Close

Cybersecurity Education, Research & Outreach Center

2019 Publications

  • M. Hailesellasie*, J. Nelson*, F. Khalid*, S. R. Hasan, "VAWS: Vulnerability Analysis of Neural Networks using Weight Sensitivity", in 62nd IEEE International MidWest Symposium on Circuits and Systems, 2019.
  • H Mohammed*, T. A. Odetola*, S. R. Hasan, S. Stissi*, I. Garlinx*, F. Awwad, "(HIADIoT): Hardware Intrinsic Attack Detection in Internet of Things; Leveraging Power Profiling", in 62nd IEEE International MidWest Symposium on Circuits and Systems, 2019.
  • Enahoro Oriero*, S. R. Hasan, "Survey on Recent Counterfeit IC Detection Techniques and Future Research Directions", Integration, The VLSI Journal, 2019 https://www.sciencedirect.com/science/article/pii/S0167926018301664 
  • Alsharif, Ahmad, Mahmoud Nabil, Mohamed Mahmoud, and Mohamed Abdallah. "EPDA: Efficient and Privacy-Preserving Data Collection and Access Control Scheme for Multi-Recipient AMI Networks." IEEE Access (2019).
  • Shafee, Ahmed, Mohamed Baza, Douglas A. Talbert, Mostafa M. Fouda, Mahmoud Nabil, and Mohamed Mahmoud. "Mimic learning to generate a shareable network intrusion detection model." arXiv preprint arXiv:1905.00919 (2019).
  • Baza, Mohamed, Mahmoud Nabil, Niclas Bewermeier, Kemal Fidan, Mohamed Mahmoud, and Mohamed Abdallah. "Detecting sybil attacks using proofs of work and location in vanets." arXiv preprint arXiv:1904.05845 (2019).
  • Amiri, Wesam Al, Mohamed Baza, Karim Banawan, Mohamed Mahmoud, Waleed Alasmary, and Kemal Akkaya. "Privacy-preserving smart parking system using blockchain and private information retrieval." arXiv preprint arXiv:1904.09703 (2019).
  • M. Nabil, M. Ismail, M. M. E. A. Mahmoud, W. Alasmary and E. Serpedin, "PPETD: Privacy-Preserving Electricity Theft Detection Scheme With Load Monitoring and Billing for AMI Networks," in IEEE Access, vol. 7, pp. 96334-96348, 2019.
  • Pazos-Revilla, Marbin, Ahmad Alsharif, Surya Gunukula, Terry N. Guo, Mohamed Mahmoud, and Xuemin Sherman Shen. "Privacy-Preserving Physical-Layer-Assisted Charging Authorization Scheme for EV Dynamic Charging System."
  • E. M. Radi, N. Lasla, S. Bakiras and M. Mahmoud, "Privacy-Preserving Electric Vehicle Charging for Peer-to-Peer Energy Trading Ecosystems," ICC 2019 - 2019 IEEE International Conference on Communications (ICC), Shanghai, China, 2019, pp. 1-6.
  • Alsharif, M. Nabil, S. Tonyali, H. Mohammed, M. Mahmoud and K. Akkaya, "EPIC: Efficient Privacy-Preserving Scheme With EtoE Data Integrity and Authenticity for AMI Networks," in IEEE Internet of Things Journal, vol. 6, no. 2, pp. 3309-3321, April 2019.
  • Ford, Vitaly, and Ambareen Siraj. "GenCyberCoin: an engaging, customizable, and gamified web platform for cybersecurity summer camps and classrooms." Journal of Computing Sciences in Colleges 35, no. 3 (2019): 87-96.
  • Paudel, Ramesh, Peter Harlan, and William Eberle. "Detecting the onset of a network layer dos attack with a graph-based approach." In The Thirty-Second International Flairs Conference. 2019.
  • Ramesh Paudel, Prajwal Kandel, and William Eberle, “Detecting Spam Tweets in Trending Topics using Graph-Based Approach,” Proceedings of the Future Technologies Conference (FTC), October 2019.
  • Sheikh Rabiul Islam, William Eberle, Sid C. Bundy, and Sheikh Ghafoor, “Infusing Domain Knowledge in AI-based “black box” Models for Better Explainability with Application in Bankruptcy Prediction,” Workshop on Anomaly Detection in Finance, SIGKDD Conference on Knowledge Discovery and Data Mining (KDD), August 2019.
  • Bhuiyan, M. B. Sharif, P. J. Tinker, W. Eberle, D. A. Talbert, S. K. Ghafoor, and L. Frey, “Gene Selection and Clustering of Breast Cancer Data,” International Conference of the Florida AI Research Society (FLAIRS), May 2019.
  • Sirisha Velampalli, Lenin Mookiah, and William Eberle, “Discovering Suspicious Patterns Using a Graph Based Approach,” International Conference of the Florida AI Research Society (FLAIRS), May 2019.
  • Ramesh Paudel, Peter Harlan, and William Eberle, “Detecting the Onset of a Network Layer DoS Attack with a Graph-Based Approach,” International Conference of the Florida AI Research Society (FLAIRS), May 2019.
  • M. A. Ayub, Z. A. Onik, and S. Smith, “Parallelized RSA Algorithm: An Analysis with Performance Evaluation using OpenMP Library in High Performance Computing Environment,” 2019 22nd International Conference on Computer and Information Technology (ICCIT), Dhaka, Bangladesh, 2019, pp. 1-6.
  • M. A. Ayub, S. Smith, and A. Siraj, “A Protocol Independent Approach in Network Covert Channel Detection,” 2019 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), New York, NY, USA, 2019, pp. 165-170.
  • Enahoro Oriero*, S. R. Hasan, "Survey on Recent Counterfeit IC Detection Techniques and Future Research Directions", Integration, The VLSI Journal, 2019 https://www.sciencedirect.com/science/article/pii/S0167926018301664
  • H Mohammed*, T. A. Odetola*, S. R. Hasan, S. Stissi*, I. Garlinx*, F. Awwad, "(HIADIoT): Hardware Intrinsic Attack Detection in Internet of Things; Leveraging Power Profiling", in 62nd IEEE International MidWest Symposium on Circuits and Systems, 2019.
  • M. Hailesellasie*, J. Nelson*, F. Khalid*, S. R. Hasan, "VAWS: Vulnerability Analysis of Neural Networks using Weight Sensitivity", in 62nd IEEE International MidWest Symposium on Circuits and Systems, 2019.
  • M. Nabil, M. Ismail, M. Mahmoud, W. Alasmary, and E. Serpedin, “PPETD: Privacy-preserving electricity theft detection scheme with load monitoring and billing for AMI networks,” IEEE Access, Special issue on Security, Privacy, and Trust Management in Smart Cities, vol. 7, no. 1, pp. 96 334–96 348, Dec. 2019.
  • Shafee, M. Baza, D. Talbert, M. Fouda, M. Nabil, and M. Mahmoud, “Mimic learning to generate a shareable network intrusion detection model,” Proc. IEEE Consumer Communications Networking Conference (IEEE CCNC’19), Las Vegas, USA, January 2019.
  • M. Mahmoud, K. Rabieh, A. Sherif, E. Oriero, M. Ismail, E. Serpedin, and K. Qaraqe, “Privacy-preserving fine-grained data retrieval scheme for mobile social networks (MSNs),” IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 16, no. 5, pp. 871–884, Sept./Oct. 2019.
  • M. Nabil, M. Ismail, M. Mahmoud, and E. Serpedin, “Deep recurrent electricity theft detection in AMI networks with evolutionary hyper-parameter tuning,” Proc. of IEEE International Conference on Internet of Things (iThings’19), Atlanta, USA, July 2019
  • M. Baza, M. Nabil, M. Ismail, and M. Mahmoud, E. Serpedin, and M. Rahman, “Blockchainbased privacy-preserving charging coordination mechanism for energy storage units,” Proc. of Recent Advances on Blockchain and Its Applications Symposium of the 2nd IEEE International Conference on Blockchain (Blockchain-2019), Atlanta, USA, July 2019.
  • W. Al Amiri, M. Baza, K. Banawan, M. Mahmoud, W. Alasmary, K. Akkaya, “Privacy-preserving smart parking system using blockchain and private information retrieval,” Proc. of the 2019 International Conference on Smart Applications, Communications and Networking (IEEE SmartNets), July 2019.
  • M. Mahmoud, and M. Song, “MDMS: Efficient and privacy-preserving multi-dimension and multi-subset data collection for AMI networks,” IEEE Internet of Things Journal (IoT), Aug. 2019, accepted, In press.
  • M. Baza, N. Lasla, M. Mahmoud, and M. Abdallah, “B-Ride: Ride sharing with privacy preservation, trust and fair payment atop public blockchain,” IEEE Transactions on Network Science and Engineering, 2019.
  • M. Baza, M. Nabil, N. Lasla, K. Fidan, M. Mahmoud, M. Abdallah, “Blockchain-based firmware update scheme tailored for autonomous vehicles,” Proc. of IEEE WCNC’19, Marrakech, Morocco, April 2019.
  • M. Nabil, M. Mahmoud, A. Sherif, A. Alsharif, and M. Abdulla, “Efficient privacy-preserving ride sharing organization for transferable and non-transferable services,” IEEE Transactions on Dependable and Secure Computing (TDSC), May 2019.
  • M. Baza, M. Nabil, N. Bewermeier, K. Fidan, M. Mahmoud, and M. Abdallah, “Detecting sybil attacks using proofs of work and location in VANETs,” IEEE Transactions on Dependable and Secure Computing (TDSC), 2019.
  • Nuthan Munaiah, Akond Rahman, Justin Pelletier, Laurie Williams, and Andrew Meneely "Characterizing Attacker Behavior in a Cybersecurity Penetration Testing Competition" in Proceedings of the International Symposium on Empirical Software Engineering and Measurement (ESEM) 2019, Porto de Galinhas, Brazil, Sep 2019.
  • Md. Rayhanur Rahman, Akond Rahman, and Laurie Williams "Share, But Be Aware: Security Smells in Python Gists" in Proceedings of the International Conference on Software Maintenance and Evolution (ICSME) 2019, Ohio, USA, Oct 2019.
  • Terry Guo, Animesh Dahal and Ambareen Siraj, “Precise Feature Selection and Case Study of Intrusion Detection in an Industrial Control System Environment”, 15th International Conference on Machine Learning and Data Mining held July 13 - 18, New York, NY, 2019.
  • Islam, Sheikh Rabiul, William Eberle, Sheikh K. Ghafoor, Ambareen Siraj, and Mike Rogers. "Domain Knowledge Aided Explainable Artificial Intelligence for Intrusion Detection and Response." arXiv preprint arXiv:1911.09853 (2019).
  • Ayub, Md Ahsan, Zishan Ahmed Onik, and S. "Parallelized RSA Algorithm: An Analysis with Performance Evaluation using OpenMP Library in High Performance Computing Environment." (2019).
  • Chen, Qian, Sheikh Rabiul Islam, Henry Haswell, and Robert A. Bridges. "Automated Ransomware Behavior Analysis: Pattern Extraction and Early Detection." In International Conference on Science of Cyber Security, pp. 199-214. Springer, Cham, 2019.
  • M. Nabil, M. Mahmoud, M. Ismail and E. Serpedin, "Deep Recurrent Electricity Theft Detection in AMI Networks with Evolutionary Hyper-Parameter Tuning," 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Atlanta, GA, USA, 2019, pp. 1002-1008.
  • Pazos-Revilla, Marbin, Mohamed Baza, Mahmoud Nabil, Ahmed Sherif, Mohamed Mahmoud, and Waleed Alasmary. "Privacy-Preserving and Collusion-Resistant Charging Coordination Schemes for Smart Grid." arXiv preprint arXiv:1905.04666 (2019).
  • Nabil, Mahmoud, Muhammad Ismail, Mohamed Mahmoud, Mostafa Shahin, Khalid Qaraqe, and Erchin Serpedin. "Deep Learning-Based Detection of Electricity Theft Cyber-Attacks in Smart Grid AMI Networks." In Deep Learning Applications for Cyber Security, pp. 73-102. Springer, Cham, 2019.
  • Yilmaz, Ibrahim, and Rahat Masum. "Expansion of cyber attack data from unbalanced datasets using generative techniques." arXiv preprint arXiv:1912.04549 (2019).
  • A. Alsharif, A. Shafee, M. Nabil, M. Mahmoud and W. Alasmary, "A Multi-Authority AttributeBased Signcryption Scheme with Efficient Revocation for Smart Grid Downlink Communication," 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE.
  • Baza, Mohamed, Andrew Salazar, Mohamed Mahmoud, Mohamed Abdallah, and Kemal Akkaya. "On sharing models instead of data using mimic learning for smart health applications." arXiv preprint arXiv:1912.11210 (2019).
  • M. Nabil, A. Sherif, M. Mahmoud, A. Alsharif and M. Abdallah, "Efficient and Privacy-Preserving Ridesharing Organization for Transferable and Non-Transferable Services," in IEEE Transactions on Dependable and Secure Computing.
  • Islam, Sheikh Rabiul, William Eberle, Sheikh K. Ghafoor, Sid C. Bundy, Douglas A. Talbert, and Ambareen Siraj. "Investigating bankruptcy prediction models in the presence of extreme class imbalance and multiple stages of economy." arXiv preprint arXiv:1911.09858 (2019).
  • R. Paudel, T. Muncy and W. Eberle, "Detecting DoS Attack in Smart Home IoT Devices Using a Graph-Based Approach," 2019 IEEE International Conference on Big Data (Big Data), Los Angeles, CA, USA, 2019, pp. 5249-5258.
  • Ramesh Paudel, Prajwal Kandel, and William Eberle, “Detecting Spam Tweets in Trending Topics using Graph-Based Approach,” Proceedings of the Future Technologies Conference (FTC), October 2019.
  • Sheikh Rabiul Islam, William Eberle, Sid C. Bundy, and Sheikh Ghafoor, “Infusing Domain Knowledge in AI-based “black box” Models for Better Explainability with Application in Bankruptcy Prediction,” Workshop on Anomaly Detection in Finance, SIGKDD Conference on Knowledge Discovery and Data Mining (KDD), August 2019.
  • Maanak Gupta, James Benson, Farhan Patwa and Ravi Sandhu, Dynamic Groups and Attribute Based Access Control for Next-Generation Smart Cars. In Proceedings of the 9th ACM Conference on Data and Application Security and Privacy (CODASPY), Dallas, Texas, March 25-27, 2019, pages 12.
  • Maanak Gupta, James Benson, Farhan Patwa and Ravi Sandhu, Secure Cloud Assisted Smart Cars Using Dynamic Groups and Attribute Based Access Control." arXiv preprint arXiv:1908.08112 (2019). https://arxiv.org/abs/1908.08112 
  • Effat Farhana, Nasif Imtiaz, and Akond Rahman "Synthesizing Program Execution Time Discrepancies in Julia Used for Scientific Software" in Proceedings of the International Conference on Software Maintenance and Evolution (ICSME) 2019, Ohio, USA, Oct 2019 Pre-print
  • Akond Rahman and Laurie Williams, "Source Code Properties of Defective Infrastructure as Code Scripts", in the Journal of Information and Software Technology (IST), (Journal-first at ICSME 2019) Pre-print
  • Akond Rahman, "Anti-patterns in Infrastructure as Code", PhD Dissertation, NC State University 2019. (NC State CSC and COE Distinguished Dissertation Award) Pre-print
  • Kanthi Sarpatwar, Venkata Sitaramagiridharganesh Ganapavarapu, Karthikeyan Shanmugam, Akond Rahman, and Roman Vaculin, "Blockchain Enabled AI Marketplace: The Price You Pay For Trust" in Proceedings of the International Workshop of Blockchain Meets Computer Vision and Artificial Intelligence 2019, CA, USA 2019. Preprint
  • Akond Rahman, Effat Farhana, and Nasif Imtiaz, "Snakes in Paradise?: Insecure Python-related Coding Practices in Stack Overflow" in Proceedings of the International Conference on Mining Software Repositories (MSR) 2019, Montreal, Canada, May 2019. Preprint
  • Nasif Imtiaz, Akond Rahman, Effat Farhana, and Laurie Williams, "Challenges with Responding to Static Analysis Tool Alerts" in Proceedings of the International Conference on Mining Software Repositories (MSR) 2019, Montreal, Canada, May 2019. Preprint
  • Akond Rahman and Laurie Williams, "Poster: A Bird's Eye View of Knowledge Needs Related to Penetration Testing" in Proceedings of the Symposium and Bootcamp on the Science of Security (HotSoS) 2019, Nashville, Tennessee, April 2019 Preprint
  • Akond Rahman, Chirs Parnin, and Laurie Williams, "The Seven Sins: Security Smells in Infrastructure as Code Scripts", in the International Conference on Software Engineering (ICSE) 2019. (ACM SIGSOFT Distinguished Paper Award) Pre-print
  • R Atat, M Ismail, Multi‐RAT D2D Communication Paradigms: Potential Benefits and Challenging Issues, Wiley 5G Ref: The Essential 5G Reference Online, 1-19
  • R Atat, M Ismail, E Serpedin, Stochastic Geometry-based Model for Spatio-temporal Expanding Smart Grids, 2019 IEEE Innovative Smart Grid Technologies-Asia (ISGT Asia), 457-462
  • M Nabil, M Mahmoud, M Ismail, E Serpedin, Deep Recurrent Electricity Theft Detection in AMI Networks with Evolutionary Hyper-Parameter Tuning, 2019 International Conference on Internet of Things (iThings) and IEEE Green
  • R Atat, M Ismail, MF Shaaban, E Serpedin, T Overbye, Stochastic Geometry-Based Model for Dynamic Allocation of Metering Equipment in Spatio-Temporal Expanding Power Grids, IEEE Transactions on Smart Grid 11 (3), 2080-2091
  • IS Bayram, M Ismail, A Stochastic Model for Fast Charging Stations with Energy Storage Systems, 2019 IEEE Transportation Electrification Conference and Expo (ITEC), 1-5
  • HB Kong, M Ismail, E Serpedin, KA Qaraqe, Energy Efficient Optimization of Base Station Density for VLC Networks, ICC 2019-2019 IEEE International Conference on Communications (ICC), 1-6
  • M Ismail, IS Bayram, K Qaraqe, E Serpedin, IMA Imran, YA Sambo, ..., 5G-Enhanced Smart Grid Services, Enabling 5G Communication Systems to Support Vertical Industries, 28-102
  • M Nabil, M Ismail, M Mahmoud, M Shahin, K Qaraqe, E Serpedin, Deep Learning-Based Detection of Electricity Theft Cyber-Attacks in Smart Grid AMI Networks, Deep Learning Applications for Cyber Security, 73-102
  • M Nabil, M Ismail, MMEA Mahmoud, W Alasmary, E Serpedin, PPETD: Privacy-Preserving Electricity Theft Detection Scheme With Load Monitoring and Billing for AMI Networks, IEEE Access 7, 96334-96348
  • MF Shaaban, S Mohamed, M Ismail, KA Qaraqe, E Serpedin, Joint planning of smart EV charging stations and DGs in Eco-friendly remote hybrid microgrids, IEEE Transactions on Smart Grid 10 (5), 5819-5830
  • M Baza, M Nabil, M Ismail, M Mahmoud, E Serpedin, MA Rahman, Blockchain-based charging coordination mechanism for smart grid energy storage units, 2019 IEEE International Conference on Blockchain (Blockchain), 504-509
  • J Kong, ZY Wu, M Ismail, E Serpedin, KA Qaraqe, Q-Learning Based Two-Timescale Power Allocation for Multi-Homing Hybrid RF/VLC Networks, IEEE Wireless Communications Letters 9 (4), 443-447

Experience Tech For Yourself

Visit us to see what sets us apart.

Schedule Your Visit