Follow
Abdelrahman Eldosouky
Title
Cited by
Cited by
Year
Drones in distress: A game-theoretic countermeasure for protecting uavs against gps spoofing
AR Eldosouky, A Ferdowsi, W Saad
IEEE Internet of Things Journal 7 (4), 2840-2854, 2019
1092019
Resilient critical infrastructure: Bayesian network analysis and contract-based optimization
AR Eldosouky, W Saad, N Mandayam
Reliability Engineering & System Safety 205, 107243, 2021
492021
Game theory and machine learning for cyber security
CA Kamhoua, CD Kiekintveld, F Fang, Q Zhu
John Wiley & Sons, 2021
292021
On the cybersecurity of m-Health IoT systems with LED bitslice implementation
AR Eldosouky, W Saad
2018 IEEE International Conference on Consumer Electronics (ICCE), 1-6, 2018
242018
Environment-aware deployment of wireless drones base stations with google earth simulator
A French, M Mozaffari, A Eldosouky, W Saad
2019 IEEE international conference on pervasive computing and communications …, 2019
232019
Single controller stochastic games for optimized moving target defense
AR Eldosouky, W Saad, D Niyato
2016 IEEE International Conference on Communications (ICC), 1-6, 2016
222016
Blockchain-based privacy preserving and energy saving mechanism for electricity prosumers
HA Abdelsalam, AK Srivastava, A Eldosouky
IEEE Transactions on Sustainable Energy 13 (1), 302-314, 2021
192021
Interdependence-aware game-theoretic framework for secure intelligent transportation systems
A Ferdowsi, A Eldosouky, W Saad
IEEE Internet of Things Journal 8 (22), 16395-16405, 2020
162020
Contract-theoretic resource allocation for critical infrastructure protection
AR Eldosouky, W Saad, C Kamhoua, K Kwiat
2015 IEEE Global Communications Conference (GLOBECOM), 1-6, 2015
132015
Enhancing distribution system resiliency with microgrids formation using weighted average consensus
HA Abdelsalam, A Eldosouky, AK Srivastava
International Journal of Electrical Power & Energy Systems 141, 108161, 2022
102022
Think smart, play dumb: Analyzing deception in hardware trojan detection using game theory
T Das, AR Eldosouky, S Sengupta
2020 International Conference on Cyber Security and Protection of Digital …, 2020
62020
Every anonymization begins with k: A game-theoretic approach for optimized k selection in k-anonymization
A Kotra, AR Eldosouky, S Sengupta
2020 International Conference on Advances in Computing and Communication …, 2020
42020
A cyber-layer based on weighted average consensus in blockchain environment for accurate sharing of power systems’ dynamic states
HA Abdelsalam, A Eldosouky, AE ElGebaly, M Khalaf, AAZ Diab, ...
International Journal of Electrical Power & Energy Systems 155, 109558, 2024
32024
Performance Measurement of IoT Traffic Through SRv6 Network Programming
SK Kuri, A Eldosouky, M Ibnkahla
2022 IEEE International Conference on Communications Workshops (ICC …, 2022
32022
Security of Critical Cyber-Physical Systems: Fundamentals and Optimization
A Salama, EM Abdelrahman
Virginia Tech, 2019
32019
Moving Target defense games for cyber security: theory and applications
AR Eldosouky, S Sengupta
Game Theory and Machine Learning for Cyber Security, 160-179, 2021
22021
Security of Critical Cyber-Physical Systems: Fundamentals and Optimization
AR Eldosouky
Virginia Tech, 2019
22019
Open source horizontal iot platforms: A comparative study on functional requirements
A Farhat, A Eldosouky, J Jaskolka, M Ibnkahla, A Matrawy
arXiv preprint arXiv:2209.06384, 2022
12022
IoT Trust Establishment Through System Level Interactions and Communication Attributes
A Farhat, A Eldosouky, M Ibnkahla, A Matrawy
GLOBECOM 2023-2023 IEEE Global Communications Conference, 5919-5924, 2023
2023
Integrating Medical and Wearable Devices with E-Health Systems Using Horizontal IoT Platforms
MA Issa, A Eldosouky, M Ibnkahla, J Jaskolka, A Matrawy
2023 IEEE Sensors Applications Symposium (SAS), 1-6, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20