scispace - formally typeset
E

Ezzeldin Shereen

Researcher at Royal Institute of Technology

Publications -  14
Citations -  105

Ezzeldin Shereen is an academic researcher from Royal Institute of Technology. The author has contributed to research in topics: Synchronization & Phasor. The author has an hindex of 5, co-authored 12 publications receiving 56 citations. Previous affiliations of Ezzeldin Shereen include German University in Cairo.

Papers
More filters
Journal ArticleDOI

Feasibility of Time-Synchronization Attacks Against PMU-Based State Estimation

TL;DR: This article shows how to perform undetectable attacks against more than two PMUs, and shows how an attacker can anticipate the operation of the clock servo while achieving her attack goal and remaining undetECTable.
Proceedings ArticleDOI

Next Steps in Security for Time Synchronization: Experiences from implementing IEEE 1588 v2.1

TL;DR: An overview of the planned security features of Precision Time Protocol version 2, and results based on an implementation of the proposed integrated security mechanism based on the open source Linux PTP, including support for hardware timestamping.
Journal ArticleDOI

Model-Based and Data-Driven Detectors for Time Synchronization Attacks Against PMUs

TL;DR: This paper develops a phasor measurement model and uses it to derive an accurate closed form expression for the correlation between the frequency adjustments made by the PMU clock and the resulting change in the measured phase angle, without an attack.
Proceedings ArticleDOI

A continuum of undetectable timing-attacks on PMU-based linear state-estimation

TL;DR: This paper explores time synchronization attacks against PMU measurements that are undetectable by state-of-the-art Bad-Data Detection (BDD) algorithms, used for Linear State-Estimation (LSE).
Book ChapterDOI

Adversarial Attacks on Continuous Authentication Security: A Dynamic Game Approach

TL;DR: In this paper, the interaction between an attacker and an operator using continuous authentication is modeled as a stochastic game, and it is shown that the optimal attacker strategy consists of observing the user behavior to collect information at the beginning, and then attacking after gathering enough data.