Skip to main content

Showing 1–10 of 10 results for author: Eldosouky, A

.
  1. arXiv:2209.06384  [pdf, other

    cs.NI

    Open Source Horizontal IoT Platforms: A Comparative Study on Functional Requirements

    Authors: Ali Farhat, Abdelrahman Eldosouky, Jason Jaskolka, Mohamed Ibnkahla, Ashraf Matrawy

    Abstract: The growth in the deployment of Internet of Things (IoT) devices in various industries required the use of IoT platforms to manage, automate and control devices. This introduced different commercial and open source IoT platforms for developers and researchers to deploy. As a result, selecting one of these platforms for a specific application and use case became a challenge. In this study, a guidel… ▽ More

    Submitted 13 September, 2022; originally announced September 2022.

  2. arXiv:2101.12442  [pdf, other

    cs.GT cs.CR

    Finding the Sweet Spot for Data Anonymization: A Mechanism Design Perspective

    Authors: Abdelrahman Eldosouky, Tapadhir Das, Anuraag Kotra, Shamik Sengupta

    Abstract: Data sharing between different organizations is an essential process in today's connected world. However, recently there were many concerns about data sharing as sharing sensitive information can jeopardize users' privacy. To preserve the privacy, organizations use anonymization techniques to conceal users' sensitive data. However, these techniques are vulnerable to de-anonymization attacks which… ▽ More

    Submitted 29 January, 2021; originally announced January 2021.

  3. arXiv:2007.05904  [pdf, other

    cs.GT eess.SY

    Interdependence-Aware Game-Theoretic Framework for Secure Intelligent Transportation Systems

    Authors: Aidin Ferdowsi, Abdelrahman Eldosouky, Walid Saad

    Abstract: The operation of future intelligent transportation systems (ITSs), communications infrastructure (CI), and power grids (PGs) will be highly interdependent. In particular, autonomous connected vehicles require CI resources to operate, and, thus, communication failures can result in non-optimality in the ITS flow in terms of traffic jams and fuel consumption. Similarly, CI components, e.g., base sta… ▽ More

    Submitted 12 July, 2020; originally announced July 2020.

    Comments: 11 pages, 10 figures

  4. arXiv:1905.04829  [pdf

    cond-mat.mtrl-sci

    Recycling of SmCo5 magnets by HD process

    Authors: A. Eldosouky, I. Skulj

    Abstract: Hydrogen decrepitation process has been applied for the first time for the direct recycling of SmCo5 magnets. Industrially produced sintered SmCo5 magnets were decrepitated by hydrogen gas at a pressure of 1 bar to 9.5 bar at room temperature in a planetary rotating jar. After decrepitation, the starting sintered magnets were reduced to a powder with a particle size of less than 200 microns. The p… ▽ More

    Submitted 12 May, 2019; originally announced May 2019.

  5. arXiv:1904.11568  [pdf, other

    eess.SY cs.GT

    Drones in Distress: A Game-Theoretic Countermeasure for Protecting UAVs Against GPS Spoofing

    Authors: AbdelRahman Eldosouky, Aidin Ferdowsi, Walid Saad

    Abstract: One prominent security threat that targets unmanned aerial vehicles (UAVs) is the capture via GPS spoofing in which an attacker manipulates a UAV's global positioning system (GPS) signals in order to capture it. Given the anticipated widespread deployment of UAVs for various purposes, it is imperative to develop new security solutions against such attacks. In this paper, a mathematical framework i… ▽ More

    Submitted 28 December, 2019; v1 submitted 16 April, 2019; originally announced April 2019.

    Comments: Accepted to IEEE Internet of Things Journal

  6. arXiv:1805.12347  [pdf

    cond-mat.mtrl-sci

    Hydrogen Decrepitation and Spark Plasma Sintering to Produce Recycled SmCo5 Magnets With High Coercivity

    Authors: Anas Eldosouky, Awais Ikram, Muhammad Farhan Mehmood, Xuan Xu, Saso Sturm, Kristina Zuzek Rozman, Irena Skulj

    Abstract: Spark plasma sintering (SPS) technique is applied in combination with hydrogen decrepitation process for the recycling of SmCo5 magnets. The SmCo5 magnets for recycling were first decrepitated by hydrogen gas of a pressure of 4 bar for 3 hours to produce decrepitated powder. This powder was then used to prepare isotropic sintered magnets using the SPS technique, by sintering at 800-1000 oC for 1 m… ▽ More

    Submitted 31 May, 2018; originally announced May 2018.

    Comments: 5 pages, 5 figures, 2 tables, conference

    Journal ref: A. Eldosouky, A. Ikram, M. F. Mehmood, X. Xu, S. Sturm, K. Z. Rozman, I. Skulj, IEEE Magn. Lett. 9, 1 (2018)

  7. arXiv:1805.10424  [pdf, other

    cs.IT

    Environment-Aware Deployment of Wireless Drones Base Stations with Google Earth Simulator

    Authors: Aaron French, Mohammad Mozaffari, Abdelrahman Eldosouky, Walid Saad

    Abstract: In this paper, a software-based simulator for the deployment of base station-equipped unmanned aerial vehicles (UAVs) in a cellular network is proposed. To this end, the Google Earth Engine platform and its included image processing functions are used to collect geospatial data and to identify obstacles that can disrupt the line-of-sight (LoS) communications between UAVs and ground users. Given su… ▽ More

    Submitted 26 May, 2018; originally announced May 2018.

  8. arXiv:1709.00303  [pdf, other

    math.OC

    Resilient Critical Infrastructure: Bayesian Network Analysis and Contract-Based Optimization

    Authors: AbdelRahman Eldosouky, Walid Saad, Narayan Mandayam

    Abstract: Instilling resilience in critical infrastructure (CI) such as dams or power grids is a major challenge for tomorrow's cities and communities. Resilience, here, pertains to a CI's ability to adapt or rapidly recover from disruptive events. In this paper, the problem of optimizing and managing the resilience of CIs is studied. In particular, a comprehensive two-fold framework is proposed to improve… ▽ More

    Submitted 30 August, 2017; originally announced September 2017.

  9. arXiv:1702.06436  [pdf, ps, other

    cs.CR cs.GT

    Contract-Theoretic Resource Allocation for Critical Infrastructure Protection

    Authors: AbdelRahman Eldosouky, Walid Saad, Charles Kamhoua, and Kevin Kwiat

    Abstract: Critical infrastructure protection (CIP) is envisioned to be one of the most challenging security problems in the coming decade. One key challenge in CIP is the ability to allocate resources, either personnel or cyber, to critical infrastructures with different vulnerability and criticality levels. In this work, a contract-theoretic approach is proposed to solve the problem of resource allocation… ▽ More

    Submitted 21 February, 2017; originally announced February 2017.

    Comments: Accepted in IEEE GLOBECOM 2015

  10. Single Controller Stochastic Games for Optimized Moving Target Defense

    Authors: AbdelRahman Eldosouky, Walid Saad, Dusit Niyato

    Abstract: Moving target defense (MTD) techniques that enable a system to randomize its configuration to thwart prospective attacks are an effective security solution for tomorrow's wireless networks. However, there is a lack of analytical techniques that enable one to quantify the benefits and tradeoffs of MTDs. In this paper, a novel approach for implementing MTD techniques that can be used to randomize cr… ▽ More

    Submitted 12 October, 2016; originally announced October 2016.

    Comments: Accepted in IEEE ICC 2016