Ahmed Mohamed HussainKTH Royal Institute of Technology | KTH · Department of Computer Science
Ahmed Mohamed Hussain
MSc Computer Science - Uppsala University
Working on Networks Security
About
13
Publications
25,195
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
61
Citations
Introduction
Ahmed is currently a Predoctoral Researcher working with the Networked Systems Security group at KTH Royal Institute of Technology. Before joining KTH, he worked as a Researcher at the Computer Science and Engineering department at Qatar University, Doha, Qatar. He received his Master's in Computer Science at Uppsala University, Uppsala, Sweden. His research interest includes IoT, Security and Privacy, Wireless Security, Artificial Intelligence for Cybersecurity, and Physical Layer Security.
Additional affiliations
November 2020 - January 2023
January 2020 - June 2020
February 2018 - September 2018
Education
August 2018 - June 2020
August 2011 - June 2017
Publications
Publications (13)
Wireless enabling technologies in critical infrastructures are increasing the efficiency of communications. In the era of 5G and beyond, more technologies will be allowed to connect to mobile networks, enabling the Internet of Things (IoT) on a massive scale. Most of these technologies are vulnerable to physical-layer security attacks, namely jammi...
Cyber-Physical Systems (CPSs) complexity has been continuously increasing to support new life-impacting applications, such as Internet of Things (IoT) devices or Industrial Control Systems (ICSs). These characteristics introduce new critical security challenges to both industrial practitioners and academics. This work investigates how Model-Based S...
The deployment of the Internet of Things (IoT) in smart cities and critical infrastructure has enhanced connectivity and real-time data exchange but introduced significant security challenges. While effective, cryptography can often be resource-intensive for small-footprint resource-constrained (i.e., IoT) devices. Radio Frequency Fingerprinting (R...
Numerous studies have investigated methods for jailbreaking Large Language Models (LLMs) to generate harmful content. Typically, these methods are evaluated using datasets of malicious prompts designed to bypass security policies established by LLM providers. However, the generally broad scope and open-ended nature of existing datasets can complica...
Wireless enabling technologies in critical infrastructures are increasing the efficiency of communications. Most of these technologies are vulnerable to jamming attacks. Jamming attacks are among the most effective countermeasures to attack and compromise their availability. Jamming is an interfering signal that limits the intended receiver from co...
The Internet of Vehicles (IoV) paradigm aims to improve road safety and provide a comfortable driving experience for Internet-connected vehicles, by transmitting early warning and infotainment signals to Internet-connected vehicles in the network. The unique characteristics of the IoV, such as their mobility and pervasive Internet connectivity, exp...
Telemedicine is a technique that allows patients to have health-related consultations without the need to be physically present in the hospital through phone and video calling technologies. In recent years, researchers have made many contributions to reform and facilitate better telemedicine services through the use of body area networks or wireles...
We present a new machine learning-based attack that exploits network patterns to detect the presence of smart IoT devices and running services in the WiFi radio spectrum. We perform an extensive measurement campaign of data collection, and we build up a model describing the traffic patterns characterizing three popular IoT smart home devices, i.e.,...
We present a new machine learning-based attack that exploits network patterns to detect the presence of smart IoT devices and running services in the WiFi radio spectrum. We perform an extensive measurement campaign of data collection, and we build up a model describing the traffic patterns characterizing three popular IoT smart home devices, i.e.,...
A Remote Keyless Systems (RKS) is an electronic lock that controls access to a building or a vehicle without using a traditional mechanical key.
Although RKS have become more and more robust over time, in this paper we show that specifically designed attack strategies are still effective against them. In particular, we show how RKS can be exploite...
Air pollution is a major issue contributing to global warming that threaten the quality of life on Earth. Numerous research disciplines are combining their efforts to combat air pollution by developing new methods to monitor and control pollution. For this to happen, researchers need to have instant access to new data. In this paper, we have develo...