Mina Guirguis

Orcid: 0000-0003-2629-6172

According to our database1, Mina Guirguis authored at least 50 papers between 2004 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
A Game-Theoretic Framework for the Virtual Machines Migration Timing Problem.
IEEE Trans. Cloud Comput., 2021

2020
DeepBLOC: A Framework for Securing CPS through Deep Reinforcement Learning on Stochastic Games.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Pinball attacks against Dynamic Channel assignment in wireless networks.
Comput. Commun., 2019

Solving Cyber Alert Allocation Markov Games with Deep Reinforcement Learning.
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019

2018
Adaptive topologies against jamming attacks in wireless networks: A game-theoretic approach.
J. Netw. Comput. Appl., 2018

Assignment and collaborative execution of tasks on transient clouds.
Ann. des Télécommunications, 2018

Allocating Security Analysts to Cyber Alerts Using Markov Games.
Proceedings of the National Cyber Summit, 2018

A Game-Theoretic Two-Stage Stochastic Programing Model to Protect CPS against Attacks.
Proceedings of the 16th IEEE International Conference on Industrial Informatics, 2018

BLOC: A Game-Theoretic Approach to Orchestrate CPS against Cyber Attacks.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

Toward a Protected Cloud Against Side Channel Attacks: A Game-Theoretic Framework.
Proceedings of the 56th Annual Allerton Conference on Communication, 2018

It's Time to Migrate! A Game-Theoretic Framework for Protecting a Multi-Tenant Cloud against Collocation Attacks.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018

2017
Context-awareness over transient cloud in D2D networks: energy performance analysis and evaluation.
Trans. Emerg. Telecommun. Technol., 2017

Don't Bury your Head in Warnings: A Game-Theoretic Approach for Intelligent Allocation of Cyber-security Alerts.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

Combating the Bandits in the Cloud: A Moving Target Defense Approach.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017

Dynamic game-theoretic defense approach against stealthy Jamming attacks in wireless networks.
Proceedings of the 55th Annual Allerton Conference on Communication, 2017

2016
Pinball attacks: Exploiting channel allocation in wireless networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Game theoretic defense approach to wireless networks against stealthy decoy attacks.
Proceedings of the 54th Annual Allerton Conference on Communication, 2016

2015
Disrupting Adaptive Traffic Lights Cycles through Selective Jamming Attacks.
Proceedings of the IEEE 81st Vehicular Technology Conference, 2015

Stealthy edge decoy attacks against dynamic channel assignment in wireless networks.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Context Awareness over Transient Clouds.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
Demo: Transient clouds.
Proceedings of the 6th International Conference on Mobile Computing, 2014

Transient clouds: Assignment and collaborative execution of tasks on mobile devices.
Proceedings of the IEEE Global Communications Conference, 2014

A unifying approach for the identification of application-driven stealthy attacks on mobile CPS.
Proceedings of the 52nd Annual Allerton Conference on Communication, 2014

2013
Stuck in Traffic (SiT) Attacks: A Framework for Identifying Stealthy Attacks That Cause Traffic Congestion.
Proceedings of the 77th IEEE Vehicular Technology Conference, 2013

Control Theoretic Adaptive Monitoring Tools.
Proceedings of the IEEE Ninth World Congress on Services, 2013

Collaborative Computing On-demand: Harnessing Mobile Devices in Executing On-the-Fly Jobs.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

Stealthy attacks on pheromone swarming.
Proceedings of the IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support, 2013

An abstraction layer for controlling heterogeneous mobile cyber-physical systems.
Proceedings of the 2013 IEEE International Conference on Automation Science and Engineering, 2013

2011
Performance evaluation of path splicing on the GÉANT and the Sprint networks.
Comput. Networks, 2011

Can You Help Me Run These Code Segments on Your Mobile Device?
Proceedings of the Global Communications Conference, 2011

An expanding reference library for Peer-to-Peer content.
Proceedings of the 2011 eCrime Researchers Summit, 2011

2010
Prime-based mimic functions for the implementation of covert channels.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

SKWeak Attacks on Path Splicing: Vulnerability Assessment and Defense Mechanisms.
Proceedings of the Global Communications Conference, 2010

2009
Assessment of Vulnerability of Content Adaptation Mechanisms to RoQ Attacks.
Proceedings of the Eighth International Conference on Networks, 2009

HELP: // Hypertext In-Emergency Leveraging Protocol.
Proceedings of IEEE International Conference on Communications, 2009

BEXPLORER: Computer and Communication Control Using EEG.
Proceedings of the Human-Computer Interaction. Novel Interaction Methods and Techniques, 2009

On the Safety and Security of Path Splicing: A Case Study for Path Splicing on the GEANT Network.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Stealthy IP Prefix Hijacking: Don't Bite Off More Than You Can Chew.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Burn Before Reading: A stealthy framework for combating live forensics examinations.
Proceedings of the 2009 eCrime Researchers Summit, 2009

An SSVEP based BCI System for a Wheelchair Control.
Proceedings of the International Conference on Bioinformatics & Computational Biology, 2009

2008
Masquerading a Wired Covert Channel into a Wireless-like Channel.
Proceedings of the 2008 IEEE International Performance, 2008

Liberating TCP: The Free and the Stunts.
Proceedings of the Seventh International Conference on Networking (ICN 2008), 2008

2007
Adversarial exploits of end-systems adaptation dynamics.
J. Parallel Distributed Comput., 2007

Reduction of Quality (RoQ) Attacks on Dynamic Load Balancers: Vulnerability Assessment and Design Tradeoffs.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

2006
Exogenous-loss aware traffic management in overlay networks: Toward global fairness.
Comput. Networks, 2006

On the Impact of Low-Rate Attacks.
Proceedings of IEEE International Conference on Communications, 2006

2005
Friendly virtual machines: leveraging a feedback-control model for application adaptation.
Proceedings of the 1st International Conference on Virtual Execution Environments, 2005

Reduction of quality (RoQ) attacks on Internet end-systems.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

2004
Providing soft bandwidth guarantees using elastic TCP-based tunnels.
Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28, 2004

Exploiting the Transients of Adaptation for RoQ Attacks on Internet Resources.
Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP 2004), 2004


  Loading...