关注
Behrouz Zolfaghari
Behrouz Zolfaghari
Visiting Assistant Professor, Computer Science and Software Engineering Department, Miami Universit
在 miamioh.edu 的电子邮件经过验证
标题
引用次数
引用次数
年份
Fuzzy sliding mode control design for a class of nonlinear systems with structured and unstructured uncertainties
MR Soltanpour, B Zolfaghari, M Soltani, MH Khooban
International Journal of Innovative Computing, Information and Control 9 (7 …, 2013
692013
Content Delivery Networks: State of the Art, Trends and Future Roadmap
B Zolfaghari, G Srivastava, S Roy, HR Nemati, F Afghah, T Koshiba, ...
ACM Computing Surveys, 2020
542020
A review on security of smart farming and precision agriculture: Security aspects, attacks, threats and countermeasures
A Yazdinejad, B Zolfaghari, A Azmoodeh, A Dehghantanha, H Karimipour, ...
Applied Sciences 11 (16), 7518, 2021
492021
Accurate threat hunting in industrial internet of things edge devices
A Yazdinejad, B Zolfaghari, A Dehghantanha, H Karimipour, G Srivastava, ...
Digital Communications and Networks, 2022
352022
Steeleye: An application-layer attack detection and attribution model in industrial control systems using semi-deep learning
S Nakhodchi, B Zolfaghari, A Yazdinejad, A Dehghantanha
2021 18th International Conference on Privacy, Security and Trust (PST), 1-8, 2021
222021
Root causing, detecting, and fixing flaky tests: State of the art and future roadmap
B Zolfaghari, RM Parizi, G Srivastava, Y Hailemariam
Software: Practice and Experience 51 (5), 851-867, 2021
202021
MCIC: automated identification of cellulases from metagenomic data and characterization based on temperature and pH dependence
M Foroozandeh Shahraki, S Ariaeenejad, F Fallah Atanaki, B Zolfaghari, ...
Frontiers in Microbiology 11, 567863, 2020
182020
Chaotic image encryption: state-of-the-art, ecosystem, and future roadmap
B Zolfaghari, T Koshiba
Applied System Innovation 5 (3), 57, 2022
162022
An Efficient and Secure Approach to Multi-User Image Steganography Using CRC-Based CDMA
H Sheidaeian, B Zolfaghari
Third International Conference on Signal Acquisition and Processing, 2011
13*2011
The dichotomy of cloud and iot: Cloud-assisted iot from a security perspective
B Zolfaghari, A Yazdinejad, A Dehghantanha, J Krzciok, K Bibak
arXiv preprint arXiv:2207.01590, 2022
122022
Everlasting security of quantum key distribution with 1K-DWCDM and quadratic hash.
K Bibak, R Ritchie, B Zolfaghari
Quantum Inf. Comput. 21 (3&4), 181-202, 2021
112021
A dynamic scheduling algorithm with minimum context switches for spacecraft avionics systems
B Zolfaghari
2004 IEEE Aerospace Conference Proceedings (IEEE Cat. No. 04TH8720) 4, 2618-2624, 2004
92004
IIoT deep malware threat hunting: from adversarial example detection to adversarial scenario detection
B Esmaeili, A Azmoodeh, A Dehghantanha, H Karimipour, B Zolfaghari, ...
IEEE Transactions on Industrial Informatics 18 (12), 8477-8486, 2022
82022
Key-Dependent Feedback Configuration Matrix of Primitive σ–LFSR and Resistance to Some Known Plaintext Attacks
S Nandi, S Krishnaswamy, B Zolfaghari, P Mitra
IEEE Access 10, 44840-44854, 2022
82022
Statistical Trend Analysis of Physically Unclonable Functions: An Approach via Text Mining
B Zolfaghari, K Bibak, T Koshiba, HR Nemati, P Mitra
CRC Press, 2021
82021
The dichotomy of neural networks and cryptography: War and peace
B Zolfaghari, T Koshiba
Applied System Innovation 5 (4), 61, 2022
72022
The odyssey of entropy: Cryptography
B Zolfaghari, K Bibak, T Koshiba
Entropy 24 (2), 266, 2022
72022
Cryptography in hierarchical coded caching: System model and cost analysis
B Zolfaghari, V Singh, BK Rai, K Bibak, T Koshiba
Entropy 23 (11), 1459, 2021
72021
Parallel Computation of CRC Using Special Generator Polynomials
H Sheidaeian, B Zolfaghari
International Journal of Computer Networks & Communications (IJCNC) 4 (1), 39-47, 2012
62012
Crypto Makes AI Evolve
B Zolfaghari, E Rabieinejad, A Yazdinejad, RM Parizi, A Dehghantanha
arXiv preprint arXiv:2206.12669, 2022
52022
系统目前无法执行此操作,请稍后再试。
文章 1–20