Mohamed Eltoweissy

According to our database1, Mohamed Eltoweissy authored at least 120 papers between 1991 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Trustworthy Vehicular CommunicationEmploying Multidimensional Diversificationfor Moving-target Defense.
J. Cyber Secur. Mobil., 2019

Reliable Collaborative Semi-infrastructure Vehicle-to-Vehicle Communication for Local File Sharing.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2019

2018
Personalised reconfigurable trust management.
Int. J. Trust. Manag. Comput. Commun., 2018

Biologically Inspired Safety and Security for Smart Built Environments: Position Paper.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

Diversity-Based Moving-Target Defense for Secure Wireless Vehicular Communications.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

Reconfigurable Spaces and Places in Smart Built Environments: A Service Centric Approach.
Proceedings of the HCI International 2018 - Posters' Extended Abstracts, 2018

2017
Big data and semantics management system for computer networks.
Ad Hoc Networks, 2017

On the Personalization of Trust Management.
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017

Towards Online Smart Disguise: Real-Time Diversification Evading Co-Residency Based Cloud Attacks.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017

Towards Collaborative Trust Management.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017

2016
MIGRATE: Towards a Lightweight Moving-Target Defense Against Cloud Side-Channels.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016

Toward Smart Moving Target Defense for Linux Container Resiliency.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016

PETRA: Personalized Trust Management Architecture (Application Paper).
Proceedings of the 17th IEEE International Conference on Information Reuse and Integration, 2016

Smart Moving Target Defense for Linux Container Resiliency.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

2015
Cyberdefense When Attackers Mimic Legitimate Users: A Bayesian Approach.
Proceedings of the 2015 IEEE International Conference on Information Reuse and Integration, 2015

2014
Bio-inspired Evolutionary Sensory System for Cyber-Physical System Security.
Proceedings of the Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations, 2014

Towards a Mobile Ad-Hoc Cloud Management Platform.
Proceedings of the 7th IEEE/ACM International Conference on Utility and Cloud Computing, 2014

Towards a Data Semantics Management System for Internet Traffic.
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014

Semantics management for big networks.
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014

CyPhyMASC: Evolutionary monitoring, analysis, sharing and control platform for SmartGrid defense.
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014

Hybrid Intelligence for Semantics-Enhanced Networking Operations.
Proceedings of the Twenty-Seventh International Florida Artificial Intelligence Research Society Conference, 2014

Resilient hybrid Mobile Ad-hoc Cloud over collaborating heterogeneous nodes.
Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, 2014

2013
ChameleonSoft: Software Behavior Encryption for Moving Target Defense.
Mob. Networks Appl., 2013

MobiCloud: A reliable collaborative mobilecloud management system.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

2012
CORM: A reference model for future computer networks.
J. Netw. Comput. Appl., 2012

Biologically-inspired network "memory" for smarter networking.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012

CyberX: A biologically-inspired platform for cyber trust management.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012

2011
Adaptive Fault-Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks.
IEEE Trans. Dependable Secur. Comput., 2011

Towards autonomous vehicular clouds.
EAI Endorsed Trans. Mob. Commun. Appl., 2011

Associative routing for wireless sensor networks.
Comput. Commun., 2011

Distributed dynamic context-aware task-based configuration of wireless sensor networks.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011

Towards Aware, Adaptive and Autonomic Sensor-Actuator Networks.
Proceedings of the 5th IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2011

BioRAC: biologically inspired resilient autonomic cloud.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

Towards a cooperative autonomous resilient defense platform for cyber-physical systems.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

Towards a personalized trust architecture.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011

Memory-enabled autonomic resilient networking.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011

ChameleonSoft: A moving target defense system.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011

Defense as a service cloud for Cyber-Physical Systems.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011

2010
Adaptation of Reputation Management Systems to Dynamic Network Conditions in Ad Hoc Networks.
IEEE Trans. Computers, 2010

Mission critical networking [Guest editorial].
IEEE J. Sel. Areas Commun., 2010

Agents in Service-Oriented Wireless Sensor Networks.
Int. J. Wirel. Mob. Comput., 2010

Formal analysis and design for engineering security automated derivation of formal software security specifications from goal-oriented security requirements.
IET Softw., 2010

Adaptive Multi-Criteria Routing for Shared Sensor-Actuator Networks.
Proceedings of the Global Communications Conference, 2010

Towards safe and productive development of secure software: FADES and model-based software engineering.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

Towards trustworthy shared networked sensor-actuator systems.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

Towards Autonomous Vehicular Clouds - A Position Paper (Invited Paper).
Proceedings of the Ad Hoc Networks - Second International Conference, 2010

2009
µRACER: A Reliable Adaptive Service-Driven Efficient Routing Protocol Suite for Sensor-Actuator Networks.
IEEE Trans. Parallel Distributed Syst., 2009

Location-Aware Affinity Propagation Clustering in Wireless Sensor Networks.
Proceedings of the 5th IEEE International Conference on Wireless and Mobile Computing, 2009

Signalprint-Based Intrusion Detection in Wireless Networks.
Proceedings of the Security in Emerging Wireless Communication and Networking Systems, 2009

CellNet: A Bottom-Up Approach to Network Design.
Proceedings of the NTMS 2009, 2009

Hidden Anchor: Providing Physical Layer Location Privacy in Hybrid Wireless Sensor Networks.
Proceedings of the NTMS 2009, 2009

CARP: A context-aware routing protocol for delay-constrained traffic in sensor networks.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

IMAPS: Imbricated authentication protocol suite for mobile users and groups.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

Dynamic adaptive redundancy for quality-of-service control in wireless sensor networks.
Proceedings of the 23rd IEEE International Symposium on Parallel and Distributed Processing, 2009

Goal-Oriented Software Security Engineering: The Electronic Smart Card Case Study.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
On optimal batch rekeying for secure group communications in wireless networks.
Wirel. Networks, 2008

Threat-Aware Clustering in Wireless Sensor Networks.
Proceedings of the Wireless Sensor and Actor Networks II, 2008

Towards a Framework for Evolvable Network Design.
Proceedings of the Collaborative Computing: Networking, 2008

Goal-Oriented, B-Based Formal Derivation of Security Design Specifications from Security Requirements.
Proceedings of the The Third International Conference on Availability, 2008

2007
ANSWER: AutoNomouS netWorked sEnsoR system.
J. Parallel Distributed Comput., 2007

P3ARM-t: Privacy-Preserving Protocol for Association Rule Mining with t Collusion Resistance.
J. Comput., 2007

A Fault Tolerance Management Framework for Wireless Sensor Networks.
J. Commun., 2007

Model-Based Evolution of Collaborative Agent-Based Systems.
J. Braz. Comput. Soc., 2007

Security in Mobile IPv6: A survey.
Inf. Secur. Tech. Rep., 2007

Service-oriented sensor-actuator networks: Promises, challenges, and the road ahead.
Comput. Commun., 2007

Key management for long-lived sensor networks in hostile environments.
Comput. Commun., 2007

Service-Oriented Sensor-Actuator Networks [Ad Hoc and Sensor Networks].
IEEE Commun. Mag., 2007

Agile Sensor Network Systems.
Ad Hoc Sens. Wirel. Networks, 2007

Group Authentication Protocol for Mobile Networks.
Proceedings of the Third IEEE International Conference on Wireless and Mobile Computing, 2007

TARP: A Trust-Aware Routing Protocol for Sensor-Actuator Networks.
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007

Two-level signature delegation for mobile first responder authentication.
Proceedings of the 3rd International Conference on Collaborative Computing: Networking, 2007

2006
Dynamic combinatorial key management scheme for sensor networks.
Wirel. Commun. Mob. Comput., 2006

Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2006

Safe Quality of Service Aware Management of Heterogeneous Sensor Networks.
J. Interconnect. Networks, 2006

A novel collusion-resilient architecture for secure group communication in wireless ad-hoc networks.
J. High Speed Networks, 2006

Dependable Wireless Sensor Networks.
Comput. Commun., 2006

Dynamic key management in sensor networks.
IEEE Commun. Mag., 2006

Safe base-station repositioning in wireless sensor networks.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006

Data replication in collaborative sensor network systems.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006

Defense against Routing Disruption Attacks in Mobile Ad Hoc Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2005
Biomimetic Models for Wireless Sensor Networks.
Proceedings of the Handbook of Bioinspired Algorithms and Applications., 2005

Training a Wireless Sensor Network.
Mob. Networks Appl., 2005

A service-centric model for wireless sensor networks.
IEEE J. Sel. Areas Commun., 2005

Software visualization.
Innov. Syst. Softw. Eng., 2005

Protecting the Communication Structure in Sensor Networks.
Int. J. Distributed Sens. Networks, 2005

Group key management scheme for large-scale sensor networks.
Ad Hoc Networks, 2005

A study of static versus dynamic keying schemes in sensor networks.
Proceedings of the 2nd ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, 2005

ANSWER: autonomous wireless sensor network.
Proceedings of the Q2SWinet'05, 2005

Authentication protocols for ad hoc networks: taxonomy and research issues.
Proceedings of the Q2SWinet'05, 2005

A Reputation-based Mechanism for Isolating Selfish Nodes in Ad Hoc Networks.
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005

Safety and QoS-Aware Management of Heterogeneous Sensor Networks.
Proceedings of the 8th International Symposium on Parallel Architectures, 2005

Key management in wireless ad hoc networks: collusion analysis and prevention.
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005

SECK: survivable and efficient clustered keying for wireless sensor networks.
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005

A CSP-Based Agent Modeling Framework for the Cougaar Agent-Based Architecture.
Proceedings of the 12th IEEE International Conference on the Engineering of Computer-Based Systems (ECBS 2005), 2005

A Scalable Solution for Securing Wireless Sensor Networks.
Proceedings of the Handbook on Theoretical and Algorithmic Aspects of Sensor, 2005

2004
Wireless sensor networks: leveraging the virtual infrastructure.
IEEE Netw., 2004

SemWebDL: A privacy-preserving Semantic Web infrastructure for digital libraries.
Int. J. Digit. Libr., 2004

Combinatorial Optimization of Group Key Management.
J. Netw. Syst. Manag., 2004

On Modeling Wireless Sensor Networks.
Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS 2004), 2004

CKDS: an efficient combinatorial key distribution scheme for wireless ad-hoc networks.
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004

Lightweight key management for wireless sensor networks.
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004

Providing Holistic Security in Sensor Networks.
Proceedings of the Broadband Satellite Comunication Systems and the Challenges of Mobility, 2004

On Providing Anonymity in Wireless Sensor Networks.
Proceedings of the 10th International Conference on Parallel and Distributed Systems, 2004

Efficient Secure Multicast with Well-Populated Multicast Key Trees.
Proceedings of the 10th International Conference on Parallel and Distributed Systems, 2004

Scalable Cryptographic Key Management in Wireless Sensor Networks.
Proceedings of the 24th International Conference on Distributed Computing Systems Workshops (ICDCS 2004 Workshops), 2004

TKGS: Verifiable Threshold-Based Key Generation Scheme in Open Wireless Ad Hoc Networks.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 2004), 2004

On Handling QoS Traffic in Wireless Sensor Networks.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

Towards Trusted Online Dissemination of Consumer Information.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

2003
Privacy on the Web: Facts, Challenges, and Solutions.
IEEE Secur. Priv., 2003

Towards a new paradigm for securing wireless sensor networks.
Proceedings of the New Security Paradigms Workshop 2003, 2003

Combinatorial Optimization of Multicast Key Management.
Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-36 2003), 2003

2002
Multi-level Secure Multicast: The Rethinking of Secure Locks.
Proceedings of the 31st International Conference on Parallel Processing Workshops (ICPP 2002 Workshops), 2002

Message from the Co-Chairs.
Proceedings of the 31st International Conference on Parallel Processing Workshops (ICPP 2002 Workshops), 2002

2000
On Performance Metrics for IP Multicast Routing.
Proceedings of the 5th International Symposium on Parallel Architectures, 2000

1998
A Scalable QoS Routing Architecture for Real-Time CSCW Applications.
Proceedings of the Fourth IEEE Real-Time Technology and Applications Symposium, 1998

1997
Poster on Electronic Circulation of Copyrighted Information in CSCW Environments.
Proceedings of the Second IFCIS International Conference on Cooperative Information Systems, 1997

1993
BUS: A Multicasting Protocol for Interconnected LANs.
Proceedings of the Computing and Information, 1993

Performance Analysis of Time-Stamp Ordering Algorithms in Database Systems: The Pure Restarts Case.
Proceedings of the Computing and Information, 1993

1991
A Distributed Scheduling Algorithm for Heterogeneous Real-Time Systems.
Proceedings of the Advances in Computing and Information, 1991

The Mean Value Approach to Performance Evaluation of Time-Stamp Ordering Algorithms.
Proceedings of the Advances in Computing and Information, 1991


  Loading...