce/YoussefT03,
title = {Comments on the security of fast encryption algorithm for multimedia (FEA-M).},
year = {2003},
journal = {IEEE Trans. Consumer Electron.},
author = {{Amr M. Youssef} and {Stafford E. Tavares}}
}
@inproceedings{conf/iciar/MohamedYES05,
title = {Artificial Life Feature Selection Techniques for Prostrate Cancer Diagnosis Using TRUS Images.},
year = {2005},
booktitle = {ICIAR},
author = {{S. S. Mohamed} and {Amr M. Youssef} and {E. F. El-Saadany} and {Magdy M. A. Salama}},
publisher = {Springer},
booktitle = {Image Analysis and Recognition, Second International Conference, ICIAR 2005, Toronto, Canada, September 28-30, 2005, Proceedings}
}
@article{journals/dam/YoussefT05,
title = {Affine equivalence in the AES round function.},
year = {2005},
journal = {Discret. Appl. Math.},
author = {{Amr M. Youssef} and {Stafford E. Tavares}}
}
@inproceedings{conf/ccece/MohamedYES06,
title = {On the Use of Spectral Clustering for Prostate Tissue Characterization.},
year = {2006},
booktitle = {CCECE},
author = {{S. S. Mohamed} and {Amr M. Youssef} and {E. F. El-Saadany} and {Magdy M. A. Salama}},
publisher = {IEEE},
booktitle = {Proceedings of the Canadian Conference on Electrical and Computer Engineering, CCECE 2006, May 7-10, 2006, Ottawa Congress Centre, Ottawa, Canada}
}
@inproceedings{conf/ccece/UddinY06,
title = {An Artificial Life Technique for the Cryptanalysis of Simple Substitution Ciphers.},
year = {2006},
booktitle = {CCECE},
author = {{Mohammad Faisal Uddin} and {Amr M. Youssef}},
publisher = {IEEE},
booktitle = {Proceedings of the Canadian Conference on Electrical and Computer Engineering, CCECE 2006, May 7-10, 2006, Ottawa Congress Centre, Ottawa, Canada}
}
@inproceedings{conf/ccece/WangYE06,
title = {On Some Feature Selection Strategies for Spam Filter Design.},
year = {2006},
booktitle = {CCECE},
author = {{Ren Wang 003} and {Amr M. Youssef} and {Ahmed K. Elhakeem}},
publisher = {IEEE},
booktitle = {Proceedings of the Canadian Conference on Electrical and Computer Engineering, CCECE 2006, May 7-10, 2006, Ottawa Congress Centre, Ottawa, Canada}
}
@inproceedings{conf/cec/UddinY06,
title = {Cryptanalysis of Simple Substitution Ciphers Using Particle Swarm Optimization.},
year = {2006},
booktitle = {IEEE Congress on Evolutionary Computation},
author = {{Mohammad Faisal Uddin} and {Amr M. Youssef}},
publisher = {IEEE},
booktitle = {IEEE International Conference on Evolutionary Computation, CEC 2006, part of WCCI 2006, Vancouver, BC, Canada, 16-21 July 2006}
}
@inproceedings{conf/globecom/LiuHY06,
title = {Performance of Directional MAC Protocols in Ad-Hoc Networks over Fading Channels.},
year = {2006},
booktitle = {GLOBECOM},
author = {{Kun Liu} and {Walaa Hamouda} and {Amr M. Youssef}},
publisher = {IEEE},
booktitle = {Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November - 1 December 2006}
}
@inproceedings{conf/iastedCI/WangYE06,
title = {Artificial life feature selection techniques for spam e-mail filters.},
year = {2006},
booktitle = {Computational Intelligence},
author = {{Ren Wang 003} and {Amr M. Youssef} and {Ahmed K. Elhakeem}},
publisher = {IASTED/ACTA Press},
booktitle = {Proceedings of the Second IASTED International Conference on Computational Intelligence, San Francisco, California, USA, November 20-22, 2006}
}
@inproceedings{conf/iciar/MohamedYES06,
title = {Prostate Tissue Characterization Using TRUS Image Spectral Features.},
year = {2006},
booktitle = {ICIAR (2)},
author = {{S. S. Mohamed} and {Amr M. Youssef} and {E. F. El-Saadany} and {Magdy M. A. Salama}},
publisher = {Springer},
booktitle = {Image Analysis and Recognition, Third International Conference, ICIAR 2006, Póvoa de Varzim, Portugal, September 18-20, 2006, Proceedings, Part II}
}
@inproceedings{conf/miip/MohamedYES06,
title = {AIS TLS-ESPRIT feature selection for prostate tissue characterization.},
year = {2006},
booktitle = {Medical Imaging: Image Processing},
author = {{S. S. Mohamed} and {Amr M. Youssef} and {E. F. El-Saadany} and {M. M. A. Salama}},
publisher = {SPIE},
booktitle = {Medical Imaging 2006: Image Processing, MEDICAL IMAGING, San Diego, California, United States, 11-16 February 2006}
}
@article{journals/dm/YoussefTG06,
title = {On some probabilistic approximations for AES-like s-boxes.},
year = {2006},
journal = {Discret. Math.},
author = {{Amr M. Youssef} and {Stafford E. Tavares} and {Guang Gong}}
}
@article{journals/tcs/YoussefG06,
title = {On linear complexity of sequences over GF(2n).},
year = {2006},
journal = {Theor. Comput. Sci.},
author = {{Amr M. Youssef} and {Guang Gong}}
}
@article{journals/tit/SaberUY06,
title = {On the existence of (9, 3, 5, 240) resilient functions.},
year = {2006},
journal = {IEEE Trans. Inf. Theory},
author = {{Z. Saber} and {Mohammad Faisal Uddin} and {Amr M. Youssef}}
}
@inproceedings{conf/acns/XuWYZ07,
title = {Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme.},
year = {2007},
booktitle = {ACNS},
author = {{Xuxin Xu} and {Lingyu Wang 001} and {Amr M. Youssef} and {Bo Zhu 001}},
publisher = {Springer},
booktitle = {Applied Cryptography and Network Security, 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings}
}
@inproceedings{conf/globecom/AssraHY07,
title = {Performance of Space-Time Diversity in CDMA Over Frequency-Selective Fading Channels.},
year = {2007},
booktitle = {GLOBECOM},
author = {{Ayman Assra} and {Walaa Hamouda} and {Amr M. Youssef}},
publisher = {IEEE},
booktitle = {Proceedings of the Global Communications Conference, 2007. GLOBECOM '07, Washington, DC, USA, 26-30 November 2007}
}
@inproceedings{conf/icc/LiuHY07,
title = {ESPRIT-Based Directional MAC Protocol for Mobile Ad Hoc Networks.},
year = {2007},
booktitle = {ICC},
author = {{Kun Liu} and {Walaa Hamouda} and {Amr M. Youssef}},
publisher = {IEEE},
booktitle = {Proceedings of IEEE International Conference on Communications, ICC 2007, Glasgow, Scotland, UK, 24-28 June 2007}
}
@inproceedings{conf/isspa/Abdel-MannanHY07,
title = {Incremental Hessian Locally Linear Embedding algorithm.},
year = {2007},
booktitle = {ISSPA},
author = {{Osama Abdel-Mannan} and {A. Ben Hamza} and {Amr M. Youssef}},
publisher = {IEEE},
booktitle = {9th International Symposium on Signal Processing and Its Applications, ISSPA 2007, Sharjah, United Arab Emirates, February 12-15, 2007}
}
@inproceedings{conf/isspa/AssraHY07,
title = {Space-time spreading and diversity in asynchronous CDMA systems over frequency-selective fading channels.},
year = {2007},
booktitle = {ISSPA},
author = {{Ayman Assra} and {Walaa Hamouda} and {Amr M. Youssef}},
publisher = {IEEE},
booktitle = {9th International Symposium on Signal Processing and Its Applications, ISSPA 2007, Sharjah, United Arab Emirates, February 12-15, 2007}
}
@article{journals/tcas/Youssef07,
title = {A Comment on "Cryptographic Applications of Brahmagupta-Bhãskara Equation".},
year = {2007},
journal = {IEEE Trans. Circuits Syst. I Regul. Pap.},
author = {{Amr M. Youssef}}
}
@inproceedings{conf/securware/KircanskiY08,
title = {A Related-Key Attack on TREYFER.},
year = {2008},
booktitle = {SECURWARE},
author = {{Aleksandar Kircanski} and {Amr M. Youssef}},
publisher = {IEEE Computer Society},
booktitle = {Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2008, August 25-31, 2008, Cap Esterel, France}
}
@inproceedings{conf/vtc/AssraHY08,
title = {Joint Decorrelating Channel and Data Estimation for Space-Time Spreading Systems.},
year = {2008},
booktitle = {VTC Spring},
author = {{Ayman Assra} and {Walaa Hamouda} and {Amr M. Youssef}},
publisher = {IEEE},
booktitle = {Proceedings of the 67th IEEE Vehicular Technology Conference, VTC Spring 2008, 11-14 May 2008, Singapore}
}
@article{journals/icl/Al-ZaidyKY08,
title = {Cryptanalysis of the parameterized improved fast encryption algorithm for multimedia.},
year = {2008},
journal = {IEEE Commun. Lett.},
author = {{Rabeah Al-Zaidy} and {Aleksandar Kircanski} and {Amr M. Youssef}}
}
@article{journals/spl/Youssef08,
title = {On the Security of a Cryptosystem Based on Multiple-Parameters Discrete Fractional Fourier Transform.},
year = {2008},
journal = {IEEE Signal Process. Lett.},
author = {{Amr M. Youssef}}
}
@article{journals/tcas/Youssef08,
title = {An Attack Against the Revised Murthy-Swamy Cryptosystem.},
year = {2008},
journal = {IEEE Trans. Circuits Syst. II Express Briefs},
author = {{Amr M. Youssef}}
}
@article{journals/wicomm/LiuHY08,
title = {Performance of a MANET directional MAC protocol with angle-of-arrival estimation.},
year = {2008},
journal = {Wirel. Commun. Mob. Comput.},
author = {{Kun Liu} and {Walaa Hamouda} and {Amr M. Youssef}}
}
@inproceedings{conf/globecom/AssraHY09,
title = {Performance of Superimposed Training-Based Channel Estimation in MIMO-CDMA Systems.},
year = {2009},
booktitle = {GLOBECOM},
author = {{Ayman Assra} and {Walaa Hamouda} and {Amr M. Youssef}},
publisher = {IEEE},
booktitle = {Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November - 4 December 2009}
}
@inproceedings{conf/globecom/BasyouniHY09,
title = {On Reducing Blocking Probability in Cooperative Ad-hoc Networks.},
year = {2009},
booktitle = {GLOBECOM},
author = {{Ayda Basyouni} and {Walaa Hamouda} and {Amr M. Youssef}},
publisher = {IEEE},
booktitle = {Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November - 4 December 2009}
}
@inproceedings{conf/icitst/ShiZY09,
title = {A rotary PIN entry scheme resilient to shoulder-surfing.},
year = {2009},
booktitle = {ICITST},
author = {{Peipei Shi} and {Bo Zhu} and {Amr M. Youssef}},
publisher = {IEEE},
booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, ICITST 2009, London, UK, November 9-12, 2009}
}
@inproceedings{conf/sacrypt/KircanskiY09,
title = {Differential Fault Analysis of Rabbit.},
year = {2009},
booktitle = {Selected Areas in Cryptography},
author = {{Aleksandar Kircanski} and {Amr M. Youssef}},
publisher = {Springer},
booktitle = {Selected Areas in Cryptography, 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers}
}
@inproceedings{conf/securware/ShiZY09,
title = {A PIN Entry Scheme Resistant to Recording-Based Shoulder-Surfing.},
year = {2009},
booktitle = {SECURWARE},
author = {{Peipei Shi} and {Bo Zhu} and {Amr M. Youssef}},
publisher = {IEEE Computer Society},
booktitle = {The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece}
}
@article{journals/ccds/KircanskiAY09,
title = {A new distinguishing and key recovery attack on NGG stream cipher.},
year = {2009},
journal = {Cryptogr. Commun.},
author = {{Aleksandar Kircanski} and {Rabeah Al-Zaidy} and {Amr M. Youssef}}
}
@article{journals/iet-com/AssraHY09,
title = {BER analysis of space-time diversity in CDMA systems over frequency-selective fading channels.},
year = {2009},
journal = {IET Commun.},
author = {{Ayman Assra} and {Walaa Hamouda} and {Amr M. Youssef}}
}
@article{journals/isci/Youssef09,
title = {Cryptanalysis of a knapsack-based probabilistic encryption scheme.},
year = {2009},
journal = {Inf. Sci.},
author = {{Amr M. Youssef}}
}
@article{journals/tit/LiuY09,
title = {On the Existence of (10, 2, 7, 488) Resilient Functions.},
year = {2009},
journal = {IEEE Trans. Inf. Theory},
author = {{Wen Ming Liu} and {Amr M. Youssef}}
}
@inproceedings{conf/africacrypt/KircanskiY10,
title = {Differential Fault Analysis of HC-128.},
year = {2010},
booktitle = {AFRICACRYPT},
author = {{Aleksandar Kircanski} and {Amr M. Youssef}},
publisher = {Springer},
booktitle = {Progress in Cryptology - AFRICACRYPT 2010, Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings}
}
@inproceedings{conf/globecom/AssraHY10,
title = {Joint Iterative Channel Estimation and Data Detection for MIMO-CDMA Systems over Frequency-Selective Fading Channels.},
year = {2010},
booktitle = {GLOBECOM},
author = {{Ayman Assra} and {Walaa Hamouda} and {Amr M. Youssef}},
publisher = {IEEE},
booktitle = {Proceedings of the Global Communications Conference, 2010. GLOBECOM 2010, 6-10 December 2010, Miami, Florida, USA}
}
@inproceedings{conf/globecom/BasyouniHY10,
title = {A New Rate Control Technique for cdma2000 1xEV.},
year = {2010},
booktitle = {GLOBECOM},
author = {{Ayda Basyouni} and {Walaa Hamouda} and {Amr M. Youssef}},
publisher = {IEEE},
booktitle = {Proceedings of the Global Communications Conference, 2010. GLOBECOM 2010, 6-10 December 2010, Miami, Florida, USA}
}
@inproceedings{conf/isspit/ElshehY10,
title = {On the security of image encryption schemes based on Multiple Parameters Transforms.},
year = {2010},
booktitle = {ISSPIT},
author = {{Esam Elsheh} and {Amr M. Youssef}},
publisher = {IEEE Computer Society},
booktitle = {Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, ISSPIT 2010, December 15-18,2010, Luxor, Egypt}
}
@inproceedings{conf/isspit/ShiZY10,
title = {A framework to strengthen password authentication using mobile devices and browser extensions.},
year = {2010},
booktitle = {ISSPIT},
author = {{Peipei Shi} and {Bo Zhu} and {Amr M. Youssef}},
publisher = {IEEE Computer Society},
booktitle = {Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, ISSPIT 2010, December 15-18,2010, Luxor, Egypt}
}
@inproceedings{conf/pst/BinsalleehOBSYDW10,
title = {On the analysis of the Zeus botnet crimeware toolkit.},
year = {2010},
booktitle = {PST},
author = {{Hamad Binsalleeh} and {Thomas C. Ormerod} and {Amine Boukhtouta} and {Prosenjit Sinha} and {Amr M. Youssef} and {Mourad Debbabi} and {Lingyu Wang 001}},
publisher = {IEEE},
booktitle = {Eighth Annual Conference on Privacy, Security and Trust, PST 2010, August 17-19, 2010, Ottawa, Ontario, Canada}
}
@inproceedings{conf/securware/OrmerodWDYBBS10,
title = {Defaming Botnet Toolkits: A Bottom-Up Approach to Mitigating the Threat.},
year = {2010},
booktitle = {SECURWARE},
author = {{Thomas C. Ormerod} and {Lingyu Wang 001} and {Mourad Debbabi} and {Amr M. Youssef} and {Hamad Binsalleeh} and {Amine Boukhtouta} and {Prosenjit Sinha}},
publisher = {IEEE Computer Society},
booktitle = {Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010}
}
@inproceedings{conf/vtc/AssraHY10,
title = {EM Channel Estimation and Data Detection for MIMO-CDMA Systems over Slow-Fading Channels.},
year = {2010},
booktitle = {VTC Fall},
author = {{Ayman Assra} and {Walaa Hamouda} and {Amr M. Youssef}},
publisher = {IEEE},
booktitle = {Proceedings of the 72nd IEEE Vehicular Technology Conference, VTC Fall 2010, 6-9 September 2010, Ottawa, Canada}
}
@inproceedings{conf/wimo/RasslanY10,
title = {A Bilinear Pairing Based Hidden-Signature Scheme.},
year = {2010},
booktitle = {WiMo},
author = {{Mohamed Rasslan} and {Amr M. Youssef}},
booktitle = {Recent Trends in Wireless and Mobile Networks - Second International Conference, WiMo 2010, Ankara, Turkey, June 26-28, 2010. Proceedings}
}
@article{journals/ccds/KircanskiY10,
title = {On the structural weakness of the GGHN stream cipher.},
year = {2010},
journal = {Cryptogr. Commun.},
author = {{Aleksandar Kircanski} and {Amr M. Youssef}}
}
@article{journals/cee/Youssef10,
title = {Cryptanalysis of Boolean permutation-based key escrow scheme.},
year = {2010},
journal = {Comput. Electr. Eng.},
author = {{Amr M. Youssef}}
}
@article{journals/di/KhanBY10,
title = {Speaker recognition from encrypted VoIP communications.},
year = {2010},
journal = {Digit. Investig.},
author = {{Liaqat Ali Khan} and {Muhammad Shamim Baig} and {Amr M. Youssef}}
}
@article{journals/iacr/KamalY10,
title = {Applications of SAT Solvers to AES key Recovery from Decayed Key Schedule Images.},
year = {2010},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Abdel Alim Kamal} and {Amr M. Youssef}}
}
@article{journals/ieicet/RasslanY10,
title = {Cryptanalysis of Hwang-Lo-Hsiao-Chu Authenticated Encryption Schemes.},
year = {2010},
journal = {IEICE Trans. Inf. Syst.},
author = {{Mohamed M. Nasreldin Rasslan} and {Amr M. Youssef}}
}
@article{journals/iet-com/BasyouniHY10,
title = {Improved channel access protocol for cooperative ad hoc networks.},
year = {2010},
journal = {IET Commun.},
author = {{Ayda Basyouni} and {Walaa Hamouda} and {Amr M. Youssef}}
}
@article{journals/tvt/AssraHY10,
title = {EM-Based Joint Channel Estimation and Data Detection for MIMO-CDMA Systems.},
year = {2010},
journal = {IEEE Trans. Veh. Technol.},
author = {{Ayman Assra} and {Walaa Hamouda} and {Amr M. Youssef}}
}
@article{journals/tvt/AssraHY10a,
title = {A Channel-Estimation and Data-Detection Scheme for Multiuser MIMO-CDMA Systems in Fading Channels.},
year = {2010},
journal = {IEEE Trans. Veh. Technol.},
author = {{Ayman Assra} and {Walaa Hamouda} and {Amr M. Youssef}}
}
@inproceedings{conf/africacrypt/SalehaniKY11,
title = {Differential Fault Analysis of Sosemanuk.},
year = {2011},
booktitle = {AFRICACRYPT},
author = {{Yaser Esmaeili Salehani} and {Aleksandar Kircanski} and {Amr M. Youssef}},
publisher = {Springer},
booktitle = {Progress in Cryptology - AFRICACRYPT 2011 - 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings}
}
@inproceedings{conf/sac/Al-ZaidyFY11,
title = {Towards discovering criminal communities from textual data.},
year = {2011},
booktitle = {SAC},
author = {{Rabeah Al-Zaidy} and {Benjamin C. M. Fung} and {Amr M. Youssef}},
publisher = {ACM},
booktitle = {Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21 - 24, 2011}
}
@inproceedings{conf/secrypt/SalehaniY11,
title = {Differential Fault Analysis of Hummingbird.},
year = {2011},
booktitle = {SECRYPT},
author = {{Yaser Esmaeili Salehani} and {Amr M. Youssef}},
publisher = {SciTePress},
booktitle = {SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications}
}
@article{journals/cee/RasslanY11,
title = {Comments on the security of Chen's authenticated encryption scheme.},
year = {2011},
journal = {Comput. Electr. Eng.},
author = {{Mohamed M. Nasreldin Rasslan} and {Amr M. Youssef}}
}
@article{journals/cma/Youssef11,
title = {Cryptanalysis of a quadratic knapsack cryptosystem.},
year = {2011},
journal = {Comput. Math. Appl.},
author = {{Amr M. Youssef}}
}
@article{journals/ieicet/KamalY11,
title = {Fault Analysis of the NTRUEncrypt Cryptosystem.},
year = {2011},
journal = {IEICE Trans. Fundam. Electron. Commun. Comput. Sci.},
author = {{Abdel Alim Kamal} and {Amr M. Youssef}}
}
@article{journals/ieicet/RasslanY11,
title = {Cryptanalysis of a Public Key Encryption Scheme Using Ergodic Matrices.},
year = {2011},
journal = {IEICE Trans. Fundam. Electron. Commun. Comput. Sci.},
author = {{Mohamed M. Nasreldin Rasslan} and {Amr M. Youssef}}
}
@article{journals/iet-com/BasyouniHY11,
title = {Cooperative relaying protocol for energy-constrained ad hoc networks.},
year = {2011},
journal = {IET Commun.},
author = {{Ayda Basyouni} and {Walaa Hamouda} and {Amr M. Youssef}}
}
@article{journals/iet-ifs/KircanskiY11,
title = {On the sliding property of SNOW 3 G and SNOW 2.0.},
year = {2011},
journal = {IET Inf. Secur.},
author = {{Aleksandar Kircanski} and {Amr M. Youssef}}
}
@inproceedings{conf/IEEEares/KamalY12,
title = {A Scan-Based Side Channel Attack on the NTRUEncrypt Cryptosystem.},
year = {2012},
booktitle = {ARES},
author = {{Abdel Alim Kamal} and {Amr M. Youssef}},
publisher = {IEEE Computer Society},
booktitle = {Seventh International Conference on Availability, Reliability and Security, Prague, ARES 2012, Czech Republic, August 20-24, 2012}
}
@inproceedings{conf/IEEEares/KircanskiY12,
title = {On the Weak State in GGHN-like Ciphers.},
year = {2012},
booktitle = {ARES},
author = {{Aleksandar Kircanski} and {Amr M. Youssef}},
publisher = {IEEE Computer Society},
booktitle = {Seventh International Conference on Availability, Reliability and Security, Prague, ARES 2012, Czech Republic, August 20-24, 2012}
}
@inproceedings{conf/acity/ZahnoY12,
title = {An Obfuscated Implementation of RC4.},
year = {2012},
booktitle = {ACITY (1)},
author = {{Roger Zahno} and {Amr M. Youssef}},
publisher = {Springer},
booktitle = {Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India - Volume 1}
}
@inproceedings{conf/icc/HayatleOY12,
title = {A game theoretic investigation for high interaction honeypots.},
year = {2012},
booktitle = {ICC},
author = {{Osama Hayatle} and {Hadi Otrok} and {Amr M. Youssef}},
publisher = {IEEE},
booktitle = {Proceedings of IEEE International Conference on Communications, ICC 2012, Ottawa, ON, Canada, June 10-15, 2012}
}
@inproceedings{conf/latincrypt/KircanskiY12,
title = {On the Sosemanuk Related Key-IV Sets.},
year = {2012},
booktitle = {LATINCRYPT},
author = {{Aleksandar Kircanski} and {Amr M. Youssef}},
publisher = {Springer},
booktitle = {Progress in Cryptology - LATINCRYPT 2012 - 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012. Proceedings}
}
@inproceedings{conf/sacrypt/BiryukovKY12,
title = {Cryptanalysis of the Loiss Stream Cipher.},
year = {2012},
booktitle = {Selected Areas in Cryptography},
author = {{Alex Biryukov} and {Aleksandar Kircanski} and {Amr M. Youssef}},
publisher = {Springer},
booktitle = {Selected Areas in Cryptography, 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers}
}
@inproceedings{conf/sacrypt/KircanskiSWY12,
title = {Boomerang and Slide-Rotational Analysis of the SM3 Hash Function.},
year = {2012},
booktitle = {Selected Areas in Cryptography},
author = {{Aleksandar Kircanski} and {Yanzhao Shen} and {Gaoli Wang} and {Amr M. Youssef}},
publisher = {Springer},
booktitle = {Selected Areas in Cryptography, 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers}
}
@article{journals/aaecc/KamalY12,
title = {Cryptanalysis of a key exchange protocol based on the endomorphisms ring End (ℤp × ℤp2).},
year = {2012},
journal = {Appl. Algebra Eng. Commun. Comput.},
author = {{Abdel Alim Kamal} and {Amr M. Youssef}}
}
@article{journals/ccds/KamalY12,
title = {Fault analysis of the NTRUSign digital signature scheme.},
year = {2012},
journal = {Cryptogr. Commun.},
author = {{Abdel Alim Kamal} and {Amr M. Youssef}}
}
@article{journals/di/Al-ZaidyFYF12,
title = {Mining criminal networks from unstructured text documents.},
year = {2012},
journal = {Digit. Investig.},
author = {{Rabeah Al-Zaidy} and {Benjamin C. M. Fung} and {Amr M. Youssef} and {Francis Fortin}}
}
@article{journals/iacr/KircanskiY12,
title = {Boomerang and Slide-Rotational Analysis of the SM3 Hash Function.},
year = {2012},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Aleksandar Kircanski} and {Amr M. Youssef}}
}
@article{journals/ieicet/KamalY12,
title = {Cryptanalysis of a GL(r, Zn)-Based Public Key System.},
year = {2012},
journal = {IEICE Trans. Fundam. Electron. Commun. Comput. Sci.},
author = {{Abdel Alim Kamal} and {Amr M. Youssef}}
}
@article{journals/isjgp/HayatleYO12,
title = {Dempster-Shafer Evidence Combining for (Anti)-Honeypot Technologies.},
year = {2012},
journal = {Inf. Secur. J. A Glob. Perspect.},
author = {{Osama Hayatle} and {Amr M. Youssef} and {Hadi Otrok}}
}
@article{journals/tsg/ShinwariYH12,
title = {A Water-Filling Based Scheduling Algorithm for the Smart Grid.},
year = {2012},
journal = {IEEE Trans. Smart Grid},
author = {{Merwais Shinwari} and {Amr M. Youssef} and {Walaa Hamouda}}
}
@inproceedings{conf/IEEEares/KamalZY13,
title = {A Comparison between Two Off-the-Shelf Algebraic Tools for Extraction of Cryptographic Keys from Corrupted Memory Images.},
year = {2013},
booktitle = {CD-ARES Workshops},
author = {{Abdel Alim Kamal} and {Roger Zahno} and {Amr M. Youssef}},
publisher = {Springer},
booktitle = {Security Engineering and Intelligence Informatics - CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings}
}
@inproceedings{conf/secnet/ShinwariYH13,
title = {A Privacy Preserving Approach to Smart Metering.},
year = {2013},
booktitle = {SecNet},
author = {{Merwais Shinwari} and {Amr M. Youssef} and {Walaa Hamouda}},
publisher = {Springer},
booktitle = {Advances in Security of Information and Communication Networks - First International Conference, SecNet 2013, Cairo, Egypt, September 3-5, 2013. Proceedings}
}
@article{journals/iacr/AlTawyKY13,
title = {Rebound attacks on Stribog.},
year = {2013},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Riham AlTawy} and {Aleksandar Kircanski} and {Amr M. Youssef}}
}
@article{journals/iacr/KircanskiAY13,
title = {A heuristic for finding compatible differential paths with application to HAS-160.},
year = {2013},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Aleksandar Kircanski} and {Riham AlTawy} and {Amr M. Youssef}}
}
@article{journals/ipl/AlTawyKY13,
title = {Second order collision for the 42-step reduced DHA-256 hash function.},
year = {2013},
journal = {Inf. Process. Lett.},
author = {{Riham AlTawy} and {Aleksandar Kircanski} and {Amr M. Youssef}}
}
@article{journals/isci/KamalY13,
title = {Cryptanalysis of Álvarez et al. key exchange scheme.},
year = {2013},
journal = {Inf. Sci.},
author = {{Abdel Alim Kamal} and {Amr M. Youssef}}
}
@article{journals/isjgp/HayatleOY13,
title = {A Markov Decision Process Model for High Interaction Honeypots.},
year = {2013},
journal = {Inf. Secur. J. A Glob. Perspect.},
author = {{Osama Hayatle} and {Hadi Otrok} and {Amr M. Youssef}}
}
@article{journals/jce/KamalY13,
title = {Strengthening hardware implementations of NTRUEncrypt against fault analysis attacks.},
year = {2013},
journal = {J. Cryptogr. Eng.},
author = {{Abdel Alim Kamal} and {Amr M. Youssef}}
}
@inproceedings{conf/cisc/AlTawyY14,
title = {Second Preimage Analysis of Whirlwind.},
year = {2014},
booktitle = {Inscrypt},
author = {{Riham AlTawy} and {Amr M. Youssef}},
publisher = {Springer},
booktitle = {Information Security and Cryptology - 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers}
}
@inproceedings{conf/icc/KaraBMYD14,
title = {Detection of malicious payload distribution channels in DNS.},
year = {2014},
booktitle = {ICC},
author = {{A. Mert Kara} and {Hamad Binsalleeh} and {Mohammad Mannan} and {Amr M. Youssef} and {Mourad Debbabi}},
publisher = {IEEE},
booktitle = {IEEE International Conference on Communications, ICC 2014, Sydney, Australia, June 10-14, 2014}
}
@inproceedings{conf/lightsec/AlTawyY14,
title = {Differential Sieving for 2-Step Matching Meet-in-the-Middle Attack with Application to LBlock.},
year = {2014},
booktitle = {LightSec},
author = {{Riham AlTawy} and {Amr M. Youssef}},
publisher = {Springer},
booktitle = {Lightweight Cryptography for Security and Privacy - Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers}
}
@inproceedings{conf/ntms/BinsalleehKYD14,
title = {Characterization of Covert Channels in DNS.},
year = {2014},
booktitle = {NTMS},
author = {{Hamad Binsalleeh} and {A. Mert Kara} and {Amr M. Youssef} and {Mourad Debbabi}},
publisher = {IEEE},
booktitle = {6th International Conference on New Technologies, Mobility and Security, NTMS 2014, Dubai, United Arab Emirates, March 30 - April 2, 2014}
}
@article{journals/iacr/AlTawyY14,
title = {Preimage attacks on Reduced-round Stribog.},
year = {2014},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Riham AlTawy} and {Amr M. Youssef}}
}
@article{journals/ipl/AlTawyY14,
title = {Integral distinguishers for reduced-round Stribog.},
year = {2014},
journal = {Inf. Process. Lett.},
author = {{Riham AlTawy} and {Amr M. Youssef}}
}
@inproceedings{conf/c2si/AbdelkhalekAY15,
title = {Impossible Differential Properties of Reduced Round Streebog.},
year = {2015},
booktitle = {C2SI},
author = {{Ahmed Abdelkhalek 001} and {Riham AlTawy} and {Amr M. Youssef}},
publisher = {Springer},
booktitle = {Codes, Cryptology, and Information Security - First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger}
}
@inproceedings{conf/c2si/AlTawyTY15,
title = {A Higher Order Key Partitioning Attack with Application to LBlock.},
year = {2015},
booktitle = {C2SI},
author = {{Riham AlTawy} and {Mohamed Tolba} and {Amr M. Youssef}},
publisher = {Springer},
booktitle = {Codes, Cryptology, and Information Security - First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger}
}
@inproceedings{conf/ispec/AlTawyY15,
title = {Differential Fault Analysis of Streebog.},
year = {2015},
booktitle = {ISPEC},
author = {{Riham AlTawy} and {Amr M. Youssef}},
publisher = {Springer},
booktitle = {Information Security Practice and Experience - 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015. Proceedings}
}
@inproceedings{conf/latincrypt/AbdelkhalekATY15,
title = {Meet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3.},
year = {2015},
booktitle = {LATINCRYPT},
author = {{Ahmed Abdelkhalek 001} and {Riham AlTawy} and {Mohamed Tolba} and {Amr M. Youssef}},
publisher = {Springer},
booktitle = {Progress in Cryptology - LATINCRYPT 2015 - 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings}
}
@inproceedings{conf/lightsec/TolbaAY15,
title = {Meet-in-the-Middle Attacks on Reduced Round Piccolo.},
year = {2015},
booktitle = {LightSec},
author = {{Mohamed Tolba} and {Ahmed Abdelkhalek 001} and {Amr M. Youssef}},
publisher = {Springer},
booktitle = {Lightweight Cryptography for Security and Privacy - 4th International Workshop, LightSec 2015, Bochum, Germany, September 10-11, 2015, Revised Selected Papers}
}
@inproceedings{conf/space/AbdelkhalekTY15,
title = {Improved Key Recovery Attack on Round-reduced Hierocrypt-L1 in the Single-Key Setting.},
year = {2015},
booktitle = {SPACE},
author = {{Ahmed Abdelkhalek 001} and {Mohamed Tolba} and {Amr M. Youssef}},
publisher = {Springer},
booktitle = {Security, Privacy, and Applied Cryptography Engineering - 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedings}
}
@inproceedings{conf/space/AlTawyY15,
title = {Preimage Analysis of the Maelstrom-0 Hash Function.},
year = {2015},
booktitle = {SPACE},
author = {{Riham AlTawy} and {Amr M. Youssef}},
publisher = {Springer},
booktitle = {Security, Privacy, and Applied Cryptography Engineering - 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedings}
}
@inproceedings{conf/space/TolbaAY15,
title = {Meet-in-the-Middle Attacks on Round-Reduced Khudra.},
year = {2015},
booktitle = {SPACE},
author = {{Mohamed Tolba} and {Ahmed Abdelkhalek 001} and {Amr M. Youssef}},
publisher = {Springer},
booktitle = {Security, Privacy, and Applied Cryptography Engineering - 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedings}
}
@article{journals/iacr/AlTawyAY15,
title = {A Meet-in-the-Middle Attack on Reduced-Round Kalyna-b/2b.},
year = {2015},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Riham AlTawy} and {Ahmed Abdelkhalek 001} and {Amr M. Youssef}}
}
@article{journals/iacr/AlTawyDY15,
title = {Fault Analysis of Kuznyechik.},
year = {2015},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Riham AlTawy} and {Onur Duman} and {Amr M. Youssef}}
}
@article{journals/iacr/AlTawyY15,
title = {Meet in the Middle Attacks on Reduced Round Kuznyechik.},
year = {2015},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Riham AlTawy} and {Amr M. Youssef}}
}
@article{journals/ieicet/AlTawyY15,
title = {A Meet in the Middle Attack on Reduced Round Kuznyechik.},
year = {2015},
journal = {IEICE Trans. Fundam. Electron. Commun. Comput. Sci.},
author = {{Riham AlTawy} and {Amr M. Youssef}}
}
@article{journals/iet-ifs/AlTawyY15,
title = {Watch your constants: malicious Streebog.},
year = {2015},
journal = {IET Inf. Secur.},
author = {{Riham AlTawy} and {Amr M. Youssef}}
}
@inproceedings{conf/icc/KamelHY16,
title = {Multiple association in ultra-dense networks.},
year = {2016},
booktitle = {ICC},
author = {{Mahmoud I. Kamel} and {Walaa Hamouda} and {Amr M. Youssef}},
publisher = {IEEE},
booktitle = {2016 IEEE International Conference on Communications, ICC 2016, Kuala Lumpur, Malaysia, May 22-27, 2016}
}
@inproceedings{conf/isw/0001TY16,
title = {Improved Linear Cryptanalysis of Round-Reduced ARIA.},
year = {2016},
booktitle = {ISC},
author = {{Ahmed Abdelkhalek 001} and {Mohamed Tolba} and {Amr M. Youssef}},
publisher = {Springer},
booktitle = {Information Security - 19th International Conference, ISC 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings}
}
@inproceedings{conf/isw/Tolba0Y16,
title = {Truncated and Multiple Differential Cryptanalysis of Reduced Round Midori128.},
year = {2016},
booktitle = {ISC},
author = {{Mohamed Tolba} and {Ahmed Abdelkhalek 001} and {Amr M. Youssef}},
publisher = {Springer},
booktitle = {Information Security - 19th International Conference, ISC 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings}
}
@inproceedings{conf/mownet/ZhuYH16,
title = {Detection techniques for data-level spoofing in GPS-based phasor measurement units.},
year = {2016},
booktitle = {MoWNet},
author = {{Fu Zhu} and {Amr M. Youssef} and {Walaa Hamouda}},
publisher = {IEEE},
booktitle = {International Conference on Selected Topics in Mobile & Wireless Networking, MoWNeT 2016, Cairo, Egypt, April 11-13, 2016}
}
@article{journals/access/AlTawyY16,
title = {Security Tradeoffs in Cyber Physical Systems: A Case Study Survey on Implantable Medical Devices.},
year = {2016},
journal = {IEEE Access},
author = {{Riham AlTawy} and {Amr M. Youssef}}
}
@article{journals/comsur/KamelHY16,
title = {Ultra-Dense Networks: A Survey.},
year = {2016},
journal = {IEEE Commun. Surv. Tutorials},
author = {{Mahmoud I. Kamel} and {Walaa Hamouda} and {Amr M. Youssef}}
}
@article{journals/iacr/TolbaAY16,
title = {Impossible Differential Cryptanalysis of Reduced-Round SKINNY.},
year = {2016},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Mohamed Tolba} and {Ahmed Abdelkhalek 001} and {Amr M. Youssef}}
}
@article{journals/ieicet/AlTawy0Y16,
title = {A Meet-in-the-Middle Attack on Reduced-Round Kalyna-b/2b.},
year = {2016},
journal = {IEICE Trans. Inf. Syst.},
author = {{Riham AlTawy} and {Ahmed Abdelkhalek 001} and {Amr M. Youssef}}
}
@article{journals/ieicet/TolbaAY16,
title = {A Meet in the Middle Attack on Reduced Round Kiasu-BC.},
year = {2016},
journal = {IEICE Trans. Fundam. Electron. Commun. Comput. Sci.},
author = {{Mohamed Tolba} and {Ahmed Abdelkhalek 001} and {Amr M. Youssef}}
}
@article{journals/ipl/TolbaY16,
title = {Generalized MitM attacks on full TWINE.},
year = {2016},
journal = {Inf. Process. Lett.},
author = {{Mohamed Tolba} and {Amr M. Youssef}}
}
@inproceedings{conf/africacrypt/0001TY17,
title = {Impossible Differential Attack on Reduced Round SPARX-64/128.},
year = {2017},
booktitle = {AFRICACRYPT},
author = {{Ahmed Abdelkhalek 001} and {Mohamed Tolba} and {Amr M. Youssef}},
booktitle = {Progress in Cryptology - AFRICACRYPT 2017 - 9th International Conference on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings}
}
@inproceedings{conf/ccs/HuangYD17,
title = {BinSequence: Fast, Accurate and Scalable Binary Code Reuse Detection.},
year = {2017},
booktitle = {AsiaCCS},
author = {{He Huang} and {Amr M. Youssef} and {Mourad Debbabi}},
publisher = {ACM},
booktitle = {Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017}
}
@inproceedings{conf/globecom/KamelHY17,
title = {Coverage and Capacity Analysis with Stretched Exponential Path Loss in Ultra-Dense Networks.},
year = {2017},
booktitle = {GLOBECOM},
author = {{Mahmoud I. Kamel} and {Walaa Hamouda} and {Amr M. Youssef}},
publisher = {IEEE},
booktitle = {2017 IEEE Global Communications Conference, GLOBECOM 2017, Singapore, December 4-8, 2017}
}
@inproceedings{conf/icc/KamelHY17,
title = {Average downlink rate in Ultra-Dense Networks.},
year = {2017},
booktitle = {ICC},
author = {{Mahmoud I. Kamel} and {Walaa Hamouda} and {Amr M. Youssef}},
publisher = {IEEE},
booktitle = {IEEE International Conference on Communications, ICC 2017, Paris, France, May 21-25, 2017}
}
@inproceedings{conf/icisc/TolbaY17,
title = {Improved Meet-in-the-Middle Attacks on Reduced Round Kuznyechik.},
year = {2017},
booktitle = {ICISC},
author = {{Mohamed Tolba} and {Amr M. Youssef}},
publisher = {Springer},
booktitle = {Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29 - December 1, 2017, Revised Selected Papers}
}
@inproceedings{conf/icm2/MahmoudNY17,
title = {A power analysis resistant FPGA implementation of NTRUEncrypt.},
year = {2017},
booktitle = {ICM},
author = {{Moustafa Mahmoud} and {Mouna Nakkar} and {Amr M. Youssef}},
publisher = {IEEE},
booktitle = {29th International Conference on Microelectronics, ICM 2017, Beirut, Lebanon, December 10-13, 2017}
}
@inproceedings{conf/icm2/NakkarMY17,
title = {Fault analysis-resistant implementation of Rainbow Signature scheme.},
year = {2017},
booktitle = {ICM},
author = {{Mouna Nakkar} and {Moustafa Mahmoud} and {Amr M. Youssef}},
publisher = {IEEE},
booktitle = {29th International Conference on Microelectronics, ICM 2017, Beirut, Lebanon, December 10-13, 2017}
}
@inproceedings{conf/pimrc/KamelHY17,
title = {Downlink coverage and average cell load of M2M and H2H in ultra-dense networks.},
year = {2017},
booktitle = {PIMRC},
author = {{Mahmoud I. Kamel} and {Walaa Hamouda} and {Amr M. Youssef}},
publisher = {IEEE},
booktitle = {28th IEEE Annual International Symposium on Personal, Indoor, and Mobile Radio Communications, PIMRC 2017, Montreal, QC, Canada, October 8-13, 2017}
}
@inproceedings{conf/sacrypt/Tolba0Y17,
title = {Multidimensional Zero-Correlation Linear Cryptanalysis of Reduced Round SPARX-128.},
year = {2017},
booktitle = {SAC},
author = {{Mohamed Tolba} and {Ahmed Abdelkhalek 001} and {Amr M. Youssef}},
publisher = {Springer},
booktitle = {Selected Areas in Cryptography - SAC 2017 - 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers}
}
@inproceedings{conf/stast/MahmoudHBMY17,
title = {Towards a comprehensive analytical framework for smart toy privacy practices.},
year = {2017},
booktitle = {STAST},
author = {{Moustafa Mahmoud} and {Md Zakir Hossen} and {Hesham Barakat} and {Mohammad Mannan} and {Amr M. Youssef}},
publisher = {ACM},
booktitle = {Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and Trust, STAST 2017, Orlando, FL, USA, December 5, 2017}
}
@article{journals/iacr/AlTawyEYG17,
title = {Lelantos: A Blockchain-based Anonymous Physical Delivery System.},
year = {2017},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Riham AlTawy} and {Muhammad ElSheikh} and {Amr M. Youssef} and {Guang Gong}}
}
@article{journals/ieicet/Tolba0Y17,
title = {Improved Multiple Impossible Differential Cryptanalysis of Midori128.},
year = {2017},
journal = {IEICE Trans. Fundam. Electron. Commun. Comput. Sci.},
author = {{Mohamed Tolba} and {Ahmed Abdelkhalek 001} and {Amr M. Youssef}}
}
@article{journals/isjgp/DumanY17,
title = {Fault analysis on Kalyna.},
year = {2017},
journal = {Inf. Secur. J. A Glob. Perspect.},
author = {{Onur Duman} and {Amr M. Youssef}}
}
@article{journals/tcom/KamelHY17,
title = {Performance Analysis of Multiple Association in Ultra-Dense Networks.},
year = {2017},
journal = {IEEE Trans. Commun.},
author = {{Mahmoud I. Kamel} and {Walaa Hamouda} and {Amr M. Youssef}}
}
@article{journals/tcps/AlTawyY17,
title = {Security, Privacy, and Safety Aspects of Civilian Drones: A Survey.},
year = {2017},
journal = {ACM Trans. Cyber Phys. Syst.},
author = {{Riham AlTawy} and {Amr M. Youssef}}
}
@article{journals/tosc/0001STTY17,
title = {MILP Modeling for (Large) S-boxes to Optimize Probability of Differential Characteristics.},
year = {2017},
journal = {IACR Trans. Symmetric Cryptol.},
author = {{Ahmed Abdelkhalek 001} and {Yu Sasaki} and {Yosuke Todo} and {Mohamed Tolba} and {Amr M. Youssef}}
}
@article{journals/wcl/KamelHY17,
title = {Physical Layer Security in Ultra-Dense Networks.},
year = {2017},
journal = {IEEE Wirel. Commun. Lett.},
author = {{Mahmoud I. Kamel} and {Walaa Hamouda} and {Amr M. Youssef}}
}
@inproceedings{conf/ccs/WakedMY18,
title = {To Intercept or Not to Intercept: Analyzing TLS Interception in Network Appliances.},
year = {2018},
booktitle = {AsiaCCS},
author = {{Louis Waked} and {Mohammad Mannan} and {Amr M. Youssef}},
publisher = {ACM},
booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018}
}
@inproceedings{conf/esorics/GalalY18,
title = {Succinctly Verifiable Sealed-Bid Auction Smart Contract.},
year = {2018},
booktitle = {DPM/CBT@ESORICS},
author = {{Hisham S. Galal} and {Amr M. Youssef}},
publisher = {Springer},
booktitle = {Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2018 International Workshops, DPM 2018 and CBT 2018, Barcelona, Spain, September 6-7, 2018, Proceedings}
}
@inproceedings{conf/fps/DumanY18,
title = {Fault Analysis of the New Ukrainian Hash Function Standard: Kupyna.},
year = {2018},
booktitle = {FPS},
author = {{Onur Duman} and {Amr M. Youssef}},
publisher = {Springer},
booktitle = {Foundations and Practice of Security - 11th International Symposium, FPS 2018, Montreal, QC, Canada, November 13-15, 2018, Revised Selected Papers}
}
@inproceedings{conf/globecom/KamelHY18,
title = {Uplink Coverage of Machine-Type Communications in Ultra-Dense Networks.},
year = {2018},
booktitle = {GLOBECOM},
author = {{Mahmoud I. Kamel} and {Walaa Hamouda} and {Amr M. Youssef}},
publisher = {IEEE},
booktitle = {IEEE Global Communications Conference, GLOBECOM 2018, Abu Dhabi, United Arab Emirates, December 9-13, 2018}
}
@inproceedings{conf/isgt/AyadFYE18,
title = {Detection of false data injection attacks in smart grids using Recurrent Neural Networks.},
year = {2018},
booktitle = {ISGT},
author = {{Abdelrahman Ayad} and {Hany E. Z. Farag} and {Amr M. Youssef} and {Ehab F. El-Saadany}},
publisher = {IEEE},
booktitle = {2018 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, ISGT 2018, Washington, DC, USA, February 19-22, 2018}
}
@inproceedings{conf/sacrypt/ElSheikhTY18,
title = {Integral Attacks on Round-Reduced Bel-T-256.},
year = {2018},
booktitle = {SAC},
author = {{Muhammad ElSheikh} and {Mohamed Tolba} and {Amr M. Youssef}},
publisher = {Springer},
booktitle = {Selected Areas in Cryptography - SAC 2018 - 25th International Conference, Calgary, AB, Canada, August 15-17, 2018, Revised Selected Papers}
}
@inproceedings{conf/smartgridcomm/AlbarakatiMDYAK18,
title = {OpenStack-Based Evaluation Framework for Smart Grid Cyber Security.},
year = {2018},
booktitle = {SmartGridComm},
author = {{Abdullah Albarakati} and {Bassam Moussa} and {Mourad Debbabi} and {Amr M. Youssef} and {Basile L. Agba} and {Marthe Kassouf}},
publisher = {IEEE},
booktitle = {2018 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2018, Aalborg, Denmark, October 29-31, 2018}
}
@article{journals/corr/abs-1809-05556,
title = {Smart But Unsafe: Experimental Evaluation of Security and Privacy Practices in Smart Toys.},
year = {2018},
journal = {CoRR},
author = {{Sharon Shasha} and {Moustafa Mahmoud} and {Mohammad Mannan} and {Amr M. Youssef}}
}
@article{journals/corr/abs-1809-08729,
title = {The Sorry State of TLS Security in Enterprise Interception Appliances.},
year = {2018},
journal = {CoRR},
author = {{Louis Waked} and {Mohammad Mannan} and {Amr M. Youssef}}
}
@article{journals/iacr/GalalY18,
title = {Verifiable Sealed-Bid Auction on the Ethereum Blockchain.},
year = {2018},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Hisham S. Galal} and {Amr M. Youssef}}
}
@article{journals/ieicet/AbdelkhalekTY18,
title = {Related-Key Differential Attack on Round-Reduced Bel-T-256.},
year = {2018},
journal = {IEICE Trans. Fundam. Electron. Commun. Comput. Sci.},
author = {{Ahmed Abdelkhalek 001} and {Mohamed Tolba} and {Amr M. Youssef}}
}
@article{journals/ieicet/ElSheikhTY18,
title = {Impossible Differential Attack on Reduced Round SPARX-128/256.},
year = {2018},
journal = {IEICE Trans. Fundam. Electron. Commun. Comput. Sci.},
author = {{Muhammad ElSheikh} and {Mohamed Tolba} and {Amr M. Youssef}}
}
@article{journals/tifs/AmeliHYEY18,
title = {Attack Detection for Load Frequency Control Systems Using Stochastic Unknown Input Estimators.},
year = {2018},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Amir Ameli} and {Ali Hooshyar} and {Ameen Hassan Yazdavar} and {Ehab F. El-Saadany} and {Amr M. Youssef}}
}
@inproceedings{conf/acsac/OsmanMHY19,
title = {AppVeto: mobile application self-defense through resource access veto.},
year = {2019},
booktitle = {ACSAC},
author = {{Tousif Osman} and {Mohammad Mannan} and {Urs Hengartner} and {Amr M. Youssef}},
publisher = {ACM},
booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference, ACSAC 2019, San Juan, PR, USA, December 09-13, 2019}
}
@inproceedings{conf/dimva/CabanaYDLKA19,
title = {Detecting, Fingerprinting and Tracking Reconnaissance Campaigns Targeting Industrial Control Systems.},
year = {2019},
booktitle = {DIMVA},
author = {{Olivier Cabana} and {Amr M. Youssef} and {Mourad Debbabi} and {Bernard Lebel} and {Marthe Kassouf} and {Basile L. Agba}},
publisher = {Springer},
booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19-20, 2019, Proceedings}
}
@inproceedings{conf/esorics/AliOMY19,
title = {On Privacy Risks of Public WiFi Captive Portals.},
year = {2019},
booktitle = {DPM/CBT@ESORICS},
author = {{Suzan Ali} and {Tousif Osman} and {Mohammad Mannan} and {Amr M. Youssef}},
publisher = {Springer},
booktitle = {Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2019 International Workshops, DPM 2019 and CBT 2019, Luxembourg, September 26-27, 2019, Proceedings}
}
@inproceedings{conf/fc/ElSheikhCY19,
title = {Short Paper: Deploying PayWord on Ethereum.},
year = {2019},
booktitle = {Financial Cryptography Workshops},
author = {{Muhammad ElSheikh} and {Jeremy Clark} and {Amr M. Youssef}},
publisher = {Springer},
booktitle = {Financial Cryptography and Data Security - FC 2019 International Workshops, VOTING and WTSC, St. Kitts, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers}
}
@inproceedings{conf/iccspa/ElbayoumiKHY19,
title = {Capacity Analysis of Downlink NOMA-Based Coexistent HTC/MTC in UDN.},
year = {2019},
booktitle = {ICCSPA},
author = {{Mohammed Elbayoumi} and {Mahmoud I. Kamel} and {Walaa Hamouda} and {Amr M. Youssef}},
publisher = {IEEE},
booktitle = {International Conference on Communications, Signal Processing, and their Applications, ICCSPA 2019, Sharjah, United Arab Emirates, March 19-21, 2019}
}
@inproceedings{conf/smartgridcomm/AlbarakatiRKKHD19,
title = {Security Monitoring of IEC 61850 Substations Using IEC 62351-7 Network and System Management1.},
year = {2019},
booktitle = {SmartGridComm},
author = {{Abdullah Albarakati} and {Chantale Robillard} and {Mark Karanfil} and {Marthe Kassouf} and {Rachid Hadjidj} and {Mourad Debbabi} and {Amr M. Youssef}},
publisher = {IEEE},
booktitle = {2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2019, Beijing, China, October 21-23, 2019}
}
@article{journals/iacr/ElSheikhAY19,
title = {On MILP-Based Automatic Search for Differential Trails Through Modular Additions with Application to Bel-T.},
year = {2019},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Muhammad ElSheikh} and {Ahmed Abdelkhalek 001} and {Amr M. Youssef}}
}
@article{journals/iacr/ElSheikhY19,
title = {Related-key Differential Cryptanalysis of Full Round CRAFT.},
year = {2019},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Muhammad ElSheikh} and {Amr M. Youssef}}
}
@article{journals/iacr/GalalEY19,
title = {An Efficient Micropayment Channel on Ethereum.},
year = {2019},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Hisham S. Galal} and {Muhammad ElSheikh} and {Amr M. Youssef}}
}
@article{journals/iacr/GalalY19,
title = {Trustee: Full Privacy Preserving Vickrey Auction on top of Ethereum.},
year = {2019},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Hisham S. Galal} and {Amr M. Youssef}}
}
@article{journals/iotj/ShashaMMY19,
title = {Playing With Danger: A Taxonomy and Evaluation of Threats to Smart Toys.},
year = {2019},
journal = {IEEE Internet Things J.},
author = {{Sharon Shasha} and {Moustafa Mahmoud} and {Mohammad Mannan} and {Amr M. Youssef}}
}
@article{journals/tsg/KhalafYE19,
title = {Joint Detection and Mitigation of False Data Injection Attacks in AGC Systems.},
year = {2019},
journal = {IEEE Trans. Smart Grid},
author = {{Mohsen Khalaf} and {Amr M. Youssef} and {Ehab F. El-Saadany}}
}
@inproceedings{conf/acsac/AliEDMY20,
title = {Betrayed by the Guardian: Security and Privacy Risks of Parental Control Solutions.},
year = {2020},
booktitle = {ACSAC},
author = {{Suzan Ali} and {Mounir Elgharabawy} and {Quentin Duchaussoy} and {Mohammad Mannan} and {Amr M. Youssef}},
publisher = {ACM},
booktitle = {ACSAC '20: Annual Computer Security Applications Conference, Virtual Event / Austin, TX, USA, 7-11 December, 2020}
}
@inproceedings{conf/ccta/AbdelwahabLY20,
title = {Set-Theoretic Control for Active Detection of Replay Attacks with Applications to Smart Grid.},
year = {2020},
booktitle = {CCTA},
author = {{Ahmed Abdelwahab} and {Walter Lucia} and {Amr M. Youssef}},
publisher = {IEEE},
booktitle = {2020 IEEE Conference on Control Technology and Applications, CCTA 2020, Montreal, QC, Canada, August 24-26, 2020}
}
@inproceedings{conf/cloudnet/SeifelnasrNYA20,
title = {A Lightweight Authentication and Inter-Cloud Payment Protocol for Edge Computing.},
year = {2020},
booktitle = {CloudNet},
author = {{Mohamed Seifelnasr} and {Mouna Nakkar} and {Amr M. Youssef} and {Riham AlTawy}},
publisher = {IEEE},
booktitle = {9th IEEE International Conference on Cloud Networking, CloudNet 2020, Piscataway, NJ, USA, November 9-11, 2020}
}
@inproceedings{conf/esorics/GalalY20,
title = {Privacy Preserving Netting Protocol for Inter-bank Payments.},
year = {2020},
booktitle = {DPM/CBT@ESORICS},
author = {{Hisham S. Galal} and {Amr M. Youssef}},
publisher = {Springer},
booktitle = {Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2020 International Workshops, DPM 2020 and CBT 2020, Guildford, UK, September 17-18, 2020, Revised Selected Papers}
}
@inproceedings{conf/globecom/ElbayoumiHY20,
title = {A Hybrid NOMA/OMA Scheme for MTC in Ultra-Dense Networks.},
year = {2020},
booktitle = {GLOBECOM},
author = {{Mohammed Elbayoumi} and {Walaa Hamouda} and {Amr M. Youssef}},
publisher = {IEEE},
booktitle = {IEEE Global Communications Conference, GLOBECOM 2020, Virtual Event, Taiwan, December 7-11, 2020}
}
@inproceedings{conf/globecom/ElbayoumiHY20a,
title = {Secrecy Performance in Ultra-Dense Networks with Multiple Associations.},
year = {2020},
booktitle = {GLOBECOM (Workshops)},
author = {{Mohammed Elbayoumi} and {Walaa Hamouda} and {Amr M. Youssef}},
publisher = {IEEE},
booktitle = {IEEE Globecom Workshops, GLOBECOM Workshops 2020, Virtual Event, Taiwan, December 7-11, 2020}
}
@inproceedings{conf/securecomm/StobertSMMY20,
title = {ByPass: Reconsidering the Usability of Password Managers.},
year = {2020},
booktitle = {SecureComm (1)},
author = {{Elizabeth Stobert} and {Tina Safaie} and {Heather Molyneaux} and {Mohammad Mannan} and {Amr M. Youssef}},
publisher = {Springer},
booktitle = {Security and Privacy in Communication Networks - 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part I}
}
@article{journals/comsur/ElbayoumiKHY20,
title = {NOMA-Assisted Machine-Type Communications in UDN: State-of-the-Art and Challenges.},
year = {2020},
journal = {IEEE Commun. Surv. Tutorials},
author = {{Mohammed Elbayoumi} and {Mahmoud I. Kamel} and {Walaa Hamouda} and {Amr M. Youssef}}
}
@article{journals/iacr/ElSheikhY20,
title = {A cautionary note on the use of Gurobi for cryptanalysis.},
year = {2020},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Muhammad ElSheikh} and {Amr M. Youssef}}
}
@article{journals/iacr/ElSheikhY20a,
title = {Integral Cryptanalysis of Reduced-Round Tweakable TWINE.},
year = {2020},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Muhammad ElSheikh} and {Amr M. Youssef}}
}
@article{journals/iacr/SeifelnasrGY20,
title = {Scalable Open-Vote Network on Ethereum.},
year = {2020},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Mohamed Seifelnasr} and {Hisham S. Galal} and {Amr M. Youssef}}
}
@article{journals/iacr/TolbaEY20,
title = {Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE.},
year = {2020},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Mohamed Tolba} and {Muhammad ElSheikh} and {Amr M. Youssef}}
}
@article{journals/iet-cps/AyadFYE20,
title = {Cyber-physical attacks on power distribution systems.},
year = {2020},
journal = {IET Cyper-Phys. Syst.: Theory & Appl.},
author = {{Abdelrahman Ayad} and {Hany E. Z. Farag} and {Amr M. Youssef} and {Ehab F. El-Saadany}}
}
@article{journals/iet-cps/LuciaY20,
title = {Wyner wiretap-like encoding scheme for cyber-physical systems.},
year = {2020},
journal = {IET Cyper-Phys. Syst.: Theory & Appl.},
author = {{Walter Lucia} and {Amr M. Youssef}}
}
@article{journals/iotj/KamelHY20,
title = {Uplink Performance of NOMA-Based Combined HTC and MTC in Ultradense Networks.},
year = {2020},
journal = {IEEE Internet Things J.},
author = {{Mahmoud I. Kamel} and {Walaa Hamouda} and {Amr M. Youssef}}
}
@article{journals/iotj/NakkarAY20,
title = {Lightweight Broadcast Authentication Protocol for Edge-Based Applications.},
year = {2020},
journal = {IEEE Internet Things J.},
author = {{Mouna Nakkar} and {Riham AlTawy} and {Amr M. Youssef}}
}
@article{journals/tifs/AmeliHEY20,
title = {An Intrusion Detection Method for Line Current Differential Relays.},
year = {2020},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Amir Ameli} and {Ali Hooshyar} and {Ehab F. El-Saadany} and {Amr M. Youssef}}
}
@article{journals/tvt/KamelHY20,
title = {Uplink Coverage and Capacity Analysis of mMTC in Ultra-Dense Networks.},
year = {2020},
journal = {IEEE Trans. Veh. Technol.},
author = {{Mahmoud I. Kamel} and {Walaa Hamouda} and {Amr M. Youssef}}
}
@book{series/ais/AlrabaeeDSWYRNMHH20,
title = {Binary Code Fingerprinting for Cybersecurity - Application to Malicious Code Fingerprinting},
year = {2020},
isbn = {978-3-030-34237-1},
publisher = {Springer},
series = {Advances in Information Security},
author = {{Saed Alrabaee} and {Mourad Debbabi} and {Paria Shirani} and {Lingyu Wang 001} and {Amr M. Youssef} and {Ashkan Rahimian} and {Lina Nouh} and {Djedjiga Mouheb} and {He Huang} and {Aiman Hanna}}
}
@inproceedings{conf/fc/GalalY21,
title = {Publicly Verifiable and Secrecy Preserving Periodic Auctions.},
year = {2021},
booktitle = {Financial Cryptography Workshops},
author = {{Hisham S. Galal} and {Amr M. Youssef}},
publisher = {Springer},
booktitle = {Financial Cryptography and Data Security. FC 2021 International Workshops - CoDecFin, DeFi, VOTING, and WTSC, Virtual Event, March 5, 2021, Revised Selected Papers}
}
@inproceedings{conf/icc/ElbayoumiHY21,
title = {Ergodic Secrecy Rate Analysis of Ultra-Dense Networks with Multiple Antennas.},
year = {2021},
booktitle = {ICC},
author = {{Mohammed Elbayoumi} and {Walaa Hamouda} and {Amr M. Youssef}},
publisher = {IEEE},
booktitle = {ICC 2021 - IEEE International Conference on Communications, Montreal, QC, Canada, June 14-23, 2021}
}
@inproceedings{conf/securecomm/UddinMY21,
title = {Horus: A Security Assessment Framework for Android Crypto Wallets.},
year = {2021},
booktitle = {SecureComm (2)},
author = {{Md Shahab Uddin} and {Mohammad Mannan} and {Amr M. Youssef}},
publisher = {Springer},
booktitle = {Security and Privacy in Communication Networks - 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings, Part II}
}
@inproceedings{conf/wf-iot/NakkarAY21,
title = {Lightweight Authentication and Key Agreement Protocol for Edge Computing Applications.},
year = {2021},
booktitle = {WF-IoT},
author = {{Mouna Nakkar} and {Riham AlTawy} and {Amr M. Youssef}},
publisher = {IEEE},
booktitle = {7th IEEE World Forum on Internet of Things, WF-IoT 2021, New Orleans, LA, USA, June 14 - July 31, 2021}
}
@article{journals/corr/abs-2103-09153,
title = {Impact of Electric Vehicles Botnets on the Power Grid.},
year = {2021},
journal = {CoRR},
author = {{Omniyah Gul M. Khan} and {Ehab F. El-Saadany} and {Amr M. Youssef} and {Mostafa F. Shaaban}}
}
@article{journals/corr/abs-2104-01011,
title = {On Securing Cloud-hosted Cyber-physical Systems Using Trusted Execution Environments.},
year = {2021},
journal = {CoRR},
author = {{Amir Mohammad Naseri} and {Walter Lucia} and {Mohammad Mannan} and {Amr M. Youssef}}
}
@article{journals/corr/abs-2109-13312,
title = {LSTM-based approach to detect cyber attacks on market-based congestion management methods.},
year = {2021},
journal = {CoRR},
author = {{Omniyah Gul M. Khan} and {Amr M. Youssef} and {Ehab F. El-Saadany} and {Magdy M. A. Salama}}
}
@article{journals/csysl/AbdelwahabLY21,
title = {Covert Channels in Cyber-Physical Systems.},
year = {2021},
journal = {IEEE Control. Syst. Lett.},
author = {{Ahmed Abdelwahab} and {Walter Lucia} and {Amr M. Youssef}}
}
@article{journals/iacr/ElSheikhY21,
title = {On MILP-based Automatic Search for Bit-Based Division Property for Ciphers with (large) Linear Layers.},
year = {2021},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Muhammad ElSheikh} and {Amr M. Youssef}}
}
@article{journals/ieeesp/AliEDMY21,
title = {Parental Controls: Safer Internet Solutions or New Pitfalls?},
year = {2021},
journal = {IEEE Secur. Priv.},
author = {{Suzan Ali} and {Mounir Elgharabawy} and {Quentin Duchaussoy} and {Mohammad Mannan} and {Amr M. Youssef}}
}
@article{journals/iet-cps/LuciaY21,
title = {Covert channels in stochastic cyber-physical systems.},
year = {2021},
journal = {IET Cyper-Phys. Syst.: Theory & Appl.},
author = {{Walter Lucia} and {Amr M. Youssef}}
}
@article{journals/tcom/ElbayoumiHY21,
title = {Multiple-Association Supporting HTC/MTC in Limited-Backhaul Capacity Ultra-Dense Networks.},
year = {2021},
journal = {IEEE Trans. Commun.},
author = {{Mohammed Elbayoumi} and {Walaa Hamouda} and {Amr M. Youssef}}
}
@article{journals/tifs/CabanaYDLKAA21,
title = {Threat Intelligence Generation Using Network Telescope Data for Industrial Control Systems.},
year = {2021},
journal = {IEEE Trans. Inf. Forensics Secur.},
author = {{Olivier Cabana} and {Amr M. Youssef} and {Mourad Debbabi} and {Bernard Lebel} and {Marthe Kassouf} and {Ribal Atallah} and {Basile L. Agba}}
}
@article{journals/tii/KhanEYS21,
title = {Cyber Security of Market-Based Congestion Management Methods in Power Distribution Systems.},
year = {2021},
journal = {IEEE Trans. Ind. Informatics},
author = {{Omniyah Gul M. Khan} and {Ehab F. El-Saadany} and {Amr M. Youssef} and {Mostafa F. Shaaban}}
}
@article{journals/tnsm/SeifelnasrAY21,
title = {Efficient Inter-Cloud Authentication and Micropayment Protocol for IoT Edge Computing.},
year = {2021},
journal = {IEEE Trans. Netw. Serv. Manag.},
author = {{Mohamed Seifelnasr} and {Riham AlTawy} and {Amr M. Youssef}}
}
@inproceedings{conf/asiaccs/KlubanMY22,
title = {On Measuring Vulnerable JavaScript Functions in the Wild.},
year = {2022},
booktitle = {AsiaCCS},
author = {{Maryna Kluban} and {Mohammad Mannan} and {Amr M. Youssef}},
publisher = {ACM},
booktitle = {ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022}
}
@inproceedings{conf/ecrime/TejaswiSPMY22,
title = {Leaky Kits: The Increased Risk of Data Exposure from Phishing Kits.},
year = {2022},
booktitle = {eCrime},
author = {{Bhaskar Tejaswi} and {Nayanamana Samarasinghe} and {Sajjad Pourali} and {Mohammad Mannan} and {Amr M. Youssef}},
publisher = {IEEE},
booktitle = {APWG Symposium on Electronic Crime Research, eCrime 2022, Boston, MA, USA, November 30 - December 2, 2022}
}
@inproceedings{conf/esorics/SamarasingheKMY22,
title = {No Salvation from Trackers: Privacy Analysis of Religious Websites and Mobile Apps.},
year = {2022},
booktitle = {DPM/CBT@ESORICS},
author = {{Nayanamana Samarasinghe} and {Pranay Kapoor} and {Mohammad Mannan} and {Amr M. Youssef}},
publisher = {Springer},
booktitle = {Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2022 International Workshops, DPM 2022 and CBT 2022, Copenhagen, Denmark, September 26-30, 2022, Revised Selected Papers}
}
@inproceedings{conf/eucc/NaseriLY22,
title = {A Privacy Preserving Solution for Cloud-Enabled Set-Theoretic Model Predictive Control.},
year = {2022},
booktitle = {ECC},
author = {{Amir Mohammad Naseri} and {Walter Lucia} and {Amr M. Youssef}},
publisher = {IEEE},
booktitle = {European Control Conference, ECC 2022, London, United Kingdom, July 12-15, 2022}
}
@inproceedings{conf/eurosp/ElgharabawyKMBW22,
title = {SAUSAGE: Security Analysis of Unix domain Socket usAGE in Android.},
year = {2022},
booktitle = {EuroS&P},
author = {{Mounir Elgharabawy} and {Blas Kojusner} and {Mohammad Mannan} and {Kevin R. B. Butler} and {Byron Williams} and {Amr M. Youssef}},
publisher = {IEEE},
booktitle = {7th IEEE European Symposium on Security and Privacy, EuroS&P 2022, Genoa, Italy, June 6-10, 2022}
}
@inproceedings{conf/eurosp/YuSMY22,
title = {Got Sick and Tracked: Privacy Analysis of Hospital Websites.},
year = {2022},
booktitle = {EuroS&P Workshops},
author = {{Xiufen Yu} and {Nayanamana Samarasinghe} and {Mohammad Mannan} and {Amr M. Youssef}},
publisher = {IEEE},
booktitle = {IEEE European Symposium on Security and Privacy, EuroS&P 2022 - Workshops, Genoa, Italy, June 6-10, 2022}
}
@inproceedings{conf/securecomm/KapoorPMY22,
title = {Silver Surfers on the Tech Wave: Privacy Analysis of Android Apps for the Elderly.},
year = {2022},
booktitle = {SecureComm},
author = {{Pranay Kapoor} and {Rohan Pagey} and {Mohammad Mannan} and {Amr M. Youssef}},
publisher = {Springer},
booktitle = {Security and Privacy in Communication Networks - 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings}
}
@inproceedings{conf/www/SamarasingheAMY22,
title = {Et tu, Brute? Privacy Analysis of Government Websites and Mobile Apps.},
year = {2022},
booktitle = {WWW},
author = {{Nayanamana Samarasinghe} and {Aashish Adhikari} and {Mohammad Mannan} and {Amr M. Youssef}},
publisher = {ACM},
booktitle = {WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25 - 29, 2022}
}
@article{journals/compsec/GalalMY22,
title = {Blindfold: Keeping private keys in PKIs and CDNs out of sight.},
year = {2022},
journal = {Comput. Secur.},
author = {{Hisham S. Galal} and {Mohammad Mannan} and {Amr M. Youssef}}
}
@article{journals/csysl/NaseriLY22,
title = {Encrypted Cloud-Based Set-Theoretic Model Predictive Control.},
year = {2022},
journal = {IEEE Control. Syst. Lett.},
author = {{Amir Mohammad Naseri} and {Walter Lucia} and {Amr M. Youssef}}
}
@article{journals/iacr/ElSheikhY22,
title = {Dispute-free Scalable Open Vote Network using zk-SNARKs.},
year = {2022},
journal = {IACR Cryptol. ePrint Arch.},
author = {{Muhammad ElSheikh} and {Amr M. Youssef}}
}
@article{journals/tcom/ElbayoumiHY22,
title = {Edge Computing and Multiple-Association in Ultra-Dense Networks: Performance Analysis.},
year = {2022},
journal = {IEEE Trans. Commun.},
author = {{Mohammed Elbayoumi} and {Walaa Hamouda} and {Amr M. Youssef}}
}
@article{journals/tii/AlbarakatiRKKDY22,
title = {Security Monitoring of IEC 61850 Substations Using IEC 62351-7 Network and System Management.},
year = {2022},
journal = {IEEE Trans. Ind. Informatics},
author = {{Abdullah Albarakati} and {Chantale Robillard} and {Mark Karanfil} and {Marthe Kassouf} and {Mourad Debbabi} and {Amr M. Youssef} and {Mohsen Ghafouri} and {Rachid Hadjidj}}
}
@article{journals/tsg/SaberYSZE22,
title = {Anomaly-Based Detection of Cyberattacks on Line Current Differential Relays.},
year = {2022},
journal = {IEEE Trans. Smart Grid},
author = {{Ahmad Mohammad Saber} and {Amr M. Youssef} and {Davor Svetinovic} and {Hatem H. Zeineldin} and {Ehab F. El-Saadany}}
}
@article{journals/tsmc/LuciaY22,
title = {A Key-Agreement Scheme for Cyber-Physical Systems.},
year = {2022},
journal = {IEEE Trans. Syst. Man Cybern. Syst.},
author = {{Walter Lucia} and {Amr M. Youssef}}
}
@inproceedings{conf/codaspy/TejaswiMY23,
title = {All Your IoT Devices Are Belong to Us: Security Weaknesses in IoT Management Platforms.},
year = {2023},
booktitle = {CODASPY},
author = {{Bhaskar Tejaswi} and {Mohammad Mannan} and {Amr M. Youssef}},
publisher = {ACM},
booktitle = {Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, CODASPY 2023, Charlotte, NC, USA, April 24-26, 2023.}
}
@inproceedings{conf/esorics/RagabMY23,
title = {Try On, Spied On?: Privacy Analysis of Virtual Try-On Websites and Android Apps.},
year = {2023},
booktitle = {ESORICS Workshops (1)},
author = {{Abdelrahman Ragab} and {Mohammad Mannan} and {Amr M. Youssef}},
publisher = {Springer},
booktitle = {Computer Security. ESORICS 2023 International Workshops - CyberICS, DPM, CBT, and SECPRE, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part I}
}
@inproceedings{conf/icbc2/AfiaGAY23,
title = {vPass: Publicly Verifiable Fair Exchange Protocol for Vehicle Passports.},
year = {2023},
booktitle = {ICBC},
author = {{Ismail Afia} and {Hisham S. Galal} and {Riham AlTawy} and {Amr M. Youssef}},
publisher = {IEEE},
booktitle = {IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2023, Dubai, United Arab Emirates, May 1-5, 2023}
}
@inproceedings{conf/icc/ElbayoumiIEHY23,
title = {Machine-Type Communications in mmWave Ultra-Dense Networks: Performance Analysis.},
year = {2023},
booktitle = {ICC},
author = {{Mohammed Elbayoumi} and {Mohamed Ibrahim} and {Salah Elhoushy} and {Walaa Hamouda} and {Amr M. Youssef}},
publisher = {IEEE},
booktitle = {IEEE International Conference on Communications, ICC 2023, Rome, Italy, May 28 - June 1, 2023}
}
@inproceedings{conf/iecon/SaberYSZE23,
title = {Learning-Based Detection of Malicious Volt-VAr Control Parameters in Smart Inverters.},
year = {2023},
booktitle = {IECON},
author = {{Ahmad Mohammad Saber} and {Amr M. Youssef} and {Davor Svetinovic} and {Hatem H. Zeineldin} and {Ehab F. El-Saadany}},
publisher = {IEEE},
booktitle = {49th Annual Conference of the IEEE Industrial Electronics Society, IECON 2023, Singapore, October 16-19, 2023}
}
@inproceedings{conf/nordsec/MangeardYMY23,
title = {No Place to Hide: Privacy Exposure in Anti-stalkerware Apps and Support Websites.},
year = {2023},
booktitle = {NordSec},
author = {{Philippe Mangeard} and {Xiufen Yu} and {Mohammad Mannan} and {Amr M. Youssef}},
publisher = {Springer},
booktitle = {Secure IT Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, November 16-17, 2023, Proceedings}
}
@inproceedings{conf/raid/BaskaranZMY23,
title = {Measuring the Leakage and Exploitability of Authentication Secrets in Super-apps: The WeChat Case.},
year = {2023},
booktitle = {RAID},
author = {{Supraja Baskaran} and {Lianying Zhao} and {Mohammad Mannan} and {Amr M. Youssef}},
publisher = {ACM},
booktitle = {Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2023, Hong Kong, China, October 16-18, 2023}
}
@inproceedings{conf/www/PageyMY23,
title = {All Your Shops Are Belong to Us: Security Weaknesses in E-commerce Platforms.},
year = {2023},
booktitle = {WWW},
author = {{Rohan Pagey} and {Mohammad Mannan} and {Amr M. Youssef}},
publisher = {ACM},
booktitle = {Proceedings of the ACM Web Conference 2023, WWW 2023, Austin, TX, USA, 30 April 2023 - 4 May 2023}
}
@article{journals/corr/abs-2303-04931,
title = {An Observer-Based Key Agreement Scheme for Remotely Controlled Mobile Robots.},
year = {2023},
journal = {CoRR},
author = {{Amir Mohammad Naseri} and {Walter Lucia} and {Amr M. Youssef}}
}
@article{journals/iotj/NakkarAY23,
title = {GASE: A Lightweight Group Authentication Scheme With Key Agreement for Edge Computing Applications.},
year = {2023},
journal = {IEEE Internet Things J.},
author = {{Mouna Nakkar} and {Riham AlTawy} and {Amr M. Youssef}}
}
@article{journals/tnse/GalalY23,
title = {Aegis: Privacy-Preserving Market for Non-Fungible Tokens.},
year = {2023},
journal = {IEEE Trans. Netw. Sci. Eng.},
author = {{Hisham S. Galal} and {Amr M. Youssef}}
}
@article{journals/iotj/ElbayoumiIEHY23,
title = {Performance Analysis of Cellular Ultradense IoT Networks With Wireless Backhauls.},
year = {2023},
month = {September},
journal = {IEEE Internet Things J.},
author = {{Mohammed Elbayoumi} and {Mohamed Ibrahim} and {Salah Elhoushy} and {Walaa Hamouda} and {Amr M. Youssef}}
}
@article{journals/sj/KhanYSE23,
title = {Management of Congestion in Distribution Networks Utilizing Demand Side Management and Reinforcement Learning.},
year = {2023},
month = {September},
journal = {IEEE Syst. J.},
author = {{Omniyah Gul M. Khan} and {Amr M. Youssef} and {Magdy M. A. Salama} and {Ehab F. El-Saadany}}
}
@article{journals/tnsm/AlTawyGY23,
title = {Mjolnir: Breaking the Glass in a Publicly Verifiable Yet Private Manner.},
year = {2023},
month = {September},
journal = {IEEE Trans. Netw. Serv. Manag.},
author = {{Riham AlTawy} and {Hisham S. Galal} and {Amr M. Youssef}}
}
@article{journals/corr/abs-2402-14949,
title = {Enhancing Power Quality Event Classification with AI Transformer Models.},
year = {2024},
journal = {CoRR},
author = {{Ahmad Mohammad Saber} and {Amr M. Youssef} and {Davor Svetinovic} and {Hatem H. Zeineldin} and {Deepa Kundur} and {Ehab F. El-Saadany}}
}
@article{journals/iotj/SeifelnasrAYG24,
title = {Privacy-Preserving Mutual Authentication Protocol With Forward Secrecy for IoT-Edge-Cloud.},
year = {2024},
journal = {IEEE Internet Things J.},
author = {{Mohamed Seifelnasr} and {Riham AlTawy} and {Amr M. Youssef} and {Essam Ghadafi}}
}
@article{journals/tissec/KlubanMY24,
title = {On Detecting and Measuring Exploitable JavaScript Functions in Real-world Applications.},
year = {2024},
journal = {ACM Trans. Priv. Secur.},
author = {{Maryna Kluban} and {Mohammad Mannan} and {Amr M. Youssef}}
}
@article{journals/iotj/SeifelnasrAY24,
title = {SKAFS: Symmetric Key Authentication Protocol With Forward Secrecy for Edge Computing.},
year = {2024},
month = {January},
journal = {IEEE Internet Things J.},
author = {{Mohamed Seifelnasr} and {Riham AlTawy} and {Amr M. Youssef}}
}
@article{journals/iotj/TejaswiMY24,
title = {Security Weaknesses in IoT Management Platforms.},
year = {2024},
month = {January},
journal = {IEEE Internet Things J.},
author = {{Bhaskar Tejaswi} and {Mohammad Mannan} and {Amr M. Youssef}}
}
@article{journals/tii/SaberYSZE24,
title = {Cyber-Immune Line Current Differential Relays.},
year = {2024},
month = {March},
journal = {IEEE Trans. Ind. Informatics},
author = {{Ahmad Mohammad Saber} and {Amr M. Youssef} and {Davor Svetinovic} and {Hatem H. Zeineldin} and {Ehab F. El-Saadany}}
}