M. H. R. Khouzani
  According to our database1,
  M. H. R. Khouzani
  authored at least 42 papers
  between 2008 and 2022.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2022
Channel-Supermodular Entropies: Order Theory and an Application to Query Anonymization.
    
  
    Entropy, 2022
    
  
  2020
Conditional Entropy and Data Processing: An Axiomatic Approach Based on Core-Concavity.
    
  
    IEEE Trans. Inf. Theory, 2020
    
  
  2019
Generalized Entropies and Metric-Invariant Optimal Countermeasures for Information Leakage Under Symmetric Constraints.
    
  
    IEEE Trans. Inf. Theory, 2019
    
  
Scalable min-max multi-objective cyber-security optimisation over probabilistic attack graphs.
    
  
    Eur. J. Oper. Res., 2019
    
  
    Proceedings of the 2019 IEEE Information Theory Workshop, 2019
    
  
    Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019
    
  
    Proceedings of the 32nd IEEE Computer Security Foundations Symposium, 2019
    
  
    Proceedings of the Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and Privacy, 2019
    
  
  2018
    IACR Cryptol. ePrint Arch., 2018
    
  
Generalised Entropies and Metric-Invariant Optimal Countermeasures for Information Leakage under Symmetric Constraints.
    
  
    CoRR, 2018
    
  
    Proceedings of the ECML PKDD 2018 Workshops, 2018
    
  
  2017
Game theoretic path selection to support security in device-to-device communications.
    
  
    Ad Hoc Networks, 2017
    
  
    Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017
    
  
  2016
    Proceedings of the Computer Security - ESORICS 2016, 2016
    
  
    Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016
    
  
  2015
    CoRR, 2015
    
  
    Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015
    
  
Optimal control for epidemic routing of two files with different priorities in Delay Tolerant Networks.
    
  
    Proceedings of the American Control Conference, 2015
    
  
  2014
    Proceedings of the Decision and Game Theory for Security - 5th International Conference, 2014
    
  
  2013
    IEEE Trans. Autom. Control., 2013
    
  
    Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
    
  
Optimal routing and scheduling in wireless networks with nodes powered by renewable and traditional energy sources.
    
  
    Proceedings of the First International Black Sea Conference on Communications and Networking, 2013
    
  
  2012
    IEEE/ACM Trans. Netw., 2012
    
  
    IEEE Trans. Inf. Theory, 2012
    
  
    IEEE Trans. Autom. Control., 2012
    
  
An Analytical Approach to the Adoption of Asymmetric Bidirectional Firewalls: Need for Regulation?
    
  
    CoRR, 2012
    
  
    Proceedings of the 2012 IEEE Global Communications Conference, 2012
    
  
  2011
    IEEE Trans. Autom. Control., 2011
    
  
    Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
    
  
    Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
    
  
    Proceedings of the 49th Annual Allerton Conference on Communication, 2011
    
  
  2010
    IEEE Trans. Mob. Comput., 2010
    
  
Optimal propagation of security patches in mobile wireless networks: extended abstract.
    
  
    Proceedings of the SIGMETRICS 2010, 2010
    
  
    Proceedings of the Information Theory and Applications Workshop, 2010
    
  
Dispatch then stop: Optimal dissemination of security patches in mobile wireless networks.
    
  
    Proceedings of the 49th IEEE Conference on Decision and Control, 2010
    
  
  2008
    Proceedings of the 42nd Annual Conference on Information Sciences and Systems, 2008