Arash Shaghaghi
Orcid: 0000-0001-6630-9519
According to our database1,
Arash Shaghaghi
authored at least 47 papers
between 2014 and 2026.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2026
A secure framework for containerized IoT applications in integrated edge-cloud computing environments.
Future Gener. Comput. Syst., 2026
2025
Nosy Layers, Noisy Fixes: Tackling DRAs in Federated Learning Systems using Explainable AI.
CoRR, May, 2025
CoRR, January, 2025
Hotpatching on the Fly - Mitigating Drone Incidents Arising From Incorrect Configuration.
IEEE Trans. Dependable Secur. Comput., 2025
IEEE Access, 2025
Proceedings of the Companion Proceedings of the ACM on Web Conference 2025, 2025
Proceedings of the Companion Proceedings of the ACM on Web Conference 2025, 2025
Proceedings of the IEEE Symposium on Security and Privacy, 2025
Enhancing Security in Third-Party Library Reuse - Comprehensive Detection of 1-day Vulnerability through Code Patch Analysis.
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025
What Lies Beneath: An Empirical Study of Silent Vulnerability Fixes in Open-Source Software.
Proceedings of the 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2025
Proceedings of the 2025 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2025
Proceedings of the 2025 Australasian Computer Science Week, 2025
2024
Enhancing Security in Third-Party Library Reuse - Comprehensive Detection of 1-day Vulnerability through Code Patch Analysis.
CoRR, 2024
CoRR, 2024
CoRR, 2024
Proceedings of the 17th International Conference on Security of Information and Networks, 2024
Proceedings of the 21st Annual International Conference on Privacy, Security and Trust, 2024
Proceedings of the 22nd International Symposium on Network Computing and Applications, 2024
Proceedings of the Adjunct Proceedings of the 26th International Conference on Mobile Human-Computer Interaction, 2024
Data After Death: Australian User Preferences and Future Solutions to Protect Posthumous User Data.
Proceedings of the Human Aspects of Information Security and Assurance, 2024
2022
Internet Things, 2022
2021
LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA).
Comput. Secur., 2021
Is This IoT Device Likely to Be Secure? Risk Score Prediction for IoT Devices Using Gradient Boosting Machines.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking and Services, 2021
2020
Security-Aware Autonomic Allocation of Cloud Resources: A Model, Research Trends, and Future Directions.
J. Organ. End User Comput., 2020
IEEE Access, 2020
Towards a Lightweight Continuous Authentication Protocol for Device-to-Device Communication.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Towards Decentralized IoT Updates Delivery Leveraging Blockchain and Zero-Knowledge Proofs.
Proceedings of the 19th IEEE International Symposium on Network Computing and Applications, 2020
Proceedings of the 45th IEEE Conference on Local Computer Networks, 2020
Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems, 2020
Health Access Broker: Secure, Patient-Controlled Management of Personal Health Records in the Cloud.
Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems, 2020
Software-Defined Network (SDN) Data Plane Security: Issues, Solutions, and Future Directions.
Proceedings of the Handbook of Computer Networks and Cyber Security, 2020
2019
Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, 2019
2018
PhD thesis, 2018
Software-Defined Network (SDN) Data Plane Security: Issues, Solutions and Future Directions.
CoRR, 2018
Gwardar: Towards Protecting a Software-Defined Network from Malicious Network Operating Systems.
Proceedings of the 17th IEEE International Symposium on Network Computing and Applications, 2018
Proceedings of the 43rd IEEE Conference on Local Computer Networks, 2018
Function-Based Access Control (FBAC): Towards Preventing Insider Threats in Organizations.
Proceedings of the From Database to Cyber Security, 2018
2017
WedgeTail 2.0: An Intrusion Prevention System for the Data Plane of Software Defined Networks.
CoRR, 2017
WedgeTail: An Intrusion Prevention System for the Data Plane of Software Defined Networks.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
Proceedings of the 2016 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), 2016
Function-Based Access Control (FBAC): From Access Control Matrix to Access Control Tensor.
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016
2014
Proceedings of the 2014 Workshop on Design, 2014