Arash Shaghaghi

Orcid: 0000-0001-6630-9519

According to our database1, Arash Shaghaghi authored at least 24 papers between 2014 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
AI for next generation computing: Emerging trends and future directions.
Internet Things, 2022

iRECOVer: Patch your IoT on-the-fly.
Future Gener. Comput. Syst., 2022

Zero Trust Architecture (ZTA): A Comprehensive Survey.
IEEE Access, 2022

2021
LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA).
Comput. Secur., 2021

Detecting Internet of Things Bots: A Comparative Study.
IEEE Access, 2021

Is This IoT Device Likely to Be Secure? Risk Score Prediction for IoT Devices Using Gradient Boosting Machines.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking and Services, 2021

2020
Security-Aware Autonomic Allocation of Cloud Resources: A Model, Research Trends, and Future Directions.
J. Organ. End User Comput., 2020

Echo-ID: Smart User Identification Leveraging Inaudible Sound Signals.
IEEE Access, 2020

Towards a Lightweight Continuous Authentication Protocol for Device-to-Device Communication.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Towards Decentralized IoT Updates Delivery Leveraging Blockchain and Zero-Knowledge Proofs.
Proceedings of the 19th IEEE International Symposium on Network Computing and Applications, 2020

Towards a Distributed Defence Mechanism Against IoT-based Bots.
Proceedings of the 45th IEEE Conference on Local Computer Networks, 2020

Attacking with Bitcoin: Using Bitcoin to Build Resilient Botnet Armies.
Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems, 2020

Health Access Broker: Secure, Patient-Controlled Management of Personal Health Records in the Cloud.
Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems, 2020

Software-Defined Network (SDN) Data Plane Security: Issues, Solutions, and Future Directions.
Proceedings of the Handbook of Computer Networks and Cyber Security, 2020

2019
PLAR: Towards a Pluggable Software Architecture for Securing IoT Devices.
Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, 2019

2018
Software-Defined Network (SDN) Data Plane Security: Issues, Solutions and Future Directions.
CoRR, 2018

Gwardar: Towards Protecting a Software-Defined Network from Malicious Network Operating Systems.
Proceedings of the 17th IEEE International Symposium on Network Computing and Applications, 2018

Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations.
Proceedings of the 43rd IEEE Conference on Local Computer Networks, 2018

Function-Based Access Control (FBAC): Towards Preventing Insider Threats in Organizations.
Proceedings of the From Database to Cyber Security, 2018

2017
WedgeTail 2.0: An Intrusion Prevention System for the Data Plane of Software Defined Networks.
CoRR, 2017

WedgeTail: An Intrusion Prevention System for the Data Plane of Software Defined Networks.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Towards Policy Enforcement Point as a Service (PEPS).
Proceedings of the 2016 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), 2016

Function-Based Access Control (FBAC): From Access Control Matrix to Access Control Tensor.
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016

2014
An SDN-based Framework for Detection of Illegal Rebroadcasting of Channels in P2PTV.
Proceedings of the 2014 Workshop on Design, 2014


  Loading...