Assessing cyber risk in cyber-physical systems using the ATT&CK framework A Amro, V Gkioulos, S Katsikas ACM Transactions on Privacy and Security 26 (2), 1-33, 2023 | 29 | 2023 |
Cyber risk management for autonomous passenger ships using threat-informed defense-in-depth A Amro, V Gkioulos International Journal of Information Security 22 (1), 249-288, 2023 | 18 | 2023 |
Communication architecture for autonomous passenger ship A Amro, V Gkioulos, S Katsikas Proceedings of the Institution of Mechanical Engineers, Part O: Journal of …, 2023 | 17 | 2023 |
Assessing cyber risks of an INS using the MITRE ATT&CK framework A Oruc, A Amro, V Gkioulos Sensors 22 (22), 8745, 2022 | 16 | 2022 |
Connect and protect: Requirements for maritime autonomous surface ship in urban passenger transportation A Amro, V Gkioulos, S Katsikas Computer Security: ESORICS 2019 International Workshops, CyberICPS, SECPRE …, 2020 | 16 | 2020 |
Navigation data anomaly analysis and detection A Amro, A Oruc, V Gkioulos, S Katsikas Information 13 (3), 104, 2022 | 14 | 2022 |
Impact of cyber risk on the safety of the MilliAmpere2 Autonomous Passenger Ship A Amro, G Kavallieratos, K Louzis, CA Thieme The 3rd International Conference on Maritime Autonomous Surface Ship (ICMASS …, 2020 | 10 | 2020 |
From click to sink: Utilizing ais for command and control in maritime cyber attacks A Amro, V Gkioulos European Symposium on Research in Computer Security, 535-553, 2022 | 9 | 2022 |
Evaluation of a cyber risk assessment approach for cyber–physical systems: Maritime-and energy-use cases A Amro, V Gkioulos Journal of Marine Science and Engineering 11 (4), 744, 2023 | 6 | 2023 |
Communication and Cybersecurity Testbed for Autonomous Passenger Ship A Amro, V Gkioulos Computer Security. ESORICS 2021 International Workshops 13106, 5-22, 2022 | 6 | 2022 |
Iot vulnerability scanning: a state of the art A Amro Computer Security: ESORICS 2020 International Workshops, CyberICPS, SECPRE …, 2020 | 6 | 2020 |
Method and device for data encryption EM El-alfy, A Ahmad US Patent App. 15/241,333, 2018 | 5 | 2018 |
Double-hashing operation mode for encryption S Almuhammadi, A Amro 2017 IEEE 7th Annual Computing and Communication Workshop and Conference …, 2017 | 5 | 2017 |
Double-hashing operation mode for encryption SA Almuhammadi, A Amro US Patent 10,887,080, 2021 | 4 | 2021 |
NetInfoMiner: High-level information extraction from network traffic A Amro, S Almuhammadi, S Zhioua 2017 IEEE International Conference on Big Data and Smart Computing (BigComp …, 2017 | 4 | 2017 |
Known-plaintext attack and improvement of PRNG-based text encryption A Amro, ESM El-Alfy 2016 7th International Conference on Information and Communication Systems …, 2016 | 4 | 2016 |
Cyber-Physical Tracking of IoT devices: A maritime use case A Amro Norsk IKT-konferanse for forskning og utdanning, 2021 | 3 | 2021 |
LPWAN Cyber Security Risk Analysis: Building a Secure IQRF Solution M Bouzidi, A Amro, Y Dalveren, F Alaya Cheikh, M Derawi Sensors 23 (4), 2078, 2023 | 2 | 2023 |
Cyber risk assessment of cyber-enabled autonomous cargo vessel A Yousaf, A Amro, PTH Kwa, M Li, J Zhou International Journal of Critical Infrastructure Protection 46, 100695, 2024 | 1 | 2024 |
SECURING AUTONOMOUS PASSENGER SHIP USING THREAT INFORMED DEFENSE-IN-DEPTH A Amro, V Gkioulos | 1 | 2021 |