Scholarly and Creative Works
2025
- Mokhtari Koushyar, J., Guirguis, M. S., & Atia, G. (n.d.). PuRe Defender: A Game-Theoretic Pull Request Assignment with Deep RL. In Conference on Game Theory and AI for Security (GameSec).
- Mokhtari Koushyar, J., Guirguis, M. S., & Atia, G. (n.d.). Topology-Aware Hybrid FDIA Against Third-Party Aggregators in Smart Grids. In IEEE SmartGridComm.
- Mokhtari Koushyar, J., Guirguis, M. S., & Atia, G. (2025). The Role of Aggregator Topology on the Impact of False Data Injection Attacks. In IEEE 11th International Conference on Intelligent Data and Security (IDS).
2024
- Mokhtari Koushyar, J., Guirguis, M. S., & Atia, G. (2024). Hindering Search and Rescue Missions with Selective Wireless Jamming Attacks. In IEEE Conference on Cognitive and Computational Aspects of Situation Management (CogSIMA). https://doi.org/10.1109/CogSIMA61085.2024.10553889
2020
- Tahsini, A., Dunstatter, N., Guirguis, M. S., & Ahmed, C. (2020). DeepBLOC: A Framework for Securing CPS through Deep Reinforcement Learning on Stochastic Games. In IEEE CNS.
2019
- Dunstatter, N., Tahsini, A., Guirguis, M. S., & Tešić, J. (2019). Solving Cyber Alert Allocation Markov Games With Deep Reinforcement Learning. In 10th Conference on Decision and Game Theory for Security (GameSec).
- Anwar, A., Kelly, J., Atia, G., & Guirguis, M. S. (2019). Pinball Attacks Against Dynamic Channel Assignment in Wireless Networks. Elsevier Journal of Computer Communications (COMCOM), 140–141.
- Anwar, A., Atia, G., & Guirguis, M. S. (2019). A Game-Theoretic Framework for the Virtual Machines Migration Timing Problem. IEEE Transactions on Cloud Computing.
2018
- Anwar, A., Atia, G., & Guirguis, M. S. (2018). Adaptive Topologies Against Jamming Attacks in Wireless Networks: A Game-Theoretic Approach. Journal of Network and Computer Applications.
- Anwar, A., Atia, G., & Guirguis, M. S. (2018). Towards a Protected Cloud Against Side Channel Attacks: A Game Theoretic Framework. In Allerton Conference on Communication, Control and Computing (Allerton).
- Anwar, A., Atia, G., & Guirguis, M. S. (2018). It’s Time to Migrate! A Game-Theoretic Framework for Protecting a Multi-tenant Cloud against Collocation Attacks. In IEEE International Conference on Cloud Computing (CLOUD).
- Novoa Ramirez, C. M., **Siddique, K., Guirguis, M. S., & *Tahsini, A. (2018). A Game-Theoretic Two-Stage Stochastic Programing Model to Protect CPS against Attacks. In IEEE 16th International Conference on Industrial Informatics (INDIN) (pp. 15–22).
- Dunstatter, N., Guirguis, M. S., & Tahsini, A. (2018). Markov Games in Allocating Security Analysts to Cyber Alerts. In National Cyber Summit (NCS).
- Guirguis, M. S., Tahsini, A., Siddique, K., Novoa Ramirez, C. M., Moore, J., Julien, C., & Dunstatter, N. (2018). BLOC: A Game-Theoretic Approach to Orchestrate CPS against Cyber Attacks. In IEEE Conference on Communications and Network Security (CNS).
2017
- Anwar, A., Atia, G., & Guirguis, M. S. (2017). Dynamic Game-Theoretic Defense Approach against Stealthy Jamming Attacks in Wireless Networks. In Allerton Conference on Communication, Control and Computing (Allerton).
- Schlenker, A., Xu, H., Guirguis, M. S., Kiekintveld, C., Sinha, A., … Tambe, M. (2017). Don’t Bury your Head in Warnings: A Game-Theoretic Approach for Intelligent Allocation of Cyber-security Alerts. In International Joint Conference on Artificial Intelligence (IJCAI).
- Guirguis, M. S., Gu, Q., Penner, T., Tammineni, L., Langford, T., Rivera-Longoria, A., … Van Slyke, B. (2017). Assignment and Collaborative Execution of Tasks on Transient Clouds. Springer Annals of Telecommunications.
- Schlenker, A., Xu, H., Kiekintveld, C., Sinha, A., Tambe, M., … Guirguis, M. S. (2017). Towards a Game-theoretic Framework for Intelligent Cyber-security Alert Allocation. In proceedings of the 3rd IJCAI workshop on Algorithmic Game Theory.
- Penner, T., & Guirguis, M. S. (2017). Combating the Bandits in the Cloud: A Moving Target Defense Approach. In IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID).
2016
- Tammineni, L., & Guirguis, M. S. (2016). Toward Local Overlay-based Mobile Clouds. In Smart Cloud Networks and Systems Confercence (SCNS).
- Anwar, A., Atia, G., & Guirguis, M. S. (2016). Game Theoretic Defense Approach to Wireless Networks Against Stealthy Decoy Attacks. In Allerton Conference on Communication, Control and Computing (Allerton).
- Ortiz, A. M., & Guirguis, M. S. (2016). Measuring the Impact of Unique Entry-Level Instructional Course Modules Designed to Inspire Computer Science Interest. In ASEE Annual Conference & Exposition.
- Kelly, J., Guirguis, M. S., & Atia, G. (2016). Pinball Attacks: Exploiting Channel Allocation in Wireless Networks. In IEEE International Conference on Communications (ICC).
2015
- Sciarrone, A., Bisio, I., Lavagetto, F., Penner, T., & Guirguis, M. S. (2015). Context Awareness over Transient Clouds. In IEEE Global Communications Conference (GLOBECOM).
- Sciarrone, A., Bisio, I., Lavagetto, F., Penner, T., & Guirguis, M. S. (2015). Context-Awareness over Transient Cloud in D2D networks: Energy Performance Analysis and Evaluation. Wiley Transactions on Emerging Telecommunications Technologies.
- Anwar, A., Kelly, J., Atia, G., & Guirguis, M. S. (2015). Stealthy Edge Decoy Attacks Against Dynamic Channel Assignment in Wireless Networks. In IEEE International Conference for Military Communications (Milcom).
- Hinze, H., Ruth, M., & Guirguis, M. S. (2015). Disrupting Adaptive Traffic Lights Cycles through Selective Jamming Attacks. In IEEE 81st Vehicular Technology Conference (VTC).
2014
- Gu, Q., & Guirguis, M. S. (2014). Secure Mobile Cloud Computing and Security Issues. In High Performance Cloud Auditing and Applications, Chapter 3. New York, NY: Springer.
- Penner, T., Johnson, A., Slyke, B., Guirguis, M. S., & Gu, Q. (2014). Transient Clouds: Assignment and Collaborative Execution of Tasks on Mobile Devices. In IEEE Global Communication Conference (Globecom).
- Penner, T., Johnson, A., Slyke, B., Guirguis, M. S., & Gu, Q. (2014). Demo: Transient Clouds. In EAI International Conference on Mobile Computing, Applications and Services (MobiCASE).
- Nguyen, V., Guirguis, M. S., & Atia, G. (2014). A Framework for Identifying Stealthy Attacks on Mobile CPS Applications. In Symposium on the Control of Network Systems (SCONES).
- Nguyen, V., Guirguis, M. S., & Atia, G. (2014). A Unifying Approach for the Identification of Application-driven Stealthy Attacks on Mobile CPS. In Allerton Conference on Communication, Control, and Computing (Allerton).
2013
- Langford, T., Gu, Q., Rivera-Longoria, A., & Guirguis, M. S. (2013). Collaborative Computing On-Demand: Harnessing Mobile Devices in Executing On-the-Fly Jobs. In IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS).
- Penner, T., Johnson, A., Guirguis, M. S., & Gu, Q. (2013). Transient Clouds: Assignment and Collaborative Execution of Tasks on Mobile Devices. In Grace Hopper Conference.
- Hanz, T., & Guirguis, M. S. (2013). An Abstraction Layer for Controlling Heterogeneous Mobile Cyber-Physical Systems. In IEEE International Conference on Automation Science and Engineering (CASE).
- Reynolds, D., & Guirguis, M. S. (2013). Control Theoretic Adaptive Monitoring Tools for the Android Platform. In IEEE International Workshop on Cloud Security Auditing.
- Guirguis, M. S., & Atia, G. (2013). Stuck in Traffic (SiT) Attacks: A Framework for Identifying Stealthy Attacks that Cause Traffic Congestion. In IEEE 77th Vehicular Technology Conference (VTC).
- Kelly, J., Richter, S., & Guirguis, M. S. (2013). Stealthy Attacks on Pheromone Swarming. In IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA).
2012
- Guirguis, E., Guirguis, M. S., & Halkude, N. (2012). A Case for Low-level Jamming Attacks on Mobile CPS in Target Tracking Applications. In International Symposium on Pervasive Systems, Algorithms, and Networks (ISPAN).
2011
- Guirguis, M. S., Ogden, R., Song, Z., Thapa, S., & Gu, Q. (2011). Can You Help Me Run These Code Segments on Your Mobile Device? In IEEE Global Communication Conference (Globecom).
- Page, C., Guirguis, E., & Guirguis, M. S. (2011). Performance Evaluation of Path Splicing on the GÉANT and the Sprint Networks. The Elsevier International Journal of Computer and Telecommunications Networking (COMNET), 55(17).
- Valdez, J., Guirguis, M. S., Wingate, D., & Rinkevich, R. (2011). An Expanding Reference Library for Peer-to-Peer Content. In APWG eCrime Researchers Summit (eCRS).
2010
- Connell, W., Tamir, D., & Guirguis, M. S. (2010). Lexical Steganography Using Prime Based Mimic Functions. The International Journal of Wireless Communications and Networking (IJWCN), 2(2).
- Guirguis, E., Guirguis, M. S., & Page, Christopher. (2010). SKWeak Attacks on Path Splicing: Vulnerability Assessment and Defense Mechanisms. In IEEE Global Communication Conference (Globecom).
- Guirguis, M. S., & Valdez, J. (2010). Traffic Shapping via Congestion Signals Delegation. The IARIA International Journal on Advances in Networks and Services, 3(3–4).
- Connell, W., Tamir, D., & Guirguis, M. S. (2010). Prime-based Mimic Functions for the Implementation of Covert Channels. In IEEE International Conference on Wireless Communication, Networking and Information Security (WCNIS).
2009
- Page, C., & Guirguis, M. S. (2009). On the Safety and Security of Path Splicing: A Case Study for Path Splicing on the GÉANT Network. In IEEE Global Communication Conference (Globecom).
- McArthur, C., & Guirguis, M. S. (2009). Stealthy IP Prefix Hijacking Attacks: Don’t Bite Off More than You can Chew. In IEEE Global Communication Conference (Globecom).
- Guirguis, M. S., Valdez, J., Lababedi, B. E., & Valdez, J. (2009). Burn Before Reading: A Stealthy Framework for Combating Forensics Investigations. In APWG eCrime Researchers Summit.
- Guirguis, M. S., & Goto, H. (2009). HELP:// Hypertext in-Emergency Leveraging Protocol. In IEEE International Conference on Communications (ICC).
- Guirguis, M. S., Tharp, J., Bestavros, A., & Matta, I. (2009). Assessment of Vulnerability of Content Adaptation Mechanisms to RoQ Attacks. In International Conference on Networking (ICN).
2008
- Guirguis, M. S., & Valdez, J. (2008). Masquerading a Wired Covert Channel into a Wireless-like Channel. In IEEE Workshop on Network Security and Privacy (NSP).
- McArthur, C., & Guirguis, M. S. (2008). Stealthy IP Prefix Hijacking. In ACM SIGCOMM.
- Valdez, J., & Guirguis, M. S. (2008). Liberating TCP: The Free and the Stunts. In International Conference on Networking (ICN).
2007
- Tharp, J., & Guirguis, M. S. (2007). Reduction of Quality Attacks on Content Adaptation Mechanisms. In Proceedings of IEEE/ACM Conference on Grid Computing (GRID).
- Guirguis, M. S., Bestavros, A., Matta, I., & Zhang, Y. (2007). Reduction of Quality (RoQ) Attacks on Dynamic Load Balancers: Vulnerability Assessment and Design Tradeoffs. In IEEE International Conference on Computer Communications (INFOCOM).
- Guirguis, M. S., Bestavros, A., Matta, I., & Zhang, Y. (2007). Adversarial Exploits of End-Systems Adaptation Dynamics. The Elsevier International Journal of Parallel and Distributed Computing (JPDC), 67(3).
2006
- Guirguis, M. S., Bestavros, A., & Matta, I. (2006). Exogenous-Loss Aware Traffic Management in Overlay Networks: Toward Global Fairness. The Elsevier Computer Networks Journal (COMNET), 50(13).
- Guirguis, M. S., Bestavros, A., & Matta, I. (2006). On the Impact of Low-Rate Attacks. In IEEE International Conference on Communications (ICC).
2005
- Zhang, Y., Bestavros, A., Guirguis, M. S., Matta, I., & West, R. (2005). Friendly Virtual Machines: Leveraging a Feedback-Control Model forApplication Adaptation. In ACM/USENIX Conference on Virtual Execution Environments (VEE).
- Guirguis, M. S., Bestavros, A., Matta, I., & Zhang, Y. (2005). Reduction of Quality (RoQ) Attacks on Internet End-Systems. In IEEE International Conference on Computer Communications (INFOCOM).
2004
- Guirguis, M. S., Bestavros, A., & Matta, I. (2004). Routing Tradeoffs inside a d-dimensional Torus with applicability to CAN. In International Computer Engineering Conference New Technologies for the Information Society (ICENCO).
- Guirguis, M. S., Bestavros, A., & Matta, I. (2004). Bandwidth Stealing via Link Targeted RoQ Attacks. In IASTED International Conference on Communication and Computer Networks (CCN).
- Diamant, G., Veytser, L., Matta, I., Bestavros, A., Guirguis, M. S., Guo, L., … Chen, S. (2004). itmBench: Generalized API for Internet Traffic Managers. In IEEE Globecom Workshop on Computer-Aided Modeling, Analysis and Design of Communication Links and Networks (CAMAD).
- Guirguis, M. S., Bestavros, A., & Matta, I. (2004). Exploiting the Transients of Adaptation for RoQ Attacks on Internet Resources. In IEEE International Conference on Network Protocols (ICNP).
- Guirguis, M. S., Bestavros, A., & Matta, I. (2004). Adaptation=Vulnerability: Under RoQ Attacks. In ACM SIGCOMM.
- Guirguis, M. S., Bestavros, A., Matta, I., Riga, N., Diamant, G., & Zhang, Y. (2004). Providing Soft Bandwidth Guarantees Using Elastic TCP-based Tunnels. In IEEE Symposium on Computer and Communications (ISCC).
2003
- Guirguis, M. S., Bestavros, A., & Matta, I. (2003). XQM: eXogenous-loss aware Queue Management. In IEEE International Conference on Network Protocols (ICNP).
- Guirguis, M. S., Bestavros, A., & Matta, I. (2003). On the Efficiency and Fairness of Transmission Control Loops: A Case for Exogenous Losses. Technical Report 2003-013. Boston University.