Search

Your search keyword '"Youssef, Amr"' showing total 898 results

Search Constraints

Start Over You searched for: Author "Youssef, Amr" Remove constraint Author: "Youssef, Amr"
898 results on '"Youssef, Amr"'

Search Results

1. Unmasking Covert Intrusions: Detection of Fault-Masking Cyberattacks on Differential Protection Systems

2. A Novel Approach to Classify Power Quality Signals Using Vision Transformers

3. A Verifiable Computing Scheme for Encrypted Control Systems

5. Enhancing Power Quality Event Classification with AI Transformer Models

6. Learning-Based Detection of Malicious Volt-VAr Control Parameters in Smart Inverters

7. Security Weaknesses in IoT Management Platforms

8. Measuring the Leakage and Exploitability of Authentication Secrets in Super-apps: The WeChat Case

10. An Observer-Based Key Agreement Scheme for Remotely Controlled Mobile Robots

11. Try On, Spied On?: Privacy Analysis of Virtual Try-On Websites and Android Apps

12. No Place to Hide: Privacy Exposure in Anti-stalkerware Apps and Support Websites

13. Blindfold: Keeping Private Keys in PKIs and CDNs out of Sight

14. Thermodynamic and cosmological parameters of early stages of the Universe

15. SAUSAGE: Security Analysis of Unix domain Socket Usage in Android

16. Dispute-free Scalable Open Vote Network using zk-SNARKs

17. LSTM-based approach to detect cyber attacks on market-based congestion management methods

20. Wyner wiretap-like encoding scheme for cyber-physical systems

21. On Securing Cloud-hosted Cyber-physical Systems Using Trusted Execution Environments

22. Impact of Electric Vehicles Botnets on the Power Grid

23. Dispute-Free Scalable Open Vote Network Using zk-SNARKs

24. No Salvation from Trackers: Privacy Analysis of Religious Websites and Mobile Apps

25. Silver Surfers on the Tech Wave: Privacy Analysis of Android Apps for the Elderly

27. Multiple-Association Supporting HTC/MTC in Limited-Backhaul Capacity Ultra-Dense Networks

29. On Privacy Risks of Public WiFi Captive Portals

30. Trustee: Full Privacy Preserving Vickrey Auction on top of Ethereum

35. The Sorry State of TLS Security in Enterprise Interception Appliances

36. Playing With Danger: A Taxonomy and Evaluation of Threats to Smart Toys

37. Correlation between ankle–brachial index, wall motion score index, and SYNTAX score in acute coronary syndrome patients

38. Authorship Attribution

39. Clone Detection

40. Free Open-Source Software Fingerprinting

41. Function Fingerprinting

42. Library Function Identification

43. Identifying Reused Functions in Binary Code

44. Compiler Provenance Attribution

45. Binary Analysis Overview

46. Introduction

47. Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE

50. On MILP-Based Automatic Search for Bit-Based Division Property for Ciphers with (Large) Linear Layers

Catalog

Books, media, physical & digital resources