default search action
Bassam Moussa
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Masoud Zadsar, Mohsen Ghafouri, Amir Ameli, Bassam Moussa:
Integrated Deep Learning-Based Detection and Robust State Observer Mitigation of Time-Synchronization Attacks: A WADC Case Study. IEEE Trans. Smart Grid 15(5): 5055-5071 (2024) - 2023
- [j17]Masoud Zadsar, Mohsen Ghafouri, Amir Ameli, Bassam Moussa:
Preventing Time-Synchronization Attacks on Synchrophasor Measurements of Wide-Area Damping Controllers. IEEE Trans. Instrum. Meas. 72: 1-14 (2023) - 2022
- [j16]Joseph Antoun, Mohammad Ekramul Kabir, Ribal Atallah, Bassam Moussa, Mohsen Ghafouri, Chadi Assi:
Assisting Residential Distribution Grids in Overcoming Large-Scale EV Preconditioning Load. IEEE Syst. J. 16(3): 4345-4355 (2022) - [j15]Mohsen Ghafouri, Mohammad Ekramul Kabir, Bassam Moussa, Chadi Assi:
Coordinated Charging and Discharging of Electric Vehicles: A New Class of Switching Attacks. ACM Trans. Cyber Phys. Syst. 6(3): 23:1-23:26 (2022) - 2021
- [j14]Hossam ElHussini, Chadi Assi, Bassam Moussa, Ribal Atallah, Ali Ghrayeb:
A Tale of Two Entities: Contextualizing the Security of Electric Vehicle Charging Stations on the Power Grid. ACM Trans. Internet Things 2(2): 8:1-8:21 (2021) - [j13]Mohammad Ekramul Kabir, Ibrahim Sorkhoh, Bassam Moussa, Chadi Assi:
Joint Routing and Scheduling of Mobile Charging Infrastructure for V2V Energy Transfer. IEEE Trans. Intell. Veh. 6(4): 736-746 (2021) - [j12]Mohammad Ekramul Kabir, Mohsen Ghafouri, Bassam Moussa, Chadi Assi:
A Two-Stage Protection Method for Detection and Mitigation of Coordinated EVSE Switching Attacks. IEEE Trans. Smart Grid 12(5): 4377-4388 (2021) - 2020
- [j11]Hossam ElHusseini, Chadi Assi, Bassam Moussa, Ribal Attallah, Ali Ghrayeb:
Blockchain, AI and Smart Grids: The Three Musketeers to a Decentralized EV Charging Infrastructure. IEEE Internet Things Mag. 3(2): 24-29 (2020) - [j10]Joseph Antoun, Mohammad Ekramul Kabir, Bassam Moussa, Ribal Atallah, Chadi Assi:
A Detailed Security Assessment of the EV Charging Ecosystem. IEEE Netw. 34(3): 200-207 (2020) - [j9]Bassam Moussa, Marthe Kassouf, Rachid Hadjidj, Mourad Debbabi, Chadi Assi:
An Extension to the Precision Time Protocol (PTP) to Enable the Detection of Cyber Attacks. IEEE Trans. Ind. Informatics 16(1): 18-27 (2020) - [j8]Bassam Moussa, Abdullah Albarakati, Marthe Kassouf, Mourad Debbabi, Chadi Assi:
Exploiting the Vulnerability of Relative Data Alignment in Phasor Data Concentrators to Time Synchronization Attacks. IEEE Trans. Smart Grid 11(3): 2541-2551 (2020) - [j7]Parisa Akaber, Bassam Moussa, Mohsen Ghafouri, Ribal Atallah, Basile L. Agba, Chadi Assi, Mourad Debbabi:
CASeS: Concurrent Contingency Analysis-Based Security Metric Deployment for the Smart Grid. IEEE Trans. Smart Grid 11(3): 2676-2687 (2020) - [c5]Joseph Antoun, Mohammad Ekramul Kabir, Ribal Atallah, Bassam Moussa, Mohsen Ghafouri, Chadi Assi:
Impact Analysis of EV Preconditioning on the Residential Distribution Network. SmartGridComm 2020: 1-6
2010 – 2019
- 2019
- [j6]Bassam Moussa, Chantale Robillard, Alf Zugenmaier, Marthe Kassouf, Mourad Debbabi, Chadi Assi:
Securing the Precision Time Protocol (PTP) Against Fake Timestamps. IEEE Commun. Lett. 23(2): 278-281 (2019) - [j5]Parisa Akaber, Bassam Moussa, Mourad Debbabi, Chadi Assi:
Automated Post-Failure Service Restoration in Smart Grid Through Network Reconfiguration in the Presence of Energy Storage Systems. IEEE Syst. J. 13(3): 3358-3367 (2019) - 2018
- [j4]Bassam Moussa, Parisa Akaber, Mourad Debbabi, Chadi Assi:
Critical Links Identification for Selective Outages in Interdependent Power-Communication Networks. IEEE Trans. Ind. Informatics 14(2): 472-483 (2018) - [j3]Bassam Moussa, Mourad Debbabi, Chadi Assi:
A Detection and Mitigation Model for PTP Delay Attack in an IEC 61850 Substation. IEEE Trans. Smart Grid 9(5): 3954-3965 (2018) - [c4]Abdullah Albarakati, Bassam Moussa, Mourad Debbabi, Amr M. Youssef, Basile L. Agba, Marthe Kassouf:
OpenStack-Based Evaluation Framework for Smart Grid Cyber Security. SmartGridComm 2018: 1-6 - 2016
- [j2]Bassam Moussa, Mourad Debbabi, Chadi Assi:
Security Assessment of Time Synchronization Mechanisms for the Smart Grid. IEEE Commun. Surv. Tutorials 18(3): 1952-1973 (2016) - [c3]Parisa Akaber, Bassam Moussa, Mourad Debbabi, Chadi Assi:
Cascading link failure analysis in interdependent networks for maximal outages in smart grid. SmartGridComm 2016: 429-434 - 2015
- [c2]Bassam Moussa, Mourad Debbabi, Chadi Assi:
A detection and mitigation model for PTP delay attack in a smart grid substation. SmartGridComm 2015: 497-502 - 2014
- [j1]Haïdar Safa, Marcel Karam, Bassam Moussa:
PHAODV: Power aware heterogeneous routing protocol for MANETs. J. Netw. Comput. Appl. 46: 60-71 (2014) - 2013
- [c1]Haïdar Safa, Marcel Karam, Bassam Moussa:
A Novel Power Aware Heterogeneous Routing Protocol for MANETs. AINA 2013: 175-182
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:04 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint