Behrouz Zolfaghari

Orcid: 0000-0001-6691-0988

According to our database1, Behrouz Zolfaghari authored at least 28 papers between 2002 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Cancer Prognosis and Diagnosis Methods Based on Ensemble Learning.
ACM Comput. Surv., December, 2023

Accurate threat hunting in industrial internet of things edge devices.
Digit. Commun. Networks, October, 2023

A tradeoff paradigm shift in cryptographically-secure pseudorandom number generation based on discrete logarithm.
J. Inf. Secur. Appl., March, 2023

2022
IIoT Deep Malware Threat Hunting: From Adversarial Example Detection to Adversarial Scenario Detection.
IEEE Trans. Ind. Informatics, 2022

From Random Numbers to Random Objects.
Entropy, 2022

The Odyssey of Entropy: Cryptography.
Entropy, 2022

The Modular Subset-Sum Problem and the size of deletion correcting codes.
Des. Codes Cryptogr., 2022

The Dichotomy of Cloud and IoT: Cloud-Assisted IoT From a Security Perspective.
CoRR, 2022

Crypto Makes AI Evolve.
CoRR, 2022

Key-Dependent Feedback Configuration Matrix of Primitive σ-LFSR and Resistance to Some Known Plaintext Attacks.
IEEE Access, 2022

Proactive Detection of Query-based Adversarial Scenarios in NLP Systems.
Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, 2022

Perfect Secrecy in IoT - A Hybrid Combinatorial-Boolean Approach
Springer, ISBN: 978-3-031-13190-5, 2022

2021
Root causing, detecting, and fixing flaky tests: State of the art and future roadmap.
Softw. Pract. Exp., 2021

Everlasting security of quantum key distribution with 1K-DWCDM and quadratic hash.
Quantum Inf. Comput., 2021

Lower Bounds on Bandwidth Requirements of Regenerating Code Parameter Scaling in Distributed Storage Systems.
IEEE Commun. Lett., 2021

Cryptography in Hierarchical Coded Caching: System Model and Cost Analysis.
Entropy, 2021

Content Delivery Networks: State of the Art, Trends, and Future Roadmap.
ACM Comput. Surv., 2021

SteelEye: An Application-Layer Attack Detection and Attribution Model in Industrial Control Systems using Semi-Deep Learning.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021

2020
Generalized M<sub>m, r</sub>-Network: A Case for Fixed Message Dimensions.
IEEE Commun. Lett., 2020

{The application of σ-LFSR in Key-Dependent Feedback Configuration for Word-Oriented Stream Ciphers.
CoRR, 2020

2017
S-Restricted Compositions Revisited.
Discret. Math. Theor. Comput. Sci., 2017

2011
Systematic Selection of CRC Generator Polynomials to Detect Double Bit Errors in Ethernet Networks.
Proceedings of the Recent Trends in Wireless and Mobile Networks, 2011

2008
YAARC: yet another approach to further reducing the rate of conflict misses.
J. Supercomput., 2008

2006
The impact of skewed associativity on the replacement traffic in COMA multiprocessors.
Comput. Syst. Sci. Eng., 2006

2003
Modeling and evaluating the time overhead induced by BER in COMA multiprocessors.
J. Syst. Archit., 2003

Optimizing the ready queue structure for dynamic scheduling strategies in real-time operating systems.
Comput. Syst. Sci. Eng., 2003

2002
The Application of CAM Memories in Real-time Systems.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2002

An Approach to Exploiting Skewed Associative Memories in Avionics Systems.
Proceedings of the 9th International Conference on Parallel and Distributed Systems, 2002


  Loading...