Publications

PuRe Defender: A Game-Theoretic Pull Request Assignment with Deep RL

Javad Mokhtari Koushyar, Mina Guirguis and George Atia

In proceedings of the Conference on Game Theory and AI for Security (GameSec), Athens, Greece, October 2025 PDF
Topology-Aware Hybrid FDIA Against Third-Party Aggregators in Smart Grids

Javad Mokhtari Koushyar, Mina Guirguis and George Atia

In proceedings of the IEEE SmartGridComm, Toronto, Canada, October 2025 PDF
The Role of Aggregator Topology on the Impact of False Data Injection Attacks

Javad Mokhtari Koushyar, Mina Guirguis and George Atia

In proceedings of the In IEEE 11th International Conference on Intelligent Data and Security (IDS), New York, NY, July 2025
Hindering Search and Rescue Missions with Selective Wireless Jamming Attacks

Javad Mokhtari Koushyar, Mina Guirguis and George Atia

In proceedings of the IEEE Conference on Cognitive and Computational Aspects of Situation Management (CogSIMA), Montreal, Canada, May 2024
DeepBLOC: A Framework for Securing CPS through Deep Reinforcement Learning on Stochastic Games

Alireza Tahsini, Noah Dunstatter, Mina Guirguis and Chuadhry Mujeeb Ahmed

In proceedings of the IEEE Conference on Communications and Network Security (CNS), June 2020 PDF
Solving Cyber Alert Allocation Markov Games With Deep Reinforcement Learning

Noah Dunstatter, Alireza Tahsini, Mina Guirguis and Jelena Tešić

In proceedings of the 10th Conference on Decision and Game Theory for Security (GameSec), Stockholm, Sweden, October 2019
Pinball Attacks Against Dynamic Channel Assignment in Wireless Networks

Ahmed Anwar, Janiece Kelly, George Atia and Mina Guirguis

The Elsevier International Journal of Computer Communications, May 2019
A Game-Theoretic Framework for the Virtual Machines Migration Timing Problem

Ahmed Anwar, George Atia and Mina Guirguis

The IEEE Transactions on Cloud Computing, March 2019
Adaptive Topologies Against Jamming Attacks in Wireless Networks: A Game-Theoretic Approach

Ahmed Anwar, George Atia and Mina Guirguis

The Elsevier International Journal of Network and Computer Applications, November 2018
Towards a Protected Cloud Against Side Channel Attacks: A Game Theoretic Framework

Ahmed Anwar, George Atia and Mina Guirguis

In proceedings of Allerton Conference on Communication, Control and Computing (Allerton), Monticello, IL, October 2018
A Game-Theoretic Two-Stage Stochastic Programing Model to Protect CPS against Attacks

Clara Novoa, Khan Siddique, Mina Guirguis and Alireza Tahsini

In proceedings of the IEEE International Conference on Industrial Informatics, Porto, Portugal, July 2018
It’s Time to Migrate! A Game-Theoretic Framework for Protecting a Multi-tenant Cloud against Collocation Attacks

Ahmed Anwar, George Atia and Mina Guirguis

In proceedings of the IEEE International Conference on Cloud Computing (CLOUD), San Francisco, CA, July 2018
Allocating Security Analysts to Cyber Alerts Using Markov Games

Noah Dunstatter, Mina Guirguis and Alireza Tahsini

In proceedings of the National Cyber Summit (NCS), Huntsville, AL, June 2018
BLOC: A Game-Theoretic Approach to Orchestrate CPS against Cyber Attacks

Mina Guirguis, Alireza Tahsini, Khan Siddique, Clara Novoa, Justin Moore, Christine Julien and Noah Dunstatter

In proceedings of the IEEE Conference on Communications and Network Security (CNS), Beijing, China, May 2018 PDF
Dynamic Game-Theoretic Defense Approach against Stealthy Jamming Attacks in Wireless Networks

Ahmad Anwar, George Atia and Mina Guirguis

In proceedings of Allerton Conference on Communication, Control and Computing (Allerton), Monticello, IL, October 2017
Assignment and Collaborative Execution of Tasks on Transient Clouds

Mina Guirguis, Qijun Gu, Terry Penner, Lavanya Tammineni, et al.

Springer Annals of Telecommunications, August 2017
Don't Bury your Head in Warnings: A Game-Theoretic Approach for Intelligent Allocation of Cyber-security Alerts

Aaron Schlenker, Haifeng Xu, Mina Guirguis, Chris Kiekintveld, Arunesh Sinha, Milind Tambe, Solomon Sonya, Darryl Balderas, and Noah Dunstatter

In proceedings of the International Joint Conference on Artificial Intelligence (IJCAI), Melbourne, Australia, August 2017
Towards a Game-theoretic Framework for Intelligent Cyber-security Alert Allocation

Aaron Schlenker, Haifeng Xu, Chris Kiekintveld, Arunesh Sinha, Milind Tambe, Mina Guirguis, Solomon Sonya, Darryl Balderas, and Noah Dunstatter

In proceedings of the 3rd IJCAI workshop on Algorithmic Game Theory, Melbourne, Australia, August 2017
Combating the Bandits in the Cloud: A Moving Target Defense Approach

Terry Penner and Mina Guirguis

In proceedings of the IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID), Madrid, Spain, May 2017 PDF
Toward Local Overlay-based Mobile Clouds

Lavanya Tammineni and Mina Guirguis

In proceedings of the Smart Cloud Networks and Systems Conference (SCNS), Dubai UAE, December 2016
Game Theoretic Defense Approach to Wireless Networks Against Stealthy Decoy Attacks

Ahmad Anwar, George Atia and Mina Guirguis

In proceedings of Allerton Conference on Communication, Control and Computing (Allerton), Monticello, IL, October 2016
Measuring the Impact of Unique Entry-Level Instructional Course Modules Designed to Inspire Computer Science Interest

Araceli Ortiz and Mina Guirguis

In proceedings of the Annual ASEE Conference & Exposition, June 2016
Pinball Attacks: Exploiting Channel Allocation in Wireless Networks

Janiece Kelly, Mina Guirguis and George Atia

In proceedings of the IEEE ICC, Kuala Lumpur, Malaysia, May 2016 PDF
Context Awareness over Transient Clouds

Andrea Sciarrone, Igor Bisio, Fabio Lavagetto, Terrence Penner and Mina Guirguis

In proceedings of the IEEE Globecom, San Diego, CA, December 2015
Context-Awareness over Transient Cloud in D2D networks: Energy Performance Analysis and Evaluation

Andrea Sciarrone, Igor Bisio, Fabio Lavagetto, Terrence Penner and Mina Guirguis

Transactions on Emerging Telecommunications Technologies, John Wiley & Sons Lt, November 2015
Stealthy Edge Decoy Attacks Against Dynamic Channel Assignment in Wireless Networks

Ahmed Anwar, Janiece Kelly, George Atia, and Mina Guirguis

In proceedings of the International Conference for Military Communications (Milcom), Tampa, FL, October 2015 PDF
Disrupting Adaptive Traffic Lights Cycles through Selective Jamming Attacks

Heather Hinze, Mike Ruth and Mina Guirguis

In proceedings of the IEEE 81st Vehicular Technology Conference (VTC), Glasgow, UK, May 2015
Demo: Transient Clouds

Terry Penner, Alison Johnson, Brandon Van Slyke, Mina Guirguis and Qijun Gu

In proceedings of MobiCASE, Demo, Austin, TX, November 2014 PDF
A Framework for Identifying Stealthy Attacks on Mobile CPS Applications

Vu Nguyen, Mina Guirguis and George Atia

In proceedings of Symposium on the Control of Network Systems (SCONES), Poster, Boston, MA, October 2014
Transient Clouds: Assignment and Collaborative Execution of Tasks on Mobile Devices

Terry Penner, Alison Johnson, Brandon Van Slyke, Mina Guirguis and Qijun Gu

In proceedings of IEEE Globecom, Austin, TX, December 2014 PDF
A Unifying Approach for the Identification of Application-driven Stealthy Attacks on Mobile CPS

Vu Nguyen, Mina Guirguis and George Atia

In proceedings of the 52nd Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, September 2014 PDF
Secure Mobile Cloud Computing and Security Issues

Qijun Gu and Mina Guirguis

In K. Han, B. Choi and S. Song, High Performance Cloud Auditing and Applications, Chapter 3, Springer, New York, 2014
Transient Clouds: Assignment and Collaborative Execution of Tasks on Mobile Devices

Terry Penner, Alison Johnson, Mina Guirguis and Qijun Gu

Grace Hopper Conference, Poster Session, Minneapolis, MN, October 2013
Collaborative Computing On-Demand: Harnessing Mobile Devices in Executing On-the-Fly Jobs

Thomas Langford, Qijun Gu, Agustin Rivera-Longoria and Mina Guirguis

In proceedings of the Tenth IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS), ZheJiang, China, October 2013 PDF
An Abstraction Layer for Controlling Heterogeneous Mobile Cyber-Physical Systems

Trevor Hanz and Mina Guirguis

In proceedings of the Ninth IEEE International Conference on Automation Science and Engineering (CASE), Madison, WI, August 2013
Control Theoretic Adaptive Monitoring Tools for the Android Platform

David Reynolds and Mina Guirguis

In proceedings of the First IEEE International Workshop on Cloud Security Auditing, Santa Clara, CA, June 2013 PDF
Stuck in Traffic (SiT) Attacks: A Framework for Identifying Stealthy Attacks that Cause Traffic Congestion

Mina Guirguis and George Atia

In proceedings of the IEEE 77th Vehicular Technology Conference (VTC), Dresden, Germany, June 2013 arXiv
Stealthy Attacks on Pheromone Swarming

Janiece Kelly, Seth Richter and Mina Guirguis

In proceedings of the IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA), San Diego, CA February, 2013 PDF
A Case for Low-level Jamming Attacks on Mobile CPS in Target Tracking Applications

Emad Guirguis, Mina Guirguis and Nikhil Halkude

In proceedings of the International Symposium on Pervasive Systems, Algorithms, and Networks, San Marcos, TX, December 2012

Earlier Publications| Prior to ISL

Performance Evaluation of Path Splicing on the GEANT and the Sprint Networks

Christopher Page, Emad Guirguis and Mina Guirguis

The Elsevier International Journal of Computer and Telecommunications Networking (COMNET), Volume 55, Issue 17, Pages 3947–3958, December 2011
Can you Help Me Run These Code Segments on Your Mobile Device?

Mina Guirguis, Robert Ogden, Zhaochen Song, Sobit Thapa and Qijun Gu

In Proceedings of the IEEE Global Communication Conference, Houston, Texas, December 2011
An Expanding Reference Library for Peer-to-Peer Content

Jason Valdez, Mina Guirguis, David Wingate and Rory Rinkevich

In Proceedings of Sixth APWG eCrime Researchers Summit (eCRS'11), San Diego, California, November 2011
Traffic Shaping via Congestion Signals Delegation

Mina Guirguis and Jason Valdez

The IARIA International Journal on Advances in Networks and Services, Volume 3, Issue 4, December 2010
Lexical Steganography Using Prime Based Mimic Functions

W. Connell, D. Tamir and M. Guirguis

The International Journal of Wireless Communications and Networking, 2010
SKWeak Attacks on Path Splicing: Vulnerability Assessment and Defense Mechanisms

Emad Guirguis, Mina Guirguis and Christopher Page

In Proceedings of the IEEE Global Communication Conference, Miami, Florida, December 2010
Prime-based Mimic Functions for the Implementation of Covert Channels

Wesley Connell, Dan Tamir and Mina Guirguis

In Proceedings of the IEEE International Conference on Wireless Communication, Networking and Information Security, Beijing, China, June 2010
On the Safety and Security of Path Splicing: A Case Study for Path Splicing on the GEANT Network

Christopher Page and Mina Guirguis

In Proceedings of the IEEE Global Communication Conference (Globecom'09), Honolulu, Hawaii, December 2009
Stealthy IP Prefix Hijacking Attacks

Christian McArthur and Mina Guirguis

In Proceedings of the IEEE Global Communication Conference (Globecom'09), Honolulu, Hawaii, December 2009
Burn Before Reading: A Stealthy Framework for Combating Live Forensics Investigations

Mina Guirguis, Jason Valdez, Bassam El Lababedi and Joseph Valdez

In Proceedings of 4th APWG eCrime Researchers Summit, Tacoma, Washington, October 2009
HELP:// Hypertext in-Emergency Leveraging Protocol

Mina Guirguis and Hideo Goto

In Proceedings of the 44th IEEE International Conference on Communications (ICC'09), Dresden, Germany, June 2009
Assessment of Vulnerability of Content Adaptation Mechanisms to RoQ Attacks

Mina Guirguis, Joshua Tharp, Azer Bestavros and Ibrahim Matta

In Proceedings of the 8th International Conference on Networks (ICN'09), Gosier, Guadeloupe, March 2009
Masquerading a Wired Covert Channel into a Wireless-like Channel

Mina Guirguis and Jason Valdez

In Proceedings of the 1st IEEE International Workshop on Network Security and Privacy (NSP'08), Austin, Texas, December 2008
Stealthy IP Prefix Hijacking: Don’t Bite Off More Than You Can Chew

Christian McArthur and Mina Guirguis

In Proceedings of ACM SIGCOMM, Poster Session Paper, Seattle, Washington, August 2008
Liberating TCP: The Free and the Stunts

Jason Valdez and Mina Guirguis

In Proceedings of the 7th International Conference on Networks (ICN'08), Cancun, Mexico, April 2008
Reduction of Quality Attacks on Content Adaptation Mechanisms

Joshua Tharp and Mina Guirguis

In Proceedings of the 8th IEEE/ACM International Conference on Grid Computing (Grid'07), Poster Session Paper, Austin, Texas, September 2007
Reduction of Quality (RoQ) Attacks on Dynamic Load Balancers: Vulnerability Assessment and Design Tradeoffs

Mina Guirguis, Azer Bestavros, Ibrahim Matta and Yuting Zhang

In Proceedings of the 26th IEEE INFOCOM (INFOCOM'07), Anchorage, Alaska, May 2007
Adversarial Exploits of End-Systems Adaptation Dynamics

Mina Guirguis, Azer Bestavros, Ibrahim Matta and Yuting Zhang

The Elsevier International Journal of Parallel and Distributed Computing (JPDC), Volume 67, Issue 3, Pages 318-335, March 2007
Exogenous-Loss Aware Traffic Management in Overlay Networks: Toward Global Fairness

Mina Guirguis, Azer Bestavros and Ibrahim Matta

The Computer Networks Journal (COMNET): The International Journal of Computer and Telecommunications Networking, Volume 50, Issue 13, Pages 2331-2348, September 2006
On the Impact of Low-Rate Attacks

Mina Guirguis, Azer Bestavros and Ibrahim Matta

In Proceedings of the 41st IEEE International Conference on Communications (ICC'06), Istanbul, Turkey, June 2006
Friendly Virtual Machines: Leveraging a Feedback-Control Model for Application Adaptation

Yuting Zhang, Azer Bestavros, Mina Guirguis, Ibrahim Matta and Rich West

In Proceedings of the first ACM/USENIX Conference on Virtual Execution Environments (VEE'05), Chicago, Illinois, June 2005
Reduction of Quality (RoQ) Attacks on Internet End-Systems

Mina Guirguis, Azer Bestavros, Ibrahim Matta and Yuting Zhang

In Proceedings of the 24th IEEE INFOCOM (INFOCOM'05), Miami, Florida, March 2005
Routing Tradeoffs inside a d-dimensional Torus with applicability to CAN

Mina Guirguis, Azer Bestavros and Ibrahim Matta

In Proceedings of the 1st International Computer Engineering Conference New Technologies for the Information Society (ICENCO'04), Cairo, Egypt, December 2004
Bandwidth Stealing via Link Targeted RoQ Attacks

Mina Guirguis, Azer Bestavros and Ibrahim Matta

In Proceedings of the 2nd IASTED International Conference on Communication and Computer Networks (CCN'04), Cambridge, Massachusetts, November 2004
itmBench: Generalized API for Internet Traffic Managers

Gali Diamant, Leonid Veytser, Ibrahim Matta, Azer Bestavros, Mina Guirguis, Liang Guo, Yuting Zhang and Sean Chen

In Proceedings of the 10th IEEE Globecom Workshop on Computer-Aided Modeling, Analysis and Design of Communication Links and Networks (CAMAD'04), Dallas, Texas, November 2004
Exploiting the Transients of Adaptation for RoQ Attacks on Internet Resources

Mina Guirguis, Azer Bestavros and Ibrahim Matta

In Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP'04), Berlin, Germany, October 2004
Adaptation=Vulnerability: Under RoQ Attacks

Mina Guirguis, Azer Bestavros and Ibrahim Matta

In ACM SIGCOMM 2004, Poster Session Paper, Portland, Oregon, September 2004
Providing Soft Bandwidth Guarantees Using Elastic TCP-based Tunnels

Mina Guirguis, Azer Bestavros, Ibrahim Matta, Niky Riga, Gali Diamant and Yuting Zhang

In proceedings of the 9th IEEE Symposium on Computer and Communications (ISCC'2004), Alexandria, Egypt, July 2004
XQM: eXogenous-loss aware Queue Management

Mina Guirguis, Azer Bestavros and Ibrahim Matta

In IEEE ICNP 2003, Poster Session Paper, Atlanta, Georgia, November 2003

Sponsors

NSF
AFRL
DHS
DoD
DoD