Amr Youssef
Amr Youssef
Verifisert e-postadresse på ciise.concordia.ca
Sitert av
Sitert av
Ultra-Dense Networks: A Survey
M Kamel, W Hamouda, A Youssef
IEEE Communications Surveys & Tutorials, 2016
Security, Privacy, and Safety Aspects of Civilian Drones: A Survey
R Altawy, AM Youssef
ACM Transactions on Cyber-Physical Systems 1 (2), 2017
On the analysis of the zeus botnet crimeware toolkit
H Binsalleeh, T Ormerod, A Boukhtouta, P Sinha, A Youssef, M Debbabi, ...
2010 eighth international conference on privacy, security and trust, 31-38, 2010
Power quality disturbance classification using the inductive inference approach
TK Abdel-Galil, M Kamel, AM Youssef, EF El-Saadany, MMA Salama
IEEE Transactions on Power Delivery 19 (4), 1812-1818, 2004
Security Trade-offs in Cyber Physical Systems: A Case Study Survey on Implantable Medical Devices
R AlTawy, A Youssef
IEEE, 2016
Attack detection and identification for automatic generation control systems
A Ameli, A Hooshyar, EF El-Saadany, AM Youssef
IEEE Transactions on Power Systems 33 (5), 4760-4774, 2018
Disturbance classification utilizing dynamic time warping classifier
AM Youssef, TK Abdel-Galil, EF El-Saadany, MMA Salama
IEEE Transactions on Power Delivery 19 (1), 272-278, 2004
Verifiable Sealed-Bid Auction on the Ethereum Blockchain
HS Galal, AM Youssef
International Conference on Financial Cryptography and Data Security …, 2018
Hyper-bent functions
AM Youssef, G Gong
Advances in Cryptology—EUROCRYPT 2001: International Conference on the …, 2001
A water-filling based scheduling algorithm for the smart grid
M Shinwari, A Youssef, W Hamouda
IEEE Transactions on Smart Grid 3 (2), 710-719, 2012
On the design of linear transformations for substitution permutation encryption networks
AM Youssef, S Mister, SE Tavares
Workshop on Selected Areas of Cryptography (SAC’96): Workshop Record 1997, 40-48, 1997
MILP modeling for (large) s-boxes to optimize probability of differential characteristics
A Abdelkhalek, Y Sasaki, Y Todo, M Tolba, AM Youssef
IACR Transactions on Symmetric Cryptology, 99-129, 2017
Joint detection and mitigation of false data injection attacks in AGC systems
M Khalaf, A Youssef, E El-Saadany
IEEE Transactions on Smart Grid 10 (5), 4985-4995, 2018
Cryptographic properties of the Welch-Gong transformation sequence generators
G Gong, AM Youssef
IEEE Transactions on Information Theory 48 (11), 2837-2846, 2002
Detection of false data injection attacks in smart grids using recurrent neural networks
A Ayad, HEZ Farag, A Youssef, EF El-Saadany
2018 IEEE power & energy society innovative smart grid technologies …, 2018
NOMA-assisted machine-type communications in UDN: State-of-the-art and challenges
M Elbayoumi, M Kamel, W Hamouda, A Youssef
IEEE Communications Surveys & Tutorials 22 (2), 1276-1304, 2020
Disturbance classification using hidden Markov models and vector quantization
TK Abdel-Galil, EF El-Saadany, AM Youssef, MMA Salama
IEEE transactions on power delivery 20 (3), 2129-2135, 2005
Mining criminal networks from unstructured text documents
R Al-Zaidy, BCM Fung, AM Youssef, F Fortin
Digital Investigation 8 (3-4), 147-160, 2012
Performance analysis of multiple association in ultra-dense networks
M Kamel, W Hamouda, A Youssef
IEEE Transactions on Communications 65 (9), 3818-3831, 2017
Binsequence: Fast, accurate and scalable binary code reuse detection
H Huang, AM Youssef, M Debbabi
Proceedings of the 2017 ACM on Asia conference on computer and …, 2017
Systemet kan ikke utføre handlingen. Prøv på nytt senere.
Artikler 1–20