Ahmed H. Anwar
Orcid: 0000-0001-8907-3043Affiliations:
- DEVCOM Army Research Laboratory, Adelphi, MD, USA
According to our database1,
Ahmed H. Anwar
authored at least 47 papers
between 2014 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Cyber Deception Against Battery Drain DoS Attacks in Wireless Sensor Networks Using Signaling Game.
IEEE Access, 2025
2024
GaTeBaSep: game theory-based security protocol against ARP spoofing attacks in software-defined networks.
Int. J. Inf. Sec., February, 2024
CoRR, 2024
Countering ARP spoofing attacks in software-defined networks using a game-theoretic approach.
Comput. Secur., 2024
Optimal Honeypot Allocation Using Core Attack Graph in Partially Observable Stochastic Games.
IEEE Access, 2024
An Unsupervised Graph Neural Network Approach to Deceive UAV Network Reconnaissance Attack.
Proceedings of the IEEE INFOCOM 2024, 2024
Game-Theoretic Defense Strategies for Mitigating Gray Hole Attacks on Energy-Limited Sensors in Wireless Sensor Networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2024
Proceedings of the International Conference on Computing, Networking and Communications, 2024
Proceedings of the International Conference on Computing, Networking and Communications, 2024
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024
2023
Resisting Multiple Advanced Persistent Threats via Hypergame-Theoretic Defensive Deception.
IEEE Trans. Netw. Serv. Manag., September, 2023
Proceedings of the 34th IEEE Annual International Symposium on Personal, 2023
Proceedings of the Twenty-fourth International Symposium on Theory, 2023
Proceedings of the IEEE International Conference on Communications, 2023
Optimizing Honeypot Placement Strategies with Graph Neural Networks for Enhanced Resilience via Cyber Deception.
Proceedings of the 2nd on Graph Neural Networking Workshop 2023, 2023
Honeypot Allocation for Cyber Deception in Dynamic Tactical Networks: A Game Theoretic Approach.
Proceedings of the Decision and Game Theory for Security: 14th International Conference, 2023
Proceedings of the Decision and Game Theory for Security: 14th International Conference, 2023
2022
Foureye: Defensive Deception Against Advanced Persistent Threats via Hypergame Theory.
IEEE Trans. Netw. Serv. Manag., 2022
IEEE Trans. Netw. Serv. Manag., 2022
Honeypot-Based Cyber Deception Against Malicious Reconnaissance via Hypergame Theory.
Proceedings of the IEEE Global Communications Conference, 2022
Proceedings of the Decision and Game Theory for Security - 13th International Conference, 2022
Proceedings of the Decision and Game Theory for Security - 13th International Conference, 2022
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022
2021
IEEE Trans. Cloud Comput., 2021
Game-Theoretic and Machine Learning-based Approaches for Defensive Deception: A Survey.
CoRR, 2021
Foureye: Defensive Deception based on Hypergame Theory Against Advanced Persistent Threats.
CoRR, 2021
IEEE Commun. Surv. Tutorials, 2021
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021
Proceedings of the 2021 IEEE Military Communications Conference, 2021
2020
Proceedings of the International Conference on Computing, Networking and Communications, 2020
Proceedings of the IEEE Global Communications Conference, 2020
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020
Proceedings of the Decision and Game Theory for Security - 11th International Conference, 2020
2019
Comput. Commun., 2019
A game-theoretic framework for dynamic cyber deception in internet of battlefield things.
Proceedings of the MobiQuitous 2019, 2019
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019
2018
Adaptive topologies against jamming attacks in wireless networks: A game-theoretic approach.
J. Netw. Comput. Appl., 2018
Proceedings of the 56th Annual Allerton Conference on Communication, 2018
It's Time to Migrate! A Game-Theoretic Framework for Protecting a Multi-Tenant Cloud against Collocation Attacks.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018
2017
Dynamic game-theoretic defense approach against stealthy Jamming attacks in wireless networks.
Proceedings of the 55th Annual Allerton Conference on Communication, 2017
2016
Effective Capacity of Delay-Constrained Cognitive Radio Links Exploiting Primary Feedback.
IEEE Trans. Veh. Technol., 2016
Proceedings of the 54th Annual Allerton Conference on Communication, 2016
2015
Proceedings of the 34th IEEE Military Communications Conference, 2015
Interference-based optimal power-efficient access scheme for cognitive radio networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2015
On the Effective Capacity of Delay Constrained Cognitive Radio Networks with Relaying Capability.
Proceedings of the Cognitive Radio Oriented Wireless Networks, 2015
2014
Proceedings of the 11th International Symposium on Wireless Communications Systems, 2014