Portrait of Dr. Mina S Guirguis

Dr. Mina S Guirguis

  • Professor at Computer Science, College of Science & Engineering

Scholarly and Creative Works

2025

  • Mokhtari Koushyar, J., Guirguis, M. S., & Atia, G. (n.d.). PuRe Defender: A Game-Theoretic Pull Request Assignment with Deep RL. In Conference on Game Theory and AI for Security (GameSec).
  • Mokhtari Koushyar, J., Guirguis, M. S., & Atia, G. (n.d.). Topology-Aware Hybrid FDIA Against Third-Party Aggregators in Smart Grids. In IEEE SmartGridComm.
  • Mokhtari Koushyar, J., Guirguis, M. S., & Atia, G. (2025). The Role of Aggregator Topology on the Impact of False Data Injection Attacks. In IEEE 11th International Conference on Intelligent Data and Security (IDS).

2024

  • Mokhtari Koushyar, J., Guirguis, M. S., & Atia, G. (2024). Hindering Search and Rescue Missions with Selective Wireless Jamming Attacks. In IEEE Conference on Cognitive and Computational Aspects of Situation Management (CogSIMA). https://doi.org/10.1109/CogSIMA61085.2024.10553889

2020

  • Tahsini, A., Dunstatter, N., Guirguis, M. S., & Ahmed, C. (2020). DeepBLOC: A Framework for Securing CPS through Deep Reinforcement Learning on Stochastic Games. In IEEE CNS.

2019

  • Dunstatter, N., Tahsini, A., Guirguis, M. S., & Tešić, J. (2019). Solving Cyber Alert Allocation Markov Games With Deep Reinforcement Learning. In 10th Conference on Decision and Game Theory for Security (GameSec).
  • Anwar, A., Kelly, J., Atia, G., & Guirguis, M. S. (2019). Pinball Attacks Against Dynamic Channel Assignment in Wireless Networks. Elsevier Journal of Computer Communications (COMCOM), 140–141.
  • Anwar, A., Atia, G., & Guirguis, M. S. (2019). A Game-Theoretic Framework for the Virtual Machines Migration Timing Problem. IEEE Transactions on Cloud Computing.

2018

  • Anwar, A., Atia, G., & Guirguis, M. S. (2018). Adaptive Topologies Against Jamming Attacks in Wireless Networks: A Game-Theoretic Approach. Journal of Network and Computer Applications.
  • Anwar, A., Atia, G., & Guirguis, M. S. (2018). Towards a Protected Cloud Against Side Channel Attacks: A Game Theoretic Framework. In Allerton Conference on Communication, Control and Computing (Allerton).
  • Anwar, A., Atia, G., & Guirguis, M. S. (2018). It’s Time to Migrate! A Game-Theoretic Framework for Protecting a Multi-tenant Cloud against Collocation Attacks. In IEEE International Conference on Cloud Computing (CLOUD).
  • Novoa Ramirez, C. M., **Siddique, K., Guirguis, M. S., & *Tahsini, A. (2018). A Game-Theoretic Two-Stage Stochastic Programing Model to Protect CPS against Attacks. In IEEE 16th International Conference on Industrial Informatics (INDIN) (pp. 15–22).
  • Dunstatter, N., Guirguis, M. S., & Tahsini, A. (2018). Markov Games in Allocating Security Analysts to Cyber Alerts. In National Cyber Summit (NCS).
  • Guirguis, M. S., Tahsini, A., Siddique, K., Novoa Ramirez, C. M., Moore, J., Julien, C., & Dunstatter, N. (2018). BLOC: A Game-Theoretic Approach to Orchestrate CPS against Cyber Attacks. In IEEE Conference on Communications and Network Security (CNS).

2017

  • Anwar, A., Atia, G., & Guirguis, M. S. (2017). Dynamic Game-Theoretic Defense Approach against Stealthy Jamming Attacks in Wireless Networks. In Allerton Conference on Communication, Control and Computing (Allerton).
  • Schlenker, A., Xu, H., Guirguis, M. S., Kiekintveld, C., Sinha, A., … Tambe, M. (2017). Don’t Bury your Head in Warnings: A Game-Theoretic Approach for Intelligent Allocation of Cyber-security Alerts. In International Joint Conference on Artificial Intelligence (IJCAI).
  • Guirguis, M. S., Gu, Q., Penner, T., Tammineni, L., Langford, T., Rivera-Longoria, A., … Van Slyke, B. (2017). Assignment and Collaborative Execution of Tasks on Transient Clouds. Springer Annals of Telecommunications.
  • Schlenker, A., Xu, H., Kiekintveld, C., Sinha, A., Tambe, M., … Guirguis, M. S. (2017). Towards a Game-theoretic Framework for Intelligent Cyber-security Alert Allocation. In proceedings of the 3rd IJCAI workshop on Algorithmic Game Theory.
  • Penner, T., & Guirguis, M. S. (2017). Combating the Bandits in the Cloud: A Moving Target Defense Approach. In IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID).

2016

  • Tammineni, L., & Guirguis, M. S. (2016). Toward Local Overlay-based Mobile Clouds. In Smart Cloud Networks and Systems Confercence (SCNS).
  • Anwar, A., Atia, G., & Guirguis, M. S. (2016). Game Theoretic Defense Approach to Wireless Networks Against Stealthy Decoy Attacks. In Allerton Conference on Communication, Control and Computing (Allerton).
  • Ortiz, A. M., & Guirguis, M. S. (2016). Measuring the Impact of Unique Entry-Level Instructional Course Modules Designed to Inspire Computer Science Interest. In ASEE Annual Conference & Exposition.
  • Kelly, J., Guirguis, M. S., & Atia, G. (2016). Pinball Attacks: Exploiting Channel Allocation in Wireless Networks. In IEEE International Conference on Communications (ICC).

2015

  • Sciarrone, A., Bisio, I., Lavagetto, F., Penner, T., & Guirguis, M. S. (2015). Context Awareness over Transient Clouds. In IEEE Global Communications Conference (GLOBECOM).
  • Sciarrone, A., Bisio, I., Lavagetto, F., Penner, T., & Guirguis, M. S. (2015). Context-Awareness over Transient Cloud in D2D networks: Energy Performance Analysis and Evaluation. Wiley Transactions on Emerging Telecommunications Technologies.
  • Anwar, A., Kelly, J., Atia, G., & Guirguis, M. S. (2015). Stealthy Edge Decoy Attacks Against Dynamic Channel Assignment in Wireless Networks. In IEEE International Conference for Military Communications (Milcom).
  • Hinze, H., Ruth, M., & Guirguis, M. S. (2015). Disrupting Adaptive Traffic Lights Cycles through Selective Jamming Attacks. In IEEE 81st Vehicular Technology Conference (VTC).

2014

  • Gu, Q., & Guirguis, M. S. (2014). Secure Mobile Cloud Computing and Security Issues. In High Performance Cloud Auditing and Applications, Chapter 3. New York, NY: Springer.
  • Penner, T., Johnson, A., Slyke, B., Guirguis, M. S., & Gu, Q. (2014). Transient Clouds: Assignment and Collaborative Execution of Tasks on Mobile Devices. In IEEE Global Communication Conference (Globecom).
  • Penner, T., Johnson, A., Slyke, B., Guirguis, M. S., & Gu, Q. (2014). Demo: Transient Clouds. In EAI International Conference on Mobile Computing, Applications and Services (MobiCASE).
  • Nguyen, V., Guirguis, M. S., & Atia, G. (2014). A Framework for Identifying Stealthy Attacks on Mobile CPS Applications. In Symposium on the Control of Network Systems (SCONES).
  • Nguyen, V., Guirguis, M. S., & Atia, G. (2014). A Unifying Approach for the Identification of Application-driven Stealthy Attacks on Mobile CPS. In Allerton Conference on Communication, Control, and Computing (Allerton).

2013

  • Langford, T., Gu, Q., Rivera-Longoria, A., & Guirguis, M. S. (2013). Collaborative Computing On-Demand: Harnessing Mobile Devices in Executing On-the-Fly Jobs. In IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS).
  • Penner, T., Johnson, A., Guirguis, M. S., & Gu, Q. (2013). Transient Clouds: Assignment and Collaborative Execution of Tasks on Mobile Devices. In Grace Hopper Conference.
  • Hanz, T., & Guirguis, M. S. (2013). An Abstraction Layer for Controlling Heterogeneous Mobile Cyber-Physical Systems. In IEEE International Conference on Automation Science and Engineering (CASE).
  • Reynolds, D., & Guirguis, M. S. (2013). Control Theoretic Adaptive Monitoring Tools for the Android Platform. In IEEE International Workshop on Cloud Security Auditing.
  • Guirguis, M. S., & Atia, G. (2013). Stuck in Traffic (SiT) Attacks: A Framework for Identifying Stealthy Attacks that Cause Traffic Congestion. In IEEE 77th Vehicular Technology Conference (VTC).
  • Kelly, J., Richter, S., & Guirguis, M. S. (2013). Stealthy Attacks on Pheromone Swarming. In IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA).

2012

  • Guirguis, E., Guirguis, M. S., & Halkude, N. (2012). A Case for Low-level Jamming Attacks on Mobile CPS in Target Tracking Applications. In International Symposium on Pervasive Systems, Algorithms, and Networks (ISPAN).

2011

  • Guirguis, M. S., Ogden, R., Song, Z., Thapa, S., & Gu, Q. (2011). Can You Help Me Run These Code Segments on Your Mobile Device? In IEEE Global Communication Conference (Globecom).
  • Page, C., Guirguis, E., & Guirguis, M. S. (2011). Performance Evaluation of Path Splicing on the GÉANT and the Sprint Networks. The Elsevier International Journal of Computer and Telecommunications Networking (COMNET), 55(17).
  • Valdez, J., Guirguis, M. S., Wingate, D., & Rinkevich, R. (2011). An Expanding Reference Library for Peer-to-Peer Content. In APWG eCrime Researchers Summit (eCRS).

2010

  • Connell, W., Tamir, D., & Guirguis, M. S. (2010). Lexical Steganography Using Prime Based Mimic Functions. The International Journal of Wireless Communications and Networking (IJWCN), 2(2).
  • Guirguis, E., Guirguis, M. S., & Page, Christopher. (2010). SKWeak Attacks on Path Splicing: Vulnerability Assessment and Defense Mechanisms. In IEEE Global Communication Conference (Globecom).
  • Guirguis, M. S., & Valdez, J. (2010). Traffic Shapping via Congestion Signals Delegation. The IARIA International Journal on Advances in Networks and Services, 3(3–4).
  • Connell, W., Tamir, D., & Guirguis, M. S. (2010). Prime-based Mimic Functions for the Implementation of Covert Channels. In IEEE International Conference on Wireless Communication, Networking and Information Security (WCNIS).

2009

  • Page, C., & Guirguis, M. S. (2009). On the Safety and Security of Path Splicing: A Case Study for Path Splicing on the GÉANT Network. In IEEE Global Communication Conference (Globecom).
  • McArthur, C., & Guirguis, M. S. (2009). Stealthy IP Prefix Hijacking Attacks: Don’t Bite Off More than You can Chew. In IEEE Global Communication Conference (Globecom).
  • Guirguis, M. S., Valdez, J., Lababedi, B. E., & Valdez, J. (2009). Burn Before Reading: A Stealthy Framework for Combating Forensics Investigations. In APWG eCrime Researchers Summit.
  • Guirguis, M. S., & Goto, H. (2009). HELP:// Hypertext in-Emergency Leveraging Protocol. In IEEE International Conference on Communications (ICC).
  • Guirguis, M. S., Tharp, J., Bestavros, A., & Matta, I. (2009). Assessment of Vulnerability of Content Adaptation Mechanisms to RoQ Attacks. In International Conference on Networking (ICN).

2008

  • Guirguis, M. S., & Valdez, J. (2008). Masquerading a Wired Covert Channel into a Wireless-like Channel. In IEEE Workshop on Network Security and Privacy (NSP).
  • McArthur, C., & Guirguis, M. S. (2008). Stealthy IP Prefix Hijacking. In ACM SIGCOMM.
  • Valdez, J., & Guirguis, M. S. (2008). Liberating TCP: The Free and the Stunts. In International Conference on Networking (ICN).

2007

  • Tharp, J., & Guirguis, M. S. (2007). Reduction of Quality Attacks on Content Adaptation Mechanisms. In Proceedings of IEEE/ACM Conference on Grid Computing (GRID).
  • Guirguis, M. S., Bestavros, A., Matta, I., & Zhang, Y. (2007). Reduction of Quality (RoQ) Attacks on Dynamic Load Balancers: Vulnerability Assessment and Design Tradeoffs. In IEEE International Conference on Computer Communications (INFOCOM).
  • Guirguis, M. S., Bestavros, A., Matta, I., & Zhang, Y. (2007). Adversarial Exploits of End-Systems Adaptation Dynamics. The Elsevier International Journal of Parallel and Distributed Computing (JPDC), 67(3).

2006

  • Guirguis, M. S., Bestavros, A., & Matta, I. (2006). Exogenous-Loss Aware Traffic Management in Overlay Networks: Toward Global Fairness. The Elsevier Computer Networks Journal (COMNET), 50(13).
  • Guirguis, M. S., Bestavros, A., & Matta, I. (2006). On the Impact of Low-Rate Attacks. In IEEE International Conference on Communications (ICC).

2005

  • Zhang, Y., Bestavros, A., Guirguis, M. S., Matta, I., & West, R. (2005). Friendly Virtual Machines: Leveraging a Feedback-Control Model forApplication Adaptation. In ACM/USENIX Conference on Virtual Execution Environments (VEE).
  • Guirguis, M. S., Bestavros, A., Matta, I., & Zhang, Y. (2005). Reduction of Quality (RoQ) Attacks on Internet End-Systems. In IEEE International Conference on Computer Communications (INFOCOM).

2004

  • Guirguis, M. S., Bestavros, A., & Matta, I. (2004). Routing Tradeoffs inside a d-dimensional Torus with applicability to CAN. In International Computer Engineering Conference New Technologies for the Information Society (ICENCO).
  • Guirguis, M. S., Bestavros, A., & Matta, I. (2004). Bandwidth Stealing via Link Targeted RoQ Attacks. In IASTED International Conference on Communication and Computer Networks (CCN).
  • Diamant, G., Veytser, L., Matta, I., Bestavros, A., Guirguis, M. S., Guo, L., … Chen, S. (2004). itmBench: Generalized API for Internet Traffic Managers. In IEEE Globecom Workshop on Computer-Aided Modeling, Analysis and Design of Communication Links and Networks (CAMAD).
  • Guirguis, M. S., Bestavros, A., & Matta, I. (2004). Exploiting the Transients of Adaptation for RoQ Attacks on Internet Resources. In IEEE International Conference on Network Protocols (ICNP).
  • Guirguis, M. S., Bestavros, A., & Matta, I. (2004). Adaptation=Vulnerability: Under RoQ Attacks. In ACM SIGCOMM.
  • Guirguis, M. S., Bestavros, A., Matta, I., Riga, N., Diamant, G., & Zhang, Y. (2004). Providing Soft Bandwidth Guarantees Using Elastic TCP-based Tunnels. In IEEE Symposium on Computer and Communications (ISCC).

2003

  • Guirguis, M. S., Bestavros, A., & Matta, I. (2003). XQM: eXogenous-loss aware Queue Management. In IEEE International Conference on Network Protocols (ICNP).
  • Guirguis, M. S., Bestavros, A., & Matta, I. (2003). On the Efficiency and Fairness of Transmission Control Loops: A Case for Exogenous Losses. Technical Report 2003-013. Boston University.