Fuzzy sliding mode control design for a class of nonlinear systems with structured and unstructured uncertainties MR Soltanpour, B Zolfaghari, M Soltani, MH Khooban International Journal of Innovative Computing, Information and Control 9 (7 …, 2013 | 69 | 2013 |
Content Delivery Networks: State of the Art, Trends and Future Roadmap B Zolfaghari, G Srivastava, S Roy, HR Nemati, F Afghah, T Koshiba, ... ACM Computing Surveys, 2020 | 54 | 2020 |
A review on security of smart farming and precision agriculture: Security aspects, attacks, threats and countermeasures A Yazdinejad, B Zolfaghari, A Azmoodeh, A Dehghantanha, H Karimipour, ... Applied Sciences 11 (16), 7518, 2021 | 49 | 2021 |
Accurate threat hunting in industrial internet of things edge devices A Yazdinejad, B Zolfaghari, A Dehghantanha, H Karimipour, G Srivastava, ... Digital Communications and Networks, 2022 | 35 | 2022 |
Steeleye: An application-layer attack detection and attribution model in industrial control systems using semi-deep learning S Nakhodchi, B Zolfaghari, A Yazdinejad, A Dehghantanha 2021 18th International Conference on Privacy, Security and Trust (PST), 1-8, 2021 | 22 | 2021 |
Root causing, detecting, and fixing flaky tests: State of the art and future roadmap B Zolfaghari, RM Parizi, G Srivastava, Y Hailemariam Software: Practice and Experience 51 (5), 851-867, 2021 | 20 | 2021 |
MCIC: automated identification of cellulases from metagenomic data and characterization based on temperature and pH dependence M Foroozandeh Shahraki, S Ariaeenejad, F Fallah Atanaki, B Zolfaghari, ... Frontiers in Microbiology 11, 567863, 2020 | 18 | 2020 |
Chaotic image encryption: state-of-the-art, ecosystem, and future roadmap B Zolfaghari, T Koshiba Applied System Innovation 5 (3), 57, 2022 | 16 | 2022 |
An Efficient and Secure Approach to Multi-User Image Steganography Using CRC-Based CDMA H Sheidaeian, B Zolfaghari Third International Conference on Signal Acquisition and Processing, 2011 | 13* | 2011 |
The dichotomy of cloud and iot: Cloud-assisted iot from a security perspective B Zolfaghari, A Yazdinejad, A Dehghantanha, J Krzciok, K Bibak arXiv preprint arXiv:2207.01590, 2022 | 12 | 2022 |
Everlasting security of quantum key distribution with 1K-DWCDM and quadratic hash. K Bibak, R Ritchie, B Zolfaghari Quantum Inf. Comput. 21 (3&4), 181-202, 2021 | 11 | 2021 |
A dynamic scheduling algorithm with minimum context switches for spacecraft avionics systems B Zolfaghari 2004 IEEE Aerospace Conference Proceedings (IEEE Cat. No. 04TH8720) 4, 2618-2624, 2004 | 9 | 2004 |
IIoT deep malware threat hunting: from adversarial example detection to adversarial scenario detection B Esmaeili, A Azmoodeh, A Dehghantanha, H Karimipour, B Zolfaghari, ... IEEE Transactions on Industrial Informatics 18 (12), 8477-8486, 2022 | 8 | 2022 |
Key-Dependent Feedback Configuration Matrix of Primitive σ–LFSR and Resistance to Some Known Plaintext Attacks S Nandi, S Krishnaswamy, B Zolfaghari, P Mitra IEEE Access 10, 44840-44854, 2022 | 8 | 2022 |
Statistical Trend Analysis of Physically Unclonable Functions: An Approach via Text Mining B Zolfaghari, K Bibak, T Koshiba, HR Nemati, P Mitra CRC Press, 2021 | 8 | 2021 |
The dichotomy of neural networks and cryptography: War and peace B Zolfaghari, T Koshiba Applied System Innovation 5 (4), 61, 2022 | 7 | 2022 |
The odyssey of entropy: Cryptography B Zolfaghari, K Bibak, T Koshiba Entropy 24 (2), 266, 2022 | 7 | 2022 |
Cryptography in hierarchical coded caching: System model and cost analysis B Zolfaghari, V Singh, BK Rai, K Bibak, T Koshiba Entropy 23 (11), 1459, 2021 | 7 | 2021 |
Parallel Computation of CRC Using Special Generator Polynomials H Sheidaeian, B Zolfaghari International Journal of Computer Networks & Communications (IJCNC) 4 (1), 39-47, 2012 | 6 | 2012 |
Crypto Makes AI Evolve B Zolfaghari, E Rabieinejad, A Yazdinejad, RM Parizi, A Dehghantanha arXiv preprint arXiv:2206.12669, 2022 | 5 | 2022 |