Crowdroid: behavior-based malware detection system for android I Burguera, U Zurutuza, S Nadjm-Tehrani Proceedings of the 1st ACM workshop on Security and privacy in smartphones …, 2011 | 1544 | 2011 |
Mobility models for UAV group reconnaissance applications E Kuiper, S Nadjm-Tehrani 2006 International Conference on Wireless and Mobile Communications (ICWMC …, 2006 | 283 | 2006 |
Geographical routing with location service in intermittently connected MANETs E Kuiper, S Nadjm-Tehrani IEEE Transactions on Vehicular Technology 60 (2), 592-604, 2010 | 174 | 2010 |
Attitudes and perceptions of IoT security in critical societal services M Asplund, S Nadjm-Tehrani IEEE Access 4, 2130-2138, 2016 | 161 | 2016 |
A taxonomy for management and optimization of multiple resources in edge computing K Toczé, S Nadjm-Tehrani Wireless Communications and Mobile Computing 2018 (1), 7476201, 2018 | 148 | 2018 |
Opportunistic DTN routing with window-aware adaptive replication G Sandulescu, S Nadjm-Tehrani Proceedings of the 4th Asian Conference on Internet Engineering, 103-112, 2008 | 148 | 2008 |
Algorithmic debugging with assertions W Drabent, S Nadjm-Tehrani, J Maluszyński Meta-programming in logic programming, 501-521, 1989 | 108 | 1989 |
Adwice–anomaly detection with real-time incremental clustering K Burbeck, S Nadjm-Tehrani Information Security and Cryptology–ICISC 2004: 7th International Conference …, 2005 | 105 | 2005 |
Adaptive real-time anomaly detection with incremental clustering K Burbeck, S Nadjm-Tehrani information security technical report 12 (1), 56-67, 2007 | 89 | 2007 |
On generating network traffic datasets with synthetic attacks for intrusion detection CG Cordero, E Vasilomanolakis, A Wainakh, M Mühlhäuser, ... ACM Transactions on Privacy and Security (TOPS) 24 (2), 1-39, 2021 | 79 | 2021 |
Blockchain-based event processing in supply chains—A case study at IKEA T Sund, C Lööf, S Nadjm-Tehrani, M Asplund Robotics and Computer-Integrated Manufacturing 65, 101971, 2020 | 76 | 2020 |
Exploiting bro for intrusion detection in a SCADA system R Udd, M Asplund, S Nadjm-Tehrani, M Kazemtabrizi, M Ekstedt Proceedings of the 2nd ACM International Workshop on Cyber-Physical System …, 2016 | 74 | 2016 |
Scale-up and performance studies of three agent platforms K Burbeck, D Garpe, S Nadjm-Tehrani IEEE International Conference on Performance, Computing, and Communications …, 2004 | 66 | 2004 |
Emerging information infrastructures: Cooperation in disasters M Asplund, S Nadjm-Tehrani, J Sigholm International Workshop on Critical Information Infrastructures Security, 258-270, 2008 | 65 | 2008 |
The use of assertions in algorithmic debugging W Drabent Proc. International Conference of fifth generation computer systems, 1988, 1988 | 65 | 1988 |
Anomaly detection in water management systems M Raciti, J Cucurull, S Nadjm-Tehrani Critical Infrastructure Protection: Information Infrastructure Models …, 2012 | 61 | 2012 |
Time-aware utility-based resource allocation in wireless networks C Curescu, S Nadjm-Tehrani IEEE transactions on parallel and distributed systems 16 (7), 624-636, 2005 | 61 | 2005 |
Geographical routing in intermittently connected ad hoc networks E Kuiper, S Nadjm-Tehrani 22nd International Conference on Advanced Information Networking and …, 2008 | 58 | 2008 |
Real-time hierarchical control M Morin, S Nadjm-Tehrani, P Osterling, E Sandewall IEEE software 9 (5), 51-57, 1992 | 56 | 1992 |
A STAMP-based ontology approach to support safety and security analyses DP Pereira, C Hirata, S Nadjm-Tehrani Journal of Information Security and Applications 47, 302-319, 2019 | 54 | 2019 |