default search action
Mustafa Abdallah
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j12]Mohammad Ryiad Al-Eiadeh, Mustafa Abdallah:
PR-DRA: PageRank-based defense resource allocation methods for securing interdependent systems modeled by attack graphs. Int. J. Inf. Sec. 24(1): 50 (2025) - 2024
- [j11]Osvaldo Arreche, Tanish R. Guntur, Jack W. Roberts, Mustafa Abdallah:
E-XAI: Evaluating Black-Box Explainable AI Frameworks for Network Intrusion Detection. IEEE Access 12: 23954-23988 (2024) - [j10]Sazid Nazat, Lingxi Li, Mustafa Abdallah:
XAI-ADS: An Explainable Artificial Intelligence Framework for Enhancing Anomaly Detection in Autonomous Driving Systems. IEEE Access 12: 48583-48607 (2024) - [j9]Md. Reya Shad Azim, Timothy N. Cason, Mustafa Abdallah:
A Quantal Response Analysis of Human Decision-Making in Interdependent Security Games Modeled by Attack Graphs. IEEE Access 12: 56159-56178 (2024) - [j8]Anna Namrita Gummadi, Jerry C. Napier, Mustafa Abdallah:
XAI-IoT: An Explainable AI Framework for Enhancing Anomaly Detection in IoT Systems. IEEE Access 12: 71024-71054 (2024) - [j7]Osvaldo Arreche, Ismail Bibers, Mustafa Abdallah:
A Two-Level Ensemble Learning Framework for Enhancing Network Intrusion Detection Systems. IEEE Access 12: 83830-83857 (2024) - [j6]Mohammad Ryiad Al-Eiadeh, Mustafa Abdallah:
GeniGraph: A genetic-based novel security defense resource allocation method for interdependent systems modeled by attack graphs. Comput. Secur. 144: 103927 (2024) - [j5]Sazid Nazat, Osvaldo Arreche, Mustafa Abdallah:
On Evaluating Black-Box Explainable AI Methods for Enhancing Anomaly Detection in Autonomous Driving Systems. Sensors 24(11): 3515 (2024) - [c14]Md. Reya Shad Azim, Mustafa Abdallah:
A Quantal Response Analysis of Simultaneous Multi-Target Attacker-Defender Security Games. NOMS 2024: 1-6 - [i17]Md. Reya Shad Azim, Mustafa Abdallah:
A Quantal Response Analysis of Defender-Attacker Sequential Security Games. CoRR abs/2408.00964 (2024) - [i16]Xiang Li, Mustafa Abdallah, Yuan-Yao Lou, Mung Chiang, Kwang Taik Kim, Saurabh Bagchi:
Dynamic DAG-Application Scheduling for Multi-Tier Edge Computing in Heterogeneous Networks. CoRR abs/2409.10839 (2024) - [i15]Osvaldo Arreche, Tanish R. Guntur, Mustafa Abdallah:
XAI-based Feature Selection for Improved Network Intrusion Detection Systems. CoRR abs/2410.10050 (2024) - [i14]Sazid Nazat, Mustafa Abdallah:
XAI-based Feature Ensemble for Enhanced Anomaly Detection in Autonomous Driving Systems. CoRR abs/2410.15405 (2024) - [i13]Ismail Bibers, Osvaldo Arreche, Mustafa Abdallah:
A Comprehensive Comparative Study of Individual ML Models and Ensemble Strategies for Network Intrusion Detection Systems. CoRR abs/2410.15597 (2024) - [i12]Xiang Li, Cheng Chen, Yuan-Yao Lou, Mustafa Abdallah, Kwang Taik Kim, Saurabh Bagchi:
HopTrack: A Real-time Multi-Object Tracking System for Embedded Devices. CoRR abs/2411.00608 (2024) - 2023
- [j4]Mustafa Abdallah, Byung-Gun Joung, Wo Jae Lee, Charilaos Mousoulis, Nithin Raghunathan, Ali Shakouri, John W. Sutherland, Saurabh Bagchi:
Anomaly Detection and Inter-Sensor Transfer Learning on Smart Manufacturing Datasets. Sensors 23(1): 486 (2023) - [c13]Ashish Ahire, Mustafa Abdallah:
Reinforcement Learning for Enhancing Human Security Resource Allocation in Protecting Assets with Heterogeneous Losses. SAT-CPS@CODASPY 2023: 9-15 - [c12]Sazid Nazat, Mustafa Abdallah:
Anomaly Detection Framework for Securing Next Generation Networks of Platoons of Autonomous Vehicles in a Vehicle-to-Everything System. CPSS@AsiaCCS 2023: 24-35 - [c11]Mustafa Abdallah, Qin Hu:
Should I Regret More? A Regret-based Multi-round Learning with Behavioral Human Players in a Multi-Target Security Game. ECC 2023: 1-6 - [i11]Xiang Li, Mustafa Abdallah, Shikhar Suryavansh, Mung Chiang, Saurabh Bagchi:
DAG-based Task Orchestration for Edge Computing. CoRR abs/2301.09278 (2023) - [i10]Mustafa Abdallah, Saurabh Bagchi, Shaunak D. Bopardikar, Kevin Chan, Xing Gao, Murat Kantarcioglu, Congmiao Li, Peng Liu, Quanyan Zhu:
Game Theory in Distributed Systems Security: Foundations, Challenges, and Future Directions. CoRR abs/2309.01281 (2023) - 2022
- [c10]Mustafa Abdallah, Ryan A. Rossi, Kanak Mahadik, Sungchul Kim, Handong Zhao, Saurabh Bagchi:
AutoForecast: Automatic Time-Series Forecasting Model Selection. CIKM 2022: 5-14 - [c9]Mustafa Abdallah, Daniel Woods, Parinaz Naghizadeh, Issa Khalil, Timothy N. Cason, Shreyas Sundaram, Saurabh Bagchi:
TASHAROK: Using Mechanism Design for Enhancing Security Resource Allocation in Interdependent Systems. SP 2022: 249-266 - [c8]Xiang Li, Mustafa Abdallah, Shikhar Suryavansh, Mung Chiang, Kwang Taik Kim, Saurabh Bagchi:
DAG-based Task Orchestration for Edge Computing. SRDS 2022: 23-34 - [i9]Mustafa Abdallah, Byung-Gun Joung, Wo Jae Lee, Charilaos Mousoulis, John W. Sutherland, Saurabh Bagchi:
Anomaly Detection and Inter-Sensor Transfer Learning on Smart Manufacturing Datasets. CoRR abs/2206.06355 (2022) - 2021
- [j3]Baibhab Chatterjee, Dong-Hyun Seo, Shramana Chakraborty, Shitij Avlani, Xiaofan Jiang, Heng Zhang, Mustafa Abdallah, Nithin Raghunathan, Charilaos Mousoulis, Ali Shakouri, Saurabh Bagchi, Dimitrios Peroulis, Shreyas Sen:
Context-Aware Collaborative Intelligence With Spatio-Temporal In-Sensor-Analytics for Efficient Communication in a Large-Area IoT Testbed. IEEE Internet Things J. 8(8): 6800-6814 (2021) - [c7]Mustafa Abdallah, Daniel Woods, Parinaz Naghizadeh, Issa Khalil, Timothy N. Cason, Shreyas Sundaram, Saurabh Bagchi:
Morshed: Guiding Behavioral Decision-Makers towards Better Security Investment in Interdependent Systems. AsiaCCS 2021: 378-392 - [c6]Mustafa Abdallah, Timothy N. Cason, Saurabh Bagchi, Shreyas Sundaram:
The Effect of Behavioral Probability Weighting in a Simultaneous Multi-Target Attacker-Defender Game. ECC 2021: 933-938 - [c5]Mustafa Abdallah, Sayan Mitra, Shreyas Sundaram, Saurabh Bagchi:
HIOA-CPS: Combining Hybrid Input-Output Automaton and Game Theory for Security Modeling of Cyber-Physical Systems. SP (Workshops) 2021: 253-259 - [i8]Mustafa Abdallah, Wo Jae Lee, Nithin Raghunathan, Charilaos Mousoulis, John W. Sutherland, Saurabh Bagchi:
Anomaly Detection through Transfer Learning in Agriculture and Manufacturing IoT Systems. CoRR abs/2102.05814 (2021) - [i7]Mustafa Abdallah, Timothy N. Cason, Saurabh Bagchi, Shreyas Sundaram:
The Effect of Behavioral Probability Weighting in a Simultaneous Multi-Target Attacker-Defender Game. CoRR abs/2103.03392 (2021) - 2020
- [j2]Mustafa Abdallah, Parinaz Naghizadeh, Ashish Ranjan Hota, Timothy N. Cason, Saurabh Bagchi, Shreyas Sundaram:
Behavioral and Game-Theoretic Security Investments in Interdependent Systems Modeled by Attack Graphs. IEEE Trans. Control. Netw. Syst. 7(4): 1585-1596 (2020) - [c4]Mustafa Abdallah, Timothy N. Cason, Saurabh Bagchi, Shreyas Sundaram:
The Effect of Behavioral Probability Weighting in a Sequential Defender-Attacker Game. CDC 2020: 3255-3260 - [i6]Mustafa Abdallah, Parinaz Naghizadeh, Ashish Ranjan Hota, Timothy N. Cason, Saurabh Bagchi, Shreyas Sundaram:
Behavioral and Game-Theoretic Security Investments in Interdependent Systems Modeled by Attack Graphs. CoRR abs/2001.03213 (2020) - [i5]Mustafa Abdallah, Daniel Woods, Parinaz Naghizadeh, Issa Khalil, Timothy N. Cason, Shreyas Sundaram, Saurabh Bagchi:
BASCPS: How does behavioral decision making impact the security of cyber-physical systems? CoRR abs/2004.01958 (2020) - [i4]Baibhab Chatterjee, Dong-Hyun Seo, Shramana Chakraborty, Shitij Avlani, Xiaofan Jiang, Heng Zhang, Mustafa Abdallah, Nithin Raghunathan, Charilaos Mousoulis, Ali Shakouri, Saurabh Bagchi, Dimitrios Peroulis, Shreyas Sen:
Context-Aware Collaborative-Intelligence with Spatio-Temporal In-Sensor-Analytics for Efficient Communication in a Large-Area IoT Testbed. CoRR abs/2005.13003 (2020) - [i3]Mustafa Abdallah, Daniel Woods, Parinaz Naghizadeh, Issa Khalil, Timothy N. Cason, Shreyas Sundaram, Saurabh Bagchi:
Morshed: Guiding Behavioral Decision-Makers towards Better Security Investment in Interdependent Systems. CoRR abs/2011.06933 (2020) - [i2]Mustafa Abdallah, Sayan Mitra, Shreyas Sundaram, Saurabh Bagchi:
Combining Hybrid Input-Output Automaton and Game Theory for Security Modeling of Cyber-Physical Systems. CoRR abs/2012.00788 (2020)
2010 – 2019
- 2019
- [c3]Mustafa Abdallah, Parinaz Naghizadeh, Ashish Ranjan Hota, Timothy N. Cason, Saurabh Bagchi, Shreyas Sundaram:
The Impacts of Behavioral Probability Weighting on Security Investments in Interdependent Systems. ACC 2019: 5260-5265 - [c2]Mustafa Abdallah, Parinaz Naghizadeh, Timothy N. Cason, Saurabh Bagchi, Shreyas Sundaram:
Protecting Assets with Heterogeneous Valuations under Behavioral Probability Weighting. CDC 2019: 5374-5379 - 2018
- [j1]Mubarak Al-Marri, Hazem M. Raafat, Mustafa Abdallah, Sherif M. Abdou, Mohsen A. Rashwan:
Computer Aided Qur'an Pronunciation using DNN. J. Intell. Fuzzy Syst. 34(5): 3257-3271 (2018) - [i1]Mustafa Abdallah, Ashraf Mahgoub, Saurabh Bagchi, Somali Chaterji:
ATHENA: Automated Tuning of Genomic Error Correction Algorithms using Language Models. CoRR abs/1812.11467 (2018) - 2016
- [c1]Mohamed S. Elaraby, Mustafa Abdallah, Sherif M. Abdou, Mohsen A. Rashwan:
A Deep Neural Networks (DNN) Based Models for a Computer Aided Pronunciation Learning System. SPECOM 2016: 51-58
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:23 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint