Follow
Ahmed Fawaz
Title
Cited by
Cited by
Year
A multi-sensor energy theft detection framework for advanced metering infrastructures
S McLaughlin, B Holbert, A Fawaz, R Berthier, S Zonouz
IEEE journal on selected areas in communications 31 (7), 1319-1330, 2013
3142013
An unsupervised multi-detector approach for identifying malicious lateral movement
A Bohara, MA Noureddine, A Fawaz, WH Sanders
2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS), 224-233, 2017
652017
Lateral Movement Detection Using Distributed Data Fusion.
WHS A. Fawaz, A. Bohara, C. Cheh
Proceedings of the 35th Symposium on Reliable Distributed Systems (SRDS), 2016
42*2016
A game-theoretic approach to respond to attacker lateral movement
MA Noureddine, A Fawaz, WH Sanders, T Başar
Decision and Game Theory for Security: 7th International Conference, GameSec …, 2016
392016
Data-driven model-based detection of malicious insiders via physical access logs
C Cheh, U Thakore, A Fawaz, B Chen, WG Temple, WH Sanders
ACM Transactions on Modeling and Computer Simulation (TOMACS) 29 (4), 1-25, 2019
182019
An on-demand mobile advertising system that protects source privacy using interest aggregation
A Fawaz, A Hojaij, H Kobeissi, H Artail
2011 IEEE 7th International Conference on Wireless and Mobile Computing …, 2011
142011
Cost modeling of response actions for automated response and recovery in AMI
A Fawaz, R Berthier, WH Sanders
2012 IEEE Third International Conference on Smart Grid Communications …, 2012
132012
Learning process behavioral baselines for anomaly detection
AM Fawaz, WH Sanders
2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing …, 2017
102017
A response cost model for advanced metering infrastructures
A Fawaz, R Berthier, WH Sanders
IEEE Transactions on smart grid 7 (2), 543-553, 2015
102015
Determining tolerable attack surfaces that preserves safety of cyber-physical systems
C Cheh, A Fawaz, MA Noureddine, B Chen, WG Temple, WH Sanders
2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing …, 2018
92018
Revisiting client puzzles for state exhaustion attacks resilience
MA Noureddine, AM Fawaz, A Hsu, C Guldner, S Vijay, T Başar, ...
2019 49th Annual IEEE/IFIP International Conference on Dependable Systems …, 2019
72019
Modeling humans: A general agent model for the evaluation of security
M Rausch, A Fawaz, K Keefe, WH Sanders
Quantitative Evaluation of Systems: 15th International Conference, QEST 2018 …, 2018
62018
Enhanced cooperative collision avoidance in sudden vehicle braking scenarios
A Fawaz, H Artail
2010 17th International Conference on Telecommunications, 806-813, 2010
62010
Using cooperation among peers and interest mixing to protect privacy in targeted mobile advertisement
A Fawaz, A Hojaij, H Kobeissi, H Artail
2011 11th International Conference on ITS Telecommunications, 474-479, 2011
52011
Peer-to-peer detection of DoS attacks on city-scale IoT mesh networks
MJ Rausch, VB Krishna, P Gu, R Chandra, B Feddersen, A Fawaz, ...
2018 IEEE International Conference on Communications, Control, and Computing …, 2018
42018
Poweralert: integrity checking using power measurement and a game-theoretic strategy
AM Fawaz, MA Noureddine, WH Sanders
2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018
22018
Increased urinary albumin excretion: definition, prevalence, clinical significance and therapeutic implications.
AE Birbari, N Daouk, A Fawaz
Le Journal Medical libanais. The Lebanese Medical Journal 54 (3), 172-178, 2006
22006
Detecting monitor compromise using evidential reasoning: poster
U Thakore, A Fawaz, WH Sanders
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the …, 2018
12018
PowerAlert: An integrity checker using power measurement
AM Fawaz, M Noureddine, WH Sanders
arXiv preprint arXiv:1702.02907, 2017
12017
Understanding the role of automated response actions in improving ami resiliency
A Fawaz, R Berthier, WH Sanders, P Pal
Proceedings of the NIST Cybersecurity for Cyber-Physical Systems Workshop, 23-24, 2012
12012
The system can't perform the operation now. Try again later.
Articles 1–20