Mustafa Abdallah

Orcid: 0000-0002-9554-9260

According to our database1, Mustafa Abdallah authored at least 38 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
On Evaluating Black-Box Explainable AI Methods for Enhancing Anomaly Detection in Autonomous Driving Systems.
Sensors, June, 2024

HopTrack: A Real-time Multi-Object Tracking System for Embedded Devices.
CoRR, 2024

A Comprehensive Comparative Study of Individual ML Models and Ensemble Strategies for Network Intrusion Detection Systems.
CoRR, 2024

XAI-based Feature Ensemble for Enhanced Anomaly Detection in Autonomous Driving Systems.
CoRR, 2024

XAI-based Feature Selection for Improved Network Intrusion Detection Systems.
CoRR, 2024

Dynamic DAG-Application Scheduling for Multi-Tier Edge Computing in Heterogeneous Networks.
CoRR, 2024

A Quantal Response Analysis of Defender-Attacker Sequential Security Games.
CoRR, 2024

GeniGraph: A genetic-based novel security defense resource allocation method for interdependent systems modeled by attack graphs.
Comput. Secur., 2024

XAI-ADS: An Explainable Artificial Intelligence Framework for Enhancing Anomaly Detection in Autonomous Driving Systems.
IEEE Access, 2024

XAI-IoT: An Explainable AI Framework for Enhancing Anomaly Detection in IoT Systems.
IEEE Access, 2024

A Quantal Response Analysis of Human Decision-Making in Interdependent Security Games Modeled by Attack Graphs.
IEEE Access, 2024

E-XAI: Evaluating Black-Box Explainable AI Frameworks for Network Intrusion Detection.
IEEE Access, 2024

A Two-Level Ensemble Learning Framework for Enhancing Network Intrusion Detection Systems.
IEEE Access, 2024

A Quantal Response Analysis of Simultaneous Multi-Target Attacker-Defender Security Games.
Proceedings of the NOMS 2024 IEEE Network Operations and Management Symposium, 2024

2023
Anomaly Detection and Inter-Sensor Transfer Learning on Smart Manufacturing Datasets.
Sensors, 2023

Game Theory in Distributed Systems Security: Foundations, Challenges, and Future Directions.
CoRR, 2023

DAG-based Task Orchestration for Edge Computing.
CoRR, 2023

Should I Regret More? A Regret-based Multi-round Learning with Behavioral Human Players in a Multi-Target Security Game.
Proceedings of the European Control Conference, 2023

Anomaly Detection Framework for Securing Next Generation Networks of Platoons of Autonomous Vehicles in a Vehicle-to-Everything System.
Proceedings of the 9th ACM Cyber-Physical System Security Workshop, 2023

Reinforcement Learning for Enhancing Human Security Resource Allocation in Protecting Assets with Heterogeneous Losses.
Proceedings of the Sat-CPS@CODASPY 2023: Proceedings of the 2023 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, 2023

2022
Anomaly Detection and Inter-Sensor Transfer Learning on Smart Manufacturing Datasets.
CoRR, 2022

DAG-based Task Orchestration for Edge Computing.
Proceedings of the 41st International Symposium on Reliable Distributed Systems, 2022

TASHAROK: Using Mechanism Design for Enhancing Security Resource Allocation in Interdependent Systems.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

AutoForecast: Automatic Time-Series Forecasting Model Selection.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022

2021
Context-Aware Collaborative Intelligence With Spatio-Temporal In-Sensor-Analytics for Efficient Communication in a Large-Area IoT Testbed.
IEEE Internet Things J., 2021

Anomaly Detection through Transfer Learning in Agriculture and Manufacturing IoT Systems.
CoRR, 2021

HIOA-CPS: Combining Hybrid Input-Output Automaton and Game Theory for Security Modeling of Cyber-Physical Systems.
Proceedings of the IEEE Security and Privacy Workshops, 2021

The Effect of Behavioral Probability Weighting in a Simultaneous Multi-Target Attacker-Defender Game.
Proceedings of the 2021 European Control Conference, 2021

Morshed: Guiding Behavioral Decision-Makers towards Better Security Investment in Interdependent Systems.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
Behavioral and Game-Theoretic Security Investments in Interdependent Systems Modeled by Attack Graphs.
IEEE Trans. Control. Netw. Syst., 2020

Combining Hybrid Input-Output Automaton and Game Theory for Security Modeling of Cyber-Physical Systems.
CoRR, 2020

BASCPS: How does behavioral decision making impact the security of cyber-physical systems?
CoRR, 2020

The Effect of Behavioral Probability Weighting in a Sequential Defender-Attacker Game.
Proceedings of the 59th IEEE Conference on Decision and Control, 2020

2019
Protecting Assets with Heterogeneous Valuations under Behavioral Probability Weighting.
Proceedings of the 58th IEEE Conference on Decision and Control, 2019

The Impacts of Behavioral Probability Weighting on Security Investments in Interdependent Systems.
Proceedings of the 2019 American Control Conference, 2019

2018
Computer Aided Qur'an Pronunciation using DNN.
J. Intell. Fuzzy Syst., 2018

ATHENA: Automated Tuning of Genomic Error Correction Algorithms using Language Models.
CoRR, 2018

2016
A Deep Neural Networks (DNN) Based Models for a Computer Aided Pronunciation Learning System.
Proceedings of the Speech and Computer - 18th International Conference, 2016


  Loading...