Amr M. Youssef
Orcid: 0000-0002-4284-8646Affiliations:
- Concordia University, Montreal, Canada
According to our database1,
Amr M. Youssef
authored at least 248 papers
between 1995 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Unmasking Covert Intrusions: Detection of Fault-Masking Cyberattacks on Differential Protection Systems.
IEEE Trans. Syst. Man Cybern. Syst., December, 2024
IEEE Internet Things J., April, 2024
IEEE Trans. Ind. Informatics, March, 2024
IEEE Internet Things J., January, 2024
SKAFS: Symmetric Key Authentication Protocol With Forward Secrecy for Edge Computing.
IEEE Internet Things J., January, 2024
IEEE Trans. Netw. Sci. Eng., 2024
IEEE Trans. Netw. Sci. Eng., 2024
On Detecting and Measuring Exploitable JavaScript Functions in Real-world Applications.
ACM Trans. Priv. Secur., 2024
MEGR-APT: A Memory-Efficient APT Hunting System Based on Attack Representation Learning.
IEEE Trans. Inf. Forensics Secur., 2024
Privacy-Preserving Mutual Authentication Protocol With Forward Secrecy for IoT-Edge-Cloud.
IEEE Internet Things J., 2024
Forensic Sci. Int. Digit. Investig., 2024
IEEE Control. Syst. Lett., 2024
CoRR, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
"Trust Me Over My Privacy Policy": Privacy Discrepancies in Romantic AI Chatbot Apps.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024
2023
IEEE Trans. Netw. Serv. Manag., September, 2023
Management of Congestion in Distribution Networks Utilizing Demand Side Management and Reinforcement Learning.
IEEE Syst. J., September, 2023
IEEE Internet Things J., September, 2023
IEEE Trans. Netw. Sci. Eng., 2023
GASE: A Lightweight Group Authentication Scheme With Key Agreement for Edge Computing Applications.
IEEE Internet Things J., 2023
CoRR, 2023
Proceedings of the ACM Web Conference 2023, 2023
Measuring the Leakage and Exploitability of Authentication Secrets in Super-apps: The WeChat Case.
Proceedings of the 26th International Symposium on Research in Attacks, 2023
Proceedings of the Secure IT Systems - 28th Nordic Conference, NordSec 2023, Oslo, Norway, 2023
Learning-Based Detection of Malicious Volt-VAr Control Parameters in Smart Inverters.
Proceedings of the 49th Annual Conference of the IEEE Industrial Electronics Society, 2023
Proceedings of the IEEE International Conference on Communications, 2023
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2023
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023
All Your IoT Devices Are Belong to Us: Security Weaknesses in IoT Management Platforms.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023
2022
IEEE Trans. Syst. Man Cybern. Syst., 2022
IEEE Trans. Smart Grid, 2022
Security Monitoring of IEC 61850 Substations Using IEC 62351-7 Network and System Management.
IEEE Trans. Ind. Informatics, 2022
Edge Computing and Multiple-Association in Ultra-Dense Networks: Performance Analysis.
IEEE Trans. Commun., 2022
IACR Cryptol. ePrint Arch., 2022
IEEE Control. Syst. Lett., 2022
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022
Proceedings of the Security and Privacy in Communication Networks, 2022
Proceedings of the IEEE European Symposium on Security and Privacy, 2022
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022
A Privacy Preserving Solution for Cloud-Enabled Set-Theoretic Model Predictive Control.
Proceedings of the European Control Conference, 2022
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2022
Proceedings of the APWG Symposium on Electronic Crime Research, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
Efficient Inter-Cloud Authentication and Micropayment Protocol for IoT Edge Computing.
IEEE Trans. Netw. Serv. Manag., 2021
Cyber Security of Market-Based Congestion Management Methods in Power Distribution Systems.
IEEE Trans. Ind. Informatics, 2021
Threat Intelligence Generation Using Network Telescope Data for Industrial Control Systems.
IEEE Trans. Inf. Forensics Secur., 2021
Multiple-Association Supporting HTC/MTC in Limited-Backhaul Capacity Ultra-Dense Networks.
IEEE Trans. Commun., 2021
IET Cyper-Phys. Syst.: Theory & Appl., 2021
On MILP-based Automatic Search for Bit-Based Division Property for Ciphers with (large) Linear Layers.
IACR Cryptol. ePrint Arch., 2021
LSTM-based approach to detect cyber attacks on market-based congestion management methods.
CoRR, 2021
On Securing Cloud-hosted Cyber-physical Systems Using Trusted Execution Environments.
CoRR, 2021
Lightweight Authentication and Key Agreement Protocol for Edge Computing Applications.
Proceedings of the 7th IEEE World Forum on Internet of Things, 2021
Proceedings of the Security and Privacy in Communication Networks, 2021
Proceedings of the ICC 2021, 2021
Proceedings of the Financial Cryptography and Data Security. FC 2021 International Workshops, 2021
2020
Binary Code Fingerprinting for Cybersecurity - Application to Malicious Code Fingerprinting
Advances in Information Security 78, Springer, ISBN: 978-3-030-34237-1, 2020
IEEE Trans. Veh. Technol., 2020
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Internet Things J., 2020
IEEE Internet Things J., 2020
IET Cyper-Phys. Syst.: Theory & Appl., 2020
IET Cyper-Phys. Syst.: Theory & Appl., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
DTRAP, 2020
IEEE Commun. Surv. Tutorials, 2020
Proceedings of the Security and Privacy in Communication Networks, 2020
Proceedings of the IEEE Globecom Workshops, 2020
Proceedings of the IEEE Global Communications Conference, 2020
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2020
Proceedings of the 9th IEEE International Conference on Cloud Networking, 2020
Set-Theoretic Control for Active Detection of Replay Attacks with Applications to Smart Grid.
Proceedings of the 2020 IEEE Conference on Control Technology and Applications, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
IEEE Trans. Smart Grid, 2019
IEEE Internet Things J., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
On MILP-Based Automatic Search for Differential Trails Through Modular Additions with Application to Bel-T.
IACR Cryptol. ePrint Arch., 2019
Security Monitoring of IEC 61850 Substations Using IEC 62351-7 Network and System Management<sup>1</sup>.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the International Conference on Communications, 2019
Proceedings of the Financial Cryptography and Data Security, 2019
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2019
Detecting, Fingerprinting and Tracking Reconnaissance Campaigns Targeting Industrial Control Systems.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
Attack Detection for Load Frequency Control Systems Using Stochastic Unknown Input Estimators.
IEEE Trans. Inf. Forensics Secur., 2018
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
IACR Cryptol. ePrint Arch., 2018
Smart But Unsafe: Experimental Evaluation of Security and Privacy Practices in Smart Toys.
CoRR, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the Selected Areas in Cryptography - SAC 2018, 2018
Detection of false data injection attacks in smart grids using Recurrent Neural Networks.
Proceedings of the 2018 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2018
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the Foundations and Practice of Security - 11th International Symposium, 2018
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
2017
MILP Modeling for (Large) S-boxes to Optimize Probability of Differential Characteristics.
IACR Trans. Symmetric Cryptol., 2017
ACM Trans. Cyber Phys. Syst., 2017
IEEE Trans. Commun., 2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and Trust, 2017
Proceedings of the Selected Areas in Cryptography - SAC 2017, 2017
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017
Proceedings of the 29th International Conference on Microelectronics, 2017
Proceedings of the 29th International Conference on Microelectronics, 2017
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Coverage and Capacity Analysis with Stretched Exponential Path Loss in Ultra-Dense Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the Progress in Cryptology - AFRICACRYPT 2017, 2017
2016
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
IEICE Trans. Inf. Syst., 2016
IACR Cryptol. ePrint Arch., 2016
Security Tradeoffs in Cyber Physical Systems: A Case Study Survey on Implantable Medical Devices.
IEEE Access, 2016
Proceedings of the International Conference on Selected Topics in Mobile & Wireless Networking, 2016
Proceedings of the Information Security - 19th International Conference, 2016
Proceedings of the Information Security - 19th International Conference, 2016
Proceedings of the 2016 IEEE International Conference on Communications, 2016
2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2015
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2015
Improved Key Recovery Attack on Round-reduced Hierocrypt-L1 in the Single-Key Setting.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2015
Proceedings of the Lightweight Cryptography for Security and Privacy, 2015
Proceedings of the Progress in Cryptology - LATINCRYPT 2015, 2015
Proceedings of the Information Security Practice and Experience, 2015
Proceedings of the Codes, Cryptology, and Information Security, 2015
Proceedings of the Codes, Cryptology, and Information Security, 2015
2014
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014
Differential Sieving for 2-Step Matching Meet-in-the-Middle Attack with Application to LBlock.
Proceedings of the Lightweight Cryptography for Security and Privacy, 2014
Proceedings of the IEEE International Conference on Communications, 2014
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014
2013
Strengthening hardware implementations of NTRUEncrypt against fault analysis attacks.
J. Cryptogr. Eng., 2013
Inf. Secur. J. A Glob. Perspect., 2013
Inf. Process. Lett., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Advances in Security of Information and Communication Networks, 2013
A Comparison between Two Off-the-Shelf Algebraic Tools for Extraction of Cryptographic Keys from Corrupted Memory Images.
Proceedings of the Security Engineering and Intelligence Informatics, 2013
2012
IEEE Trans. Smart Grid, 2012
Inf. Secur. J. A Glob. Perspect., 2012
Cryptanalysis of a <i>GL</i>(<i>r</i>, <i>Z<sub>n</sub></i>)-Based Public Key System.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
IACR Cryptol. ePrint Arch., 2012
Cryptanalysis of a key exchange protocol based on the endomorphisms ring End (ℤ<sub>p</sub> × ℤ<sub>p<sup>2</sup></sub>).
Appl. Algebra Eng. Commun. Comput., 2012
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012
Proceedings of the Progress in Cryptology - LATINCRYPT 2012, 2012
Proceedings of IEEE International Conference on Communications, 2012
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012
Proceedings of the Seventh International Conference on Availability, 2012
Proceedings of the Seventh International Conference on Availability, 2012
2011
IET Commun., 2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
Comput. Electr. Eng., 2011
Differential Fault Analysis of Hummingbird.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011
Proceedings of the Progress in Cryptology - AFRICACRYPT 2011, 2011
2010
A Channel-Estimation and Data-Detection Scheme for Multiuser MIMO-CDMA Systems in Fading Channels.
IEEE Trans. Veh. Technol., 2010
IEEE Trans. Veh. Technol., 2010
IEICE Trans. Inf. Syst., 2010
IACR Cryptol. ePrint Arch., 2010
Comput. Electr. Eng., 2010
Proceedings of the Recent Trends in Wireless and Mobile Networks, 2010
EM Channel Estimation and Data Detection for MIMO-CDMA Systems over Slow-Fading Channels.
Proceedings of the 72nd IEEE Vehicular Technology Conference, 2010
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010
A framework to strengthen password authentication using mobile devices and browser extensions.
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2010
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2010
Proceedings of the Global Communications Conference, 2010
Joint Iterative Channel Estimation and Data Detection for MIMO-CDMA Systems over Frequency-Selective Fading Channels.
Proceedings of the Global Communications Conference, 2010
Proceedings of the Progress in Cryptology, 2010
2009
IEEE Trans. Inf. Theory, 2009
BER analysis of space-time diversity in CDMA systems over frequency-selective fading channels.
IET Commun., 2009
Cryptogr. Commun., 2009
Proceedings of the Third International Conference on Emerging Security Information, 2009
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
2008
Wirel. Commun. Mob. Comput., 2008
IEEE Trans. Circuits Syst. II Express Briefs, 2008
On the Security of a Cryptosystem Based on Multiple-Parameters Discrete Fractional Fourier Transform.
IEEE Signal Process. Lett., 2008
Cryptanalysis of the parameterized improved fast encryption algorithm for multimedia.
IEEE Commun. Lett., 2008
Proceedings of the 67th IEEE Vehicular Technology Conference, 2008
Proceedings of the Second International Conference on Emerging Security Information, 2008
2007
IEEE Trans. Circuits Syst. I Regul. Pap., 2007
Space-time spreading and diversity in asynchronous CDMA systems over frequency-selective fading channels.
Proceedings of the 9th International Symposium on Signal Processing and Its Applications, 2007
Proceedings of the 9th International Symposium on Signal Processing and Its Applications, 2007
Proceedings of IEEE International Conference on Communications, 2007
Performance of Space-Time Diversity in CDMA Over Frequency-Selective Fading Channels.
Proceedings of the Global Communications Conference, 2007
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007
2006
IEEE Trans. Inf. Theory, 2006
Theor. Comput. Sci., 2006
Proceedings of the Medical Imaging 2006: Image Processing, 2006
Proceedings of the Image Analysis and Recognition, Third International Conference, 2006
Artificial life feature selection techniques for spam e-mail filters.
Proceedings of the Second IASTED International Conference on Computational Intelligence, 2006
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006
Proceedings of the IEEE International Conference on Evolutionary Computation, 2006
Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2006
Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2006
Proceedings of the Canadian Conference on Electrical and Computer Engineering, 2006
2005
Artificial Life Feature Selection Techniques for Prostrate Cancer Diagnosis Using TRUS Images.
Proceedings of the Image Analysis and Recognition, Second International Conference, 2005
2003
IEEE Trans. Consumer Electron., 2003
2002
IEEE Trans. Inf. Theory, 2002
IACR Cryptol. ePrint Arch., 2002
2001
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001
Proceedings of the Progress in Cryptology, 2001
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001
2000
Cryptanalysis of the "Augmented Family of Cryptographic Parity Circuits" Proposed at ISW'97.
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000
1996
Comment on "Bounds on the Number of Functions Satisfying the Strict Avalanche Criterion".
Inf. Process. Lett., 1996
1995
Inf. Process. Lett., 1995
Proceedings of the Information Theory and Applications II, 1995