关注
Elahe Fazeldehkordi
Elahe Fazeldehkordi
在 its.uio.no 的电子邮件经过验证
标题
引用次数
引用次数
年份
A machine-learning approach to phishing detection and defense
IS Amiri, OA Akanbi, E Fazeldehkordi
Syngress, 2014
752014
A survey of security architectures for edge computing-based IoT
E Fazeldehkordi, TM Grønli
IoT 3 (3), 332-365, 2022
512022
A study of black hole attack solutions: On aodv routing protocol in manet
E Fazeldehkordi, IS Amiri, OA Akanbi
Syngress, 2015
212015
Chapter 4—feature extraction
OA Akanbi, IS Amiri, E Fazeldehkordi, OA Akanbi, IS Amiri, ...
A Machine-Learning Approach to Phishing Detection and Defense, 45-54, 2015
192015
Security and privacy in IoT systems: a case study of healthcare products
E Fazeldehkordi, O Owe, J Noll
2019 13th International Symposium on Medical Information and Communication …, 2019
172019
A Study of Black Hole Attack Solutions
E Fazeldehkordi, IS Amiri, OA Akanbi, M Neely
Waltham, MA, USA: Elsevier, 2016
82016
A lightweight approach to smart contracts supporting safety, security, and privacy
O Owe, E Fazeldehkordi
Journal of Logical and Algebraic Methods in Programming 127, 100772, 2022
72022
A language-based approach to prevent DDoS attacks in distributed financial agent systems
E Fazeldehkordi, O Owe, T Ramezanifarkhani
Computer Security: ESORICS 2019 International Workshops, IOSec, MSTEC, and …, 2020
62020
Comparative Study of Multiple Black Hole Attacks Solution Methods in MANET Using AODV Routing Protocol
E Fazeldehkordi, IS Amiri, OA Akanbi
Create Space Independent Publishing Platform, 2014
62014
A survey of security architectures for edge computing-based IoT. IoT 3 (3): 332–365
E Fazeldehkordi, TM Grønli
52022
Hoare-style reasoning from multiple contracts
O Owe, T Ramezanifarkhani, E Fazeldehkordi
Integrated Formal Methods: 13th International Conference, IFM 2017, Turin …, 2017
52017
Chapter 3-research methodology
OA Akanbi, IS Amiri, E Fazeldehkordi
A Machine-Learning Approach to Phishing Detection and Defense, 35-43, 2015
52015
Chapter 6—Conclusions
OA Akanbi, IS Amiri, E Fazeldehkordi
A Machine-Learning Approach to Phishing Detection and Defense; Akanbi, OA …, 2015
52015
A framework for flexible program evolution and verification of distributed systems
O Owe, E Fazeldehkordi, JC Lin
Model-Driven Engineering and Software Development: 7th International …, 2020
32020
A language-based approach to prevent DDoS attacks in distributed object systems
T Ramezanifarkhani, E Fazeldehkordi, O Owe
29th Nordic Workshop on Programming Theory. Turku Centre for Computer Science, 2017
32017
A Flexible Framework for Program Evolution and Verification.
O Owe, JC Lin, E Fazeldehkordi
MODELSWARD, 177-189, 2019
22019
Security and Privacy Functionalities in IoT
E Fazeldehkordi, O Owe, J Noll
2019 17th International Conference on Privacy, Security and Trust (PST), 1-12, 2019
12019
Cyber security: A machine learning approach to phishing
OA AKANBI, IS AMIRI, E FAZELDEHKORDI
12014
Security and Privacy Solutions in IoT and Distributed Systems Design
E Fazeldehkordi
2021
Proceedings of the PhD Symposium at iFM’19on Formal Methods: Algorithms, Tools and Applications (PhD-iFM’19)
KI Pun, V Stolz, E Fazeldehkordi, O Owe, T Ramezanifarkhani, ...
Høgskulen på Vestlandet, 2020
2020
系统目前无法执行此操作,请稍后再试。
文章 1–20