Amr Youssef
Amr Youssef
Dirección de correo verificada de ciise.concordia.ca
Título
Citado por
Citado por
Año
Ultra-Dense Networks: A Survey
M Kamel, W Hamouda, A Youssef
IEEE Communications Surveys & Tutorials, 2016
5002016
On the analysis of the zeus botnet crimeware toolkit
H Binsalleeh, T Ormerod, A Boukhtouta, P Sinha, A Youssef, M Debbabi, ...
2010 Eighth International Conference on Privacy, Security and Trust, 31-38, 2010
2732010
Power quality disturbance classification using the inductive inference approach
TK Abdel-Galil, M Kamel, AM Youssef, EF El-Saadany, MMA Salama
IEEE Transactions on Power Delivery 19 (4), 1812-1818, 2004
2172004
Disturbance classification utilizing dynamic time warping classifier
AM Youssef, TK Abdel-Galil, EF El-Saadany, MMA Salama
IEEE Transactions on Power Delivery 19 (1), 272-278, 2004
1322004
Hyper-bent functions
AM Youssef, G Gong
International Conference on the Theory and Applications of Cryptographic …, 2001
1282001
A water-filling based scheduling algorithm for the smart grid
M Shinwari, A Youssef, W Hamouda
IEEE Transactions on Smart Grid 3 (2), 710-719, 2012
1062012
Security, Privacy, and Safety Aspects of Civilian Drones: A Survey
R Altawy, AM Youssef
ACM Transactions on Cyber-Physical Systems 1 (2), 2017
1022017
Cryptographic properties of the Welch-Gong transformation sequence generators
G Gong, AM Youssef
IEEE Transactions on Information Theory 48 (11), 2837-2846, 2002
1002002
On the design of linear transformations for substitution permutation encryption networks
AM Youssef, S Mister, SE Tavares
Workshop on Selected Areas of Cryptography (SAC’96): Workshop Record, 40-48, 1997
971997
Disturbance classification using hidden Markov models and vector quantization
TK Abdel-Galil, EF El-Saadany, AM Youssef, MMA Salama
IEEE transactions on power delivery 20 (3), 2129-2135, 2005
912005
Security Trade-offs in Cyber Physical Systems: A Case Study Survey on Implantable Medical Devices
R AlTawy, A Youssef
IEEE, 2016
762016
Mining criminal networks from unstructured text documents
R Al-Zaidy, BCM Fung, AM Youssef, F Fortin
Digital Investigation 8 (3-4), 147-160, 2012
672012
A new class of substitution-permutation networks
AM Youssef, SE Tavares, HM Heys
Workshop on Selected Areas in Cryptography, SAC 96, 132-147, 1996
551996
Speaker recognition from encrypted VoIP communications
LA Khan, MS Baig, AM Youssef
digital investigation 7 (1-2), 65-73, 2010
532010
Applications of SAT solvers to AES key recovery from decayed key schedule images
AA Kamal, AM Youssef
2010 Fourth International Conference on Emerging Security Information …, 2010
472010
Resistance of balanced s-boxes to linear and differential cryptanalysis
AM Youssef, SE Tavares
Information Processing Letters 56 (5), 249-252, 1995
461995
An FPGA implementation of the NTRUEncrypt cryptosystem
AA Kamal, AM Youssef
2009 International Conference on Microelectronics-ICM, 209-212, 2009
412009
Cryptanalysis of simple substitution ciphers using particle swarm optimization
MF Uddin, AM Youssef
2006 IEEE International Conference on Evolutionary Computation, 677-680, 2006
412006
Performance analysis of multiple association in ultra-dense networks
M Kamel, W Hamouda, A Youssef
IEEE Transactions on Communications 65 (9), 3818-3831, 2017
402017
Detection of malicious payload distribution channels in DNS
AM Kara, H Binsalleeh, M Mannan, A Youssef, M Debbabi
2014 IEEE International Conference on Communications (ICC), 853-858, 2014
352014
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20