publications

publications by categories in reversed chronological order. generated by jekyll-scholar.

2025

  1. Vendor communication themes in darknet Ransomware-as-a-Service (RaaS) advertisements
    Taylor Fisher, Zacharias Pieri, C Jordan Howell, Roberta O’Malley, Lauren Tremblay, and Mohamed Dawoud
    Computers in Human Behavior, 2025

2024

  1. {DVa}: Extracting Victims and Abuse Vectors from Android Accessibility Malware
    Haichuan Xu, Mingxuan Yao, Runze Zhang, Mohamed Moustafa Dawoud, Jeman Park, and Brendan Saltaformaggio
    In 33rd USENIX Security Symposium (USENIX Security 24), 2024

2022

  1. Social engineering and technical security fusion
    Wassim Alexan, Eyad Mamdouh, Mohamed ElBeltagy, Ahmed Ashraf, Mohamed Moustafa, and Hashem Al-Qurashi
    In 2022 International Telecommunications Conference (ITC-Egypt), 2022
  2. Image Encryption Through Rössler System, PRNG S-Box and Recamán’s Sequence
    Mohamed ElBeltagy, Wassim Alexan, Abdelrahman Elkhamry, Mohamed Moustafa, and Hisham H Hussein
    In 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC), 2022

2021

  1. Iomt security: Sha3-512, aes-256, rsa and lsb steganography
    Wassim Alexan, Ahmed Ashraf, Eyad Mamdouh, Sarah Mohamed, and Mohamed Moustafa
    In 2021 8th NAFOSTED Conference on Information and Computer Science (NICS), 2021