Urmăriți
Simin Nadjm-Tehrani
Titlu
Citat de
Citat de
Anul
Crowdroid: behavior-based malware detection system for android
I Burguera, U Zurutuza, S Nadjm-Tehrani
Proceedings of the 1st ACM workshop on Security and privacy in smartphones …, 2011
15442011
Mobility models for UAV group reconnaissance applications
E Kuiper, S Nadjm-Tehrani
2006 International Conference on Wireless and Mobile Communications (ICWMC …, 2006
2832006
Geographical routing with location service in intermittently connected MANETs
E Kuiper, S Nadjm-Tehrani
IEEE Transactions on Vehicular Technology 60 (2), 592-604, 2010
1742010
Attitudes and perceptions of IoT security in critical societal services
M Asplund, S Nadjm-Tehrani
IEEE Access 4, 2130-2138, 2016
1612016
A taxonomy for management and optimization of multiple resources in edge computing
K Toczé, S Nadjm-Tehrani
Wireless Communications and Mobile Computing 2018 (1), 7476201, 2018
1482018
Opportunistic DTN routing with window-aware adaptive replication
G Sandulescu, S Nadjm-Tehrani
Proceedings of the 4th Asian Conference on Internet Engineering, 103-112, 2008
1482008
Algorithmic debugging with assertions
W Drabent, S Nadjm-Tehrani, J Maluszyński
Meta-programming in logic programming, 501-521, 1989
1081989
Adwice–anomaly detection with real-time incremental clustering
K Burbeck, S Nadjm-Tehrani
Information Security and Cryptology–ICISC 2004: 7th International Conference …, 2005
1052005
Adaptive real-time anomaly detection with incremental clustering
K Burbeck, S Nadjm-Tehrani
information security technical report 12 (1), 56-67, 2007
892007
On generating network traffic datasets with synthetic attacks for intrusion detection
CG Cordero, E Vasilomanolakis, A Wainakh, M Mühlhäuser, ...
ACM Transactions on Privacy and Security (TOPS) 24 (2), 1-39, 2021
792021
Blockchain-based event processing in supply chains—A case study at IKEA
T Sund, C Lööf, S Nadjm-Tehrani, M Asplund
Robotics and Computer-Integrated Manufacturing 65, 101971, 2020
762020
Exploiting bro for intrusion detection in a SCADA system
R Udd, M Asplund, S Nadjm-Tehrani, M Kazemtabrizi, M Ekstedt
Proceedings of the 2nd ACM International Workshop on Cyber-Physical System …, 2016
742016
Scale-up and performance studies of three agent platforms
K Burbeck, D Garpe, S Nadjm-Tehrani
IEEE International Conference on Performance, Computing, and Communications …, 2004
662004
Emerging information infrastructures: Cooperation in disasters
M Asplund, S Nadjm-Tehrani, J Sigholm
International Workshop on Critical Information Infrastructures Security, 258-270, 2008
652008
The use of assertions in algorithmic debugging
W Drabent
Proc. International Conference of fifth generation computer systems, 1988, 1988
651988
Anomaly detection in water management systems
M Raciti, J Cucurull, S Nadjm-Tehrani
Critical Infrastructure Protection: Information Infrastructure Models …, 2012
612012
Time-aware utility-based resource allocation in wireless networks
C Curescu, S Nadjm-Tehrani
IEEE transactions on parallel and distributed systems 16 (7), 624-636, 2005
612005
Geographical routing in intermittently connected ad hoc networks
E Kuiper, S Nadjm-Tehrani
22nd International Conference on Advanced Information Networking and …, 2008
582008
Real-time hierarchical control
M Morin, S Nadjm-Tehrani, P Osterling, E Sandewall
IEEE software 9 (5), 51-57, 1992
561992
A STAMP-based ontology approach to support safety and security analyses
DP Pereira, C Hirata, S Nadjm-Tehrani
Journal of Information Security and Applications 47, 302-319, 2019
542019
Sistemul nu poate realiza operația în acest moment. Încercați din nou mai târziu.
Articole 1–20