119 results on '"Youssef, Amr"'
Search Results
2. A Privacy Preserving Solution for Cloud-Enabled Set-Theoretic Model Predictive Control
3. Got Sick and Tracked: Privacy Analysis of Hospital Websites
4. SAUSAGE: Security Analysis of Unix domain Socket usAGE in Android
5. Effect of Sneak Path Current in TiOx/HfOx Based 1S1R RRAM Crossbar Memory Array
6. Anomaly-Based Detection of Cyberattacks on Line Current Differential Relays.
7. On Securing Cloud-Hosted Cyber-Physical Systems Using Trusted Execution Environments
8. LSTM-based approach to detect cyber attacks on market-based congestion management methods
9. Lightweight Authentication and Key Agreement Protocol for Edge Computing Applications
10. Ergodic Secrecy Rate Analysis of Ultra-Dense Networks with Multiple Antennas
11. Covert Channels in Cyber-Physical Systems
12. A Key-Agreement Scheme for Cyber–Physical Systems.
13. Edge Computing and Multiple-Association in Ultra-Dense Networks: Performance Analysis.
14. A Hybrid NOMA/OMA Scheme for MTC in Ultra-Dense Networks
15. Secrecy Performance in Ultra-Dense Networks with Multiple Associations
16. Security Monitoring of IEC 61850 Substations Using IEC 62351-7 Network and System Management.
17. Decoy-based Moving Target defense Against Cyber-physical Attacks On Smart Grid
18. A Lightweight Authentication and Inter-Cloud Payment Protocol for Edge Computing
19. A DoS-resilient Set-Theoretic Controller for Smart Grid Applications
20. Set-Theoretic Control for Active Detection of Replay Attacks with Applications to Smart Grid
21. Cyber Security of Market-Based Congestion Management Methods in Power Distribution Systems.
22. Efficient Inter-Cloud Authentication and Micropayment Protocol for IoT Edge Computing.
23. Parental Controls: Safer Internet Solutions or New Pitfalls?
24. A Learning-Based Framework for Detecting Cyber-Attacks Against Line Current Differential Relays.
25. Threat Intelligence Generation Using Network Telescope Data for Industrial Control Systems.
26. Multiple-Association Supporting HTC/MTC in Limited-Backhaul Capacity Ultra-Dense Networks.
27. Detection of False Data Injection Attacks on Wide-Area Under-Frequency Load Shedding Protection Schemes
28. Impact of Electric Vehicles Botnets on the Power Grid
29. Security Monitoring of IEC 61850 Substations Using IEC 62351-7 Network and System Management1
30. Cyber Attacks On Distributed Congestion Management Methods
31. Capacity Analysis of Downlink NOMA-Based Coexistent HTC/MTC in UDN
32. Uplink Coverage of Machine-Type Communications in Ultra-Dense Networks
33. An Intrusion Detection Method for Line Current Differential Relays.
34. NOMA-Assisted Machine-Type Communications in UDN: State-of-the-Art and Challenges.
35. Uplink Coverage and Capacity Analysis of mMTC in Ultra-Dense Networks.
36. A Particle Filter-Based Approach for the Detection of False Data Injection Attacks on Automatic Generation Control Systems
37. OpenStack-Based Evaluation Framework for Smart Grid Cyber Security
38. Detection of false data injection attacks in smart grids using Recurrent Neural Networks
39. A power analysis resistant FPGA implementation of NTRUEncrypt
40. Fault analysis-resistant implementation of Rainbow Signature scheme
41. Coverage and Capacity Analysis with Stretched Exponential Path Loss in Ultra-Dense Networks
42. Detection of false data injection in automatic generation control systems using Kalman filter
43. Downlink coverage and average cell load of M2M and H2H in ultra-dense networks
44. Lelantos: A Blockchain-Based Anonymous Physical Delivery System
45. Average downlink rate in Ultra-Dense Networks
46. Determination of the optimum size, material and position for dielectric barrier with presence of cone particle contamination in rod-plane gap
47. Joint Detection and Mitigation of False Data Injection Attacks in AGC Systems.
48. Multiple association in ultra-dense networks
49. Detection techniques for data-level spoofing in GPS-based phasor measurement units
50. Attack Detection and Identification for Automatic Generation Control Systems.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.