麻豆果冻传媒

Close

Cybersecurity Education, Research & Outreach Center

2021 Publications

  • Sherif Abdelfattah, Mohammad Baza, M. Mahmoud, and Waleed Alasmary, "CSES: Customized searchable encryption scheme with efficient key management over medical cloud data," Internation Symposium on Networks, Computers and Communications (ISNCC, June 2021) 
  • Seham Alansari, Mahmoud Badr, M.Mahmoud, and Waleed Alasmary," Efficient and privacy preserving contact tracing system for COVID-19 using blockchain," IEEE ICC 2021 Workshop on Wireless Networking Innovations for Mobile Edge Learning
  • Seham Alansari, Mahmoud Badr, M. Mahmoud, and Waleed Alasmary, "Efficient and privacy preserving contact tracing system for COVID-19 using blockchain," IEEE ICC 2021 Workshop on Wireless Networking Innovations for Mobile Edge Learning 
  • Muneera Alotaibi, Mohamed Ibrahem, Waleed Alasmary, Dawood Al-Abri, and M. Mahmoud, "UBLS: User-based location selection scheme for preserving location privacy, " IEEE ICC 2021 Workshop on Wireless Networking Innovations for Mobile Edge Learning 
  • Mahmoud Badr, Mohammad Baza, Sherif Abdelfattah, M. Mahmoud and Waleed Alasmary, "Blockchain-based ridesharing scheme with accurate matching and privacy preservation," International Symposium on Networks, Computers and Communications (ISNCC, June 2021) 
  • M. Badr, M. Ibraheem, M.Baza, M. Mahmoud, and W. Alasmary, "Detecting electricity fraud in the net-metering system using deep learning," International Symposium on Networks, Computers and Communications (ISNCC, June 2021) 
  • F.A. Bhuiyan, A. Rahman, P. Morrison, "Practitioner perception of vulnerability discovery strategies", to appear in the 2nd International Workshop on Engineering and  Cybersecurity of Critical System (EnCyCris 2021), co-located with the 43rd International Conference on Software Engineering (ICSE 2021),  June 3-4, 2021  
  • F. A. Bhuiyan, M.B.Sharif, A.Rahman, "Security bug report usage for software vulnerability research: a systematic mapping study", to appear in the Journal of IEEE Access, 2021 
  • D.B. Bose, A. Rahman, and S.I. Shamim," 'Under-reported' security defects in Kubernetes manifests", to appear in the 2nd International Workshop on Engineering and Cybersecurity of Critical System (EnCyCris 2021), co-located with the 43rd International Conference on Software Engineering (ICSE 2021),  June 3-4, 2021  
  • Deepti Gupta, Smriti Bhatt, Paras Bhaat, Maanak Gupta and Ali Saman Tosun. "Game Theory Based privacy Preserving Approach for Collaborative Deep Learning in IOT" Accepted in Deep learning for security and privacy preservation in IoT, Springer 
  • M. Ibrahem, M. Badr,  M. Mahmoud, M. Fouda, and W. Alasmary, "Counting presence privacy attack in efficient AMI Networks using interactive deep-learning," International Symposium on Networks , Computers and Communications (ISNCC, June 2021) 
  • T.A. Odetola, S.R. Hasan, "SoWaF: Shuffling of Weights and Feature Maps: A Novel Hardware Intrinsic Attack (HIA) on Convolutional Neural Network (CNN)", accepted in IEEE International Symposium on Circuits and Systems, ISCAS' 2021
  • A. Rahman and E. Farhana, "An empirical study of bugs in covid-19 software projects", to appear in the Journal of Software Engineering Research and Development (JSRED), 2021
  • Ahmed Shafee, Mahmoud Nabil, M. Mahmoud, Waleed Alasmary, and Fathi Amsaad, "Detection of denial of charge (DoC) attacks in smart grid using convolutional neural networks," International Symposium on Networks, Computers and Communications (ISNCC, June 2021) 
  • Sai Sree Laya Chukkapalli, Shaik Aziz, Nouran Alotaibi, Sudip Mittal, Maanak Gupta, and Mahmoud Abdelsalam. "Onotology driven AI and Access Control Systems for Smart Fisheries." Accepted in ACM SaTC-CPS Workshop 2021
  • D. Ulybyshev, I. Yilmaz, B. Northern, V. Kholodilo, M. Rogers, Trustworthy data Analysis and sensor data protection in cyber-physical systems, to appear in the ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (SaT-CPS 2021),  Apr 28, 2021
  • I.Yilmaz, K. Kapoor, A.Siraj, M. Abouyoussef, Privacy protection of grid users data with block chain and adversarial machine learning, to appear in the ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (SaT-CPS 2021), Apr 28, 2021 
  • I.Yilmaz and A.Siraj, "A privacy-preserving energy consumption scheme for smart meters with adversarial machine learning, to appear in the Journal of IEEE Access, 2021.
  • M.Alsabaan, W.Alasmary, A.Alquniah, M.Mahmoud, and M.Nabil,"A distributed surveillance system with full coverage guarantee using positive orthogonal codes," IEEE Access, 2021
  • M.Baza, M.Pazos-Revilla, M.Nabil,  A.Sherif, M.Mahmoud, W.Alasmary, "Privacy-preserving and collusion-resistant charging coordination schemes for smart grids," IEEE Transactions on Dependable and Secure Computing, 2021
  • M.Baza, R.Amer, A.Rasheed, G.Srivastava, M.Mahmoud, W.Alasmary, "A blockchain-based energy trading scheme for the electric vehicles," in 3rd International Workshop on Security Trust and Privacy for Emerging Cyber Physical Systems (STP-CPS?21), Las Vegas, USA, 2021
  • A.Rahman, M.R.Rahman, C.Parnin, L.Williams, "Security smells in Ansible and Chef scripts: a replication study", ACM Transactions on Software Engineering and Methodology (TOSEM), 30(1): 1-31, 2021 
  • W. A.Johnson, S.Ghafoor, S.Prowell, "Companion assisted software based remote attestation in scada networks," presented at 16th International Conference on Cyber Warfare and Security, TN, USA, Feb 25-26, 2021 
  • J.Lopez, J.Asiamah, R Borges-Hink, S.Sintowski, "Resilience analysis of real-time automation controllers (rtac) under cyber stress, " presented at 16th International Conference on Cyber Warfare and Security, TN, USA, Feb 25-26, 2021 
  • D.Ulybyshev, I.Yilmaz, B.Northern, V.Kholodilo, M.Rogers, "Trustworthy data Analysis and sensor data protection in cyber-physical systems," to appear in the ACM Workshop on Secure and Trustworthy Cyber-Physical Systems (SaT-CPS 2021), Apr 28, 2021
  • F.A.Bhuiyan, M.B.Sharif, A.Rahman, "Security bug report usage for software vulnerability research: a systematic mapping study," to appear in the Journal of IEEE Access, 2021 
  • I.Yilmaz and A.Siraj, "A privacy-preserving energy consumption scheme for smart meters with adversarial machine learning", to appear in the Journal of IEEE Access, 2021 
  • A. Rahman and E. Farhana, "An empirical study of bugs in covid-19 software projects", to appear in the Journal of Software Engineering Research and Development (JSERD), 2021 
  • F.A.Bhuiyan, A.Rahman, P. Morrison, "Practitioner perception of vulnerability discover strategies", to appear in the 2nd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS 2021), co-located with the 43rd International Conference on Software Engineering (ICSE 2021),  June 3-4, 2021
  • D.B. Bose, A.Rahman, and S.I. Shamim, "Under-reported' security defects in kubernetes manifests", to appear in the 2nd International Workshop on Engineering and CyberSecurity of Critical Systems (EnCyCriS 2021), co-located with the 43rd International Conference on Software Engineering (ICSE 2021), June 3-4, 2021

Experience Tech For Yourself

Visit us to see what sets us apart.

Schedule Your Visit