Feasibility of time-synchronization attacks against PMU-based state estimation E Shereen, M Delcourt, S Barreto, G Dán, JY Le Boudec, M Paolone IEEE Transactions on Instrumentation and Measurement 69 (6), 3412-3427, 2019 | 46 | 2019 |
Model-based and data-driven detectors for time synchronization attacks against PMUs E Shereen, G Dán IEEE Journal on Selected Areas in Communications 38 (1), 169-179, 2019 | 34 | 2019 |
Next steps in security for time synchronization: Experiences from implementing IEEE 1588 v2. 1 E Shereen, F Bitard, G Dán, T Sel, S Fries 2019 IEEE International Symposium on Precision Clock Synchronization for …, 2019 | 33 | 2019 |
Detection and localization of pmu time synchronization attacks via graph signal processing E Shereen, R Ramakrishna, G Dán IEEE Transactions on Smart Grid 13 (4), 3241-3254, 2022 | 21 | 2022 |
Adversarial attacks on continuous authentication security: A dynamic game approach S Sarıtaş, E Shereen, H Sandberg, G Dán International Conference on Decision and Game Theory for Security, 439-458, 2019 | 16 | 2019 |
Time-synchronization attack detection in unbalanced three-phase systems M Delcourt, E Shereen, G Dän, JY Le Boudec, M Paolone IEEE Transactions on Smart Grid 12 (5), 4460-4470, 2021 | 13 | 2021 |
A continuum of undetectable timing-attacks on PMU-based linear state-estimation SB Andrade, JY Le Boudec, E Shereen, G Dán, M Pignati, M Paolone 2017 IEEE International Conference on Smart Grid Communications …, 2017 | 8 | 2017 |
A reinforcement learning approach to undetectable attacks against automatic generation control E Shereen, K Kazari, G Dán IEEE Transactions on Smart Grid 15 (1), 959-972, 2023 | 7 | 2023 |
Report success probability/battery liftime analysis of dense IEEE 802.15. 4-based metering networks with hidden nodes T Elshabrawy, E Shereen, M Ashour, J Robert IEEE Sensors Journal 17 (7), 2259-2266, 2017 | 7 | 2017 |
Network-aware mitigation of undetectable PMU time synchronization attacks E Shereen, G Dán 2020 IEEE International Conference on Communications, Control, and Computing …, 2020 | 5 | 2020 |
Correlation-based detection of PMU time synchronization attacks E Shereen, G Dán 2018 IEEE International Conference on Communications, Control, and Computing …, 2018 | 4 | 2018 |
Decentralized Anomaly Detection in Cooperative Multi-Agent Reinforcement Learning. K Kazari, E Shereen, G Dán IJCAI, 162-170, 2023 | 2 | 2023 |
Security of time synchronization for PMU-based power system state estimation: Vulnerabilities and countermeasures E Shereen KTH Royal Institute of Technology, 2021 | 2 | 2021 |
Throughput evaluation of dynamic frame slotted aloha for spatially distributed rfid tags T Elshabrawy, E Shereen, M Ashour 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall), 1-5, 2016 | 2 | 2016 |
Network Topology-aware Mitigation of Undetectable PMU Time Synchronization Attacks E Shereen, G Dán IEEE Transactions on Control of Network Systems, 2024 | 1 | 2024 |
Continuous authentication security games S Sarıtaş, E Shereen, H Sandberg, G Dán Game Theory and Machine Learning for Cyber Security, 180-203, 2021 | 1 | 2021 |
Detecting Web Application DAST Attacks with Machine Learning P Shahrivar, S Millar, E Shereen 2023 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2023 | | 2023 |
Adversarial Robustness of Multi-agent Reinforcement Learning Secondary Control of Islanded Inverter-based AC Microgrids E Shereen, K Kazari, G Dán 2023 IEEE International Conference on Communications, Control, and Computing …, 2023 | | 2023 |
Continuous Authentication Security Games S Sar𝚤tas, E Shereen, H Sandberg, G Dán Game Theory and Machine Learning for Cyber Security, 2021 | | 2021 |
On the impact of RN16 decoding errors on time throughput of RFID systems E Shereen, T Elshabrawy, M Ashour 2016 IEEE Wireless Communications and Networking Conference, 1-6, 2016 | | 2016 |