Check out the complete list of publications.
Selected Publications.
Journal Papers
M. A. Elsayed and N. Zincir-Heywood, “BoostSec: Online Learning for Security Analytics of Vehicular Networks,” Springer Journal of Network and Systems Management, vol. 32, no. 1, p. 6, March 2024.
M. A. Elsayed, M. Wrana, K. Lounis, Z. Mansour, S. Ding, and M. Zulkernine, “AdaptIDS: Adaptive Intrusion Detection for Mission-critical Aerospace Vehicles”, IEEE Transactions on Intelligent Transportation Systems, Oct. 25, 2022.
K. Lounis, Z. Mansour, M. Wrana, M. A. Elsayed, S. Ding, and M. Zulkernine, “A Review and Analysis of Attack Vectors on MIL-STD-1553 Communication Bus”, IEEE Transactions on Aerospace and Electronic Systems, May 24, 2022.
M. Wrana, M. A. Elsayed, K. Lounis, Z. Mansour, S. Ding, and M. Zulkernine, “OD1NF1ST: True Skip Intrusion Detection and Avionics Network Cyber-Attack Simulation”, ACM Transactions on Cyber-Physical Systems, July 2022.
L. J. Moukahal, M. A. Elsayed, and M. Zulkernine, “Vehicle Software Engineering: Research and Practice,” IEEE Internet of Things Journal, Special Issue on Software Engineering Research and Practices for the Internet of Things, June 2020.
M. A. Elsayed and M. Zulkernine, “PredictDeep: Security Analytics as a Service for Anomaly Detection and Prediction,” Journal of IEEE Access, Vol. 8, pp.45184-45197, March 2020.
M. Elsayed and M. Zulkernine, "Offering Security Diagnosis as a Service for Cloud SaaS Applications," Journal of Elsevier Information Security and Applications, Vol. 44, pp. 32-48, Feb. 2019.
M. Elsayed and M. Zulkernine, “A Classification of Intrusion Detection Systems in the Cloud”, Journal of Information Processing, Special Issue of "Applications and the Internet in Conjunction with Main Topics of Computer, Software, Application Conference, (COMPSAC 2014), June 2015.
Conference Papers
D. Liao and M. A. Elsayed, "OTArmor: Securing Automotive Over-the-Air Updates Against Malware Using Generative Modeling," Proc. of 9th Cyber Security in Networking Conference (CSNet), IEEE, 2025.
S. Afrin, M. A. Elsayed, and N. Zincir-Heywood, "SQL-GENIE: SQL Protection using GENerative Modeling for Anomaly Detection against Injection and Evolved Adversarial Attacks," Proc. of 2025 IEEE 49th Annual Computers, Software, and Applications Conference (COMPSAC), pp. 459-46, 2025.
S. Afrin, M. A. Elsayed, and N. Zincir-Heywood, "Work in Progress: Exploring Generative Modeling for Injection Attack Detection," Proc. of IEEE 10th World Forum on Internet of Things (WF-IoT), pp. 580-581, 2024.
S. Afrin, M. A. Elsayed, and N. Zincir-Heywood, "GENI: GANs Evaluation of iNjection attacks on IoT," Proc. of IEEE 10th World Forum on Internet of Things (WF-IoT), pp. 580-581, 2024.
Z. Erdenebaatar, R. Alshammari, N. Zincir-Heywood, M. Elsayed, B. Nandy, and N. Seddigh, "Encrypted mobile instant messaging traffic dataset," IEEE Dataport, 2023.
M. A. Elsayed, P. Russell, B. Nandy, N. Seddigh, and N. Zincir-Heywood, "Anomaly Detection for IoT Networks: Empirical Study," The IEEE Canadian Conference on Electrical and Computer Engineering, Regina, SK, Canada 2023.
Z. Erdenebaatar, B. Nandy, N. Seddigh, R. Alshammari, M. A. Elsayed, and N. Zincir-Heywood, "Depicting Instant Messaging Encrypted Traffic Characteristics through an Empirical Study," The IEEE International Conference on Computer Communications and Networks, Honolulu, USA, 2023.
Z. Erdenebaatar, B. Nandy, N. Seddigh, R. Alshammari, M. A. Elsayed, and N. Zincir-Heywood “Instant Messaging Application Encrypted Traffic Generation System,” The 19th IEEE/IFIP Network Operations and Management Symposium, USA, 2023.
Z. Erdenebaatar, B. Nandy, N. Seddigh, R. Alshammari, M. A. Elsayed, and N. Zincir-Heywood, “Analyzing Traffic Characteristics of Instant Messaging Applications on Android Smartphones,” The 19th IEEE/IFIP Network Operations and Management Symposium, USA, 2023.
P. Russell, M. A. Elsayed, B. Nandy, N. Seddigh, and N. Zincir-Heywood, "On the Fence: Anomaly Detection in IoT Networks," The 19th IEEE/IFIP Network Operations and Management Symposium, Miami, USA, 2023.
M. A. Elsayed and N. Zincir-Heywood, “BoostGuard: Interpretable Misbehavior Detection in Vehicular Communication Networks,” The 18th IEEE/IFIP Network Operations and Management Symposium, (NOMS), 25-29 April 2022.
D. Phillips, M. A. Elsayed, and M. Zulkernine, “DeepGuard: A DeepBillboard Attack Detection Technique against Connected and Autonomous Vehicles,” The 21st IEEE International Conference on Software Quality, Reliability, and Security, (QRS), Dec. 2021.
C. Chen, M. A. Elsayed, and M. Zulkernine, “HBD-Authority: Streaming Access Control Model for Hadoop,” The IEEE 6th International Conference on Dependability in Sensor, Cloud and Big Data Systems and Application, (DependSys), 2020. [Best Paper Award]
M. Elsayed and M. Zulkernine, "Integrating Security in Cloud Application Development Cycle," Proc. of the 4th International Conference on Software Security and Assurance, (ICSSA 2018), Seoul, South Korea, July 26-27, 2018. [Best Paper Award]
M. Elsayed and M. Zulkernine, "Towards Security Monitoring for Cloud Analytic Applications," Proc. of the 4th IEEE International Conference on Big Data Security on Cloud, (BigDataSecurity 2018), Omaha, NE, USA, IEEE, May 3-5, 2018. [Best Student Paper Award]
M. Elsayed and M. Zulkernine, “A Taxonomy of Security as a Service,” Proc. of the 8th International Symposium on Secure Virtual Infrastructures: Cloud and Trusted Computing, Malta, as part of on the Move Federated Conferences & Workshops, LNCS, vol. 11230, Springer Verlag, Oct. 22-26, 2018.
M. Elsayed and M. Zulkernine, "IFCaaS: Information Flow Control as a Service for Cloud Security," Proc. of the 11th International Conference on Availability, Reliability, and Security, (ARES2016), Salzburg, Austria, pp.: 211-216, IEEE, Aug. 31-Sept. 2, 2016.
S. Moustafa, K. Elgazzar, P. Martin, and M. Elsayed, “SLAM: SLA Monitoring Framework for Fedrated Cloud Services,” Proc. of the 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing, UCC 2015, pp.: 506-511, IEEE, 2015.
M. Afifi, A. Hamad and T. Hassan, “Automatic Summarization of Visual Text Contents in Instructional Videos,” Proc. of the 2009 4th International Conference on Intelligent Computing and Information Systems, (ICICIS’09), Session 14: Pattern Classification/Image Processing, Cairo, Egypt, pp.: 480-483, ISBN: 977-237-172-3, 19-22 March 2009.
A. Hamad, S. El-Ghonaimy, T. Hassan, and M. Afifi, “Integrated Coarse-Fine Scheme for Text Information Extraction from Instructional Videos,” Proc. of 2009 International Conference on Machine Learning and Computing, (ICMLC 2009), Session 9: Computer Research and Development, Perth, Australia, pp. 559-566, ISBN: 978-1-84626-018-6, 10-12 July 2009.
M. Afifi, A. Hamad, and S. El-Ghonaimy, “Integrated Coarse-to-Fine Technique for Text Information Extraction from Instructional videos,” accepted in 2nd IEEE International Conference on Computer Science and Information Technology, (IEEE ICCSIT 2009), Beijing, China, August 8 – 11 2009.