First name
Last name
Abbas, W., Vorobeychik, Y., & Koutsoukos, X. (2014). Resilient Consensus Protocol in the Presence of Trusted Nodes. th IEEE International Symposium on Resilient Control Systems. IEEE.
Abbas, W., Laszka, A., & Koutsoukos, X. (2015). Resilient Wireless Sensor Networks for Cyber-Physical Systems. In Cyber-Physical System Design with Sensor Networking Technologies. The Institution of Engineering and Technology (IET).
Abbas, W., Bhatia, S., Vorobeychik, Y., & Koutsoukos, X. (2014). Immunization Against Infection Propagation In Heterogeneous Networks. 13th IEEE International Symposium on Network Computing & Applications. Cambridge, MA.
Ghafouri, A., Abbas, W., Vorobeychik, Y., & Koutsoukos, X. (2016). Vulnerability of fixed-time control of signalized intersections to cyber-tampering. In Resilience Week (RWS). Chicago, IL: IEEE. (Original work published 08/2016AD)
Abbas, W., Perelman, L., Amin, S., & Koutsoukos, X. (2015). An Efficient Approach to Fault Identification in Urban Water Networks Using Multi-Level Sensing. In 2nd ACM International Conference on Embedded Systems for Energy-Efficient Built Environments (BuildSys 2015). Seoul, South Korea: ACM. (Original work published 11/2015AD)
Abbas, W., Laszka, A., Vorobeychik, Y., & Koutsoukos, X. (2015). Scheduling Intrusion Detection Systems in Resource-Bounded Cyber-Physical Systems. In ACM Workshop on Cyber-Physical Systems Security & Privacy (in Conjunction with 22nd ACM Conference on Computer and Communications Security (CCS)). Denver, CO: ACM. (Original work published 09/2015AD)
Abbas, W., Bhatia, S., & Koutsoukos, X. (2015). Guarding Networks Through Heterogeneous Mobile Guards. American Control Conference. Chicago, IL: IEEE. (Original work published 07/2015AD)
Abbas, W., & Koutsoukos, X. (2015). Efficient Complete Coverage Through Heterogeneous Sensing Nodes. Ieee Wireless Communication Letters, 4. (Original work published 02/2015AD)
Ghafouri, A., Abbas, W., Laszka, A., Vorobeychik, Y., & Koutsoukos, X. (2016). Optimal thresholds for anomaly-based intrusion detection in dynamical environments. In 7th Conference on Decision and Game Theory for Security (GameSec 2016). (Original work published 11/2016AD)