Mohammad Noureddine

University of Illinois
Coordinated Science Laboratory
1308 West Main Street
Urbana, IL 61801 USA
Fax: +1 (217) 244-1764
nouredd2 at


Publications with the Performability Engineering Research Group

A Game-Theoretic Approach to Respond to Attacker Lateral Movement.
M. A. Noureddine, A. Fawaz, W. H. Sanders, and T. Ba┼čar. (16NOU02)
Proceedings of the 7th International Conference on Decision and Game Theory for Security (GameSec 2016), New York, New York, November 2-4, 2016, Lecture Notes in Computer Science vol. 9996, Springer, 2016, pp. 294-313. [The final publication is available at Springer Link entry]

Accounting for the Human User in Predictive Security Models.
M. A. Noureddine, A. Marturano, K. Keefe, M. Bashir, and W. H. Sanders. (16NOU03)
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2017), Christchurch, New Zealand, January 22-25, 2017, pp. 329-338. [IEEE Xplore entry]

An Unsupervised Multi-Detector Approach for Identifying Malicious Lateral Movement.
A. Bohara, M. A. Noureddine, A. Fawaz, and W. H. Sanders. (17BOH01)
Proceedings of the 2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS 2017), Hong Kong, China, September 26-29, 2017, pp. 224-233. [IEEE Xplore entry]

PowerAlert: Integrity Checking Using Power Measurement and a Game-Theoretic Strategy.
A. M. Fawaz, M. A. Noureddine, and W. H. Sanders. (17FAW02)
Proceedings of the 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Luxembourg City, Luxembourg, June 25-28, 2018, pp. 514-525. [IEEE Xplore entry]

Determining the Tolerable Attack Surface that Preserves Safety of Cyber-Physical Systems.
C. Cheh, A. Fawaz, M. A. Noureddine, B. Chen, W. Temple, and W. H. Sanders. (18CHE02)
Submitted for publication.


COPYRIGHT NOTICES: The above electronic files are presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

The following copyright notice applies to all of the above items that appear in IEEE publications: "Personal use of this material is permitted. However, permission to reprint/publish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from IEEE."