default search action
Behrouz Zolfaghari
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Behrouz Zolfaghari, Mostafa Abbas Mollaei, Fahimeh Hajizadeh, Naoto Yanai, Khodakhast Bibak:
Secure UAV (Drone) and the Great Promise of AI. ACM Comput. Surv. 56(11): 286:1-286:37 (2024) - 2023
- [j19]Behrouz Zolfaghari, Leila Mirsadeghi, Khodakhast Bibak, Kaveh Kavousi:
Cancer Prognosis and Diagnosis Methods Based on Ensemble Learning. ACM Comput. Surv. 55(12): 262:1-262:34 (2023) - [j18]Abbas Yazdinejad, Behrouz Zolfaghari, Ali Dehghantanha, Hadis Karimipour, Gautam Srivastava, Reza M. Parizi:
Accurate threat hunting in industrial internet of things edge devices. Digit. Commun. Networks 9(5): 1123-1130 (2023) - [j17]Takeshi Koshiba, Behrouz Zolfaghari, Khodakhast Bibak:
A tradeoff paradigm shift in cryptographically-secure pseudorandom number generation based on discrete logarithm. J. Inf. Secur. Appl. 73: 103430 (2023) - 2022
- [b1]Behrouz Zolfaghari, Khodakhast Bibak:
Perfect Secrecy in IoT - A Hybrid Combinatorial-Boolean Approach. Springer 2022, ISBN 978-3-031-13190-5, pp. 3-79 - [j16]Subrata Nandi, Srinivasan Krishnaswamy, Behrouz Zolfaghari, Pinaki Mitra:
Key-Dependent Feedback Configuration Matrix of Primitive σ-LFSR and Resistance to Some Known Plaintext Attacks. IEEE Access 10: 44840-44854 (2022) - [j15]Khodakhast Bibak, Behrouz Zolfaghari:
The Modular Subset-Sum Problem and the size of deletion correcting codes. Des. Codes Cryptogr. 90(8): 1721-1734 (2022) - [j14]Behrouz Zolfaghari, Khodakhast Bibak, Takeshi Koshiba:
The Odyssey of Entropy: Cryptography. Entropy 24(2): 266 (2022) - [j13]Behrouz Zolfaghari, Khodakhast Bibak, Takeshi Koshiba:
From Random Numbers to Random Objects. Entropy 24(7): 928 (2022) - [j12]Bardia Esmaeili, Amin Azmoodeh, Ali Dehghantanha, Hadis Karimipour, Behrouz Zolfaghari, Mohammad Hammoudeh:
IIoT Deep Malware Threat Hunting: From Adversarial Example Detection to Adversarial Scenario Detection. IEEE Trans. Ind. Informatics 18(12): 8477-8486 (2022) - [c5]Mohammad Maghsoudimehrabani, Amin Azmoodeh, Ali Dehghantanha, Behrouz Zolfaghari, Gautam Srivastava:
Proactive Detection of Query-based Adversarial Scenarios in NLP Systems. AISec@CCS 2022: 103-113 - [i3]Behrouz Zolfaghari, Elnaz Rabieinejad, Abbas Yazdinejad, Reza M. Parizi, Ali Dehghantanha:
Crypto Makes AI Evolve. CoRR abs/2206.12669 (2022) - [i2]Behrouz Zolfaghari, Abbas Yazdinejad, Ali Dehghantanha:
The Dichotomy of Cloud and IoT: Cloud-Assisted IoT From a Security Perspective. CoRR abs/2207.01590 (2022) - 2021
- [j11]Behrouz Zolfaghari, Gautam Srivastava, Swapnoneel Roy, Hamid R. Nemati, Fatemeh Afghah, Takeshi Koshiba, Abolfazl Razi, Khodakhast Bibak, Pinaki Mitra, Brijesh Kumar Rai:
Content Delivery Networks: State of the Art, Trends, and Future Roadmap. ACM Comput. Surv. 53(2): 34:1-34:34 (2021) - [j10]Behrouz Zolfaghari, Vikrant Singh, Brijesh Kumar Rai, Khodakhast Bibak, Takeshi Koshiba:
Cryptography in Hierarchical Coded Caching: System Model and Cost Analysis. Entropy 23(11): 1459 (2021) - [j9]Behrouz Zolfaghari, Vikrant Singh, Sushmitha Reddy, Brijesh Kumar Rai, Khodakhast Bibak, Ali Dehghantanha:
Lower Bounds on Bandwidth Requirements of Regenerating Code Parameter Scaling in Distributed Storage Systems. IEEE Commun. Lett. 25(5): 1477-1481 (2021) - [j8]Khodakhast Bibak, Robert Ritchie, Behrouz Zolfaghari:
Everlasting security of quantum key distribution with 1K-DWCDM and quadratic hash. Quantum Inf. Comput. 21(3&4): 181-202 (2021) - [j7]Behrouz Zolfaghari, Reza M. Parizi, Gautam Srivastava, Yoseph Hailemariam:
Root causing, detecting, and fixing flaky tests: State of the art and future roadmap. Softw. Pract. Exp. 51(5): 851-867 (2021) - [c4]Sanaz Nakhodchi, Behrouz Zolfaghari, Abbas Yazdinejad, Ali Dehghantanha:
SteelEye: An Application-Layer Attack Detection and Attribution Model in Industrial Control Systems using Semi-Deep Learning. PST 2021: 1-8 - 2020
- [j6]Vikrant Singh, Behrouz Zolfaghari, Chunduri Venkata Dheeraj Kumar, Brijesh Kumar Rai, Khodakhast Bibak, Gautam Srivastava, Swapnoneel Roy, Takeshi Koshiba:
Generalized Mm, r-Network: A Case for Fixed Message Dimensions. IEEE Commun. Lett. 24(1): 38-42 (2020) - [i1]Subrata Nandi, Srinivasan Krishnaswamy, Behrouz Zolfaghari, Pinaki Mitra:
{The application of σ-LFSR in Key-Dependent Feedback Configuration for Word-Oriented Stream Ciphers. CoRR abs/2003.09381 (2020)
2010 – 2019
- 2017
- [j5]Behrouz Zolfaghari, Mehran S. Fallah, Mehdi Sedighi:
S-Restricted Compositions Revisited. Discret. Math. Theor. Comput. Sci. 19(1) (2017) - 2011
- [c3]Behrouz Zolfaghari, Hamed Sheidaeian, Saadat Pour-Mozafari:
Systematic Selection of CRC Generator Polynomials to Detect Double Bit Errors in Ethernet Networks. WiMo/CoNeCo 2011: 228-235
2000 – 2009
- 2008
- [j4]Mohsen Sharifi, Behrouz Zolfaghari:
YAARC: yet another approach to further reducing the rate of conflict misses. J. Supercomput. 44(1): 24-40 (2008) - 2006
- [j3]Behrouz Zolfaghari, Mohsen Sharifi:
The impact of skewed associativity on the replacement traffic in COMA multiprocessors. Comput. Syst. Sci. Eng. 21(6) (2006) - 2003
- [j2]Mohsen Sharifi, Behrouz Zolfaghari:
Optimizing the ready queue structure for dynamic scheduling strategies in real-time operating systems. Comput. Syst. Sci. Eng. 18(6): 325-330 (2003) - [j1]Mohsen Sharifi, Behrouz Zolfaghari:
Modeling and evaluating the time overhead induced by BER in COMA multiprocessors. J. Syst. Archit. 48(13-15): 377-385 (2003) - 2002
- [c2]Mohsen Sharifi, Behrouz Zolfaghari:
An Approach to Exploiting Skewed Associative Memories in Avionics Systems. ICPADS 2002: 517-522 - [c1]Mohsen Sharifi, Behrouz Zolfaghari:
The Application of CAM Memories in Real-time Systems. PDPTA 2002: 1897-1903
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:25 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint