Morteza Safaei Pour

Orcid: 0000-0003-1176-6274

According to our database1, Morteza Safaei Pour authored at least 25 papers between 2016 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
EV Charging Infrastructure Discovery to Contextualize Its Deployment Security.
IEEE Trans. Netw. Serv. Manag., February, 2024

Evaluating Port Emissions Prediction Model Resilience Against Cyberthreats.
Proceedings of the Computational Logistics - 15th International Conference, 2024

Exploring Internet-Scale Data-Driven Intelligence: Empirical Analysis of the Russo-Ukrainian Conflict.
Proceedings of the IEEE International Conference on Communications Workshops, 2024

2023
A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security.
Comput. Secur., May, 2023

Ransomware Detection Using Federated Learning with Imbalanced Datasets.
CoRR, 2023

Federated Learning Approach for Distributed Ransomware Analysis.
CoRR, 2023

Helium-based IoT Devices: Threat Analysis and Internet-scale Exploitations.
Proceedings of the 19th International Conference on Wireless and Mobile Computing, 2023

Data-Centric Machine Learning Approach for Early Ransomware Detection and Attribution.
Proceedings of the NOMS 2023, 2023

Cybersecurity Considerations for the Design of an AI-Driven Distributed Optimization of Container Carbon Emissions Reduction for Freight Operations.
Proceedings of the Computational Logistics - 14th International Conference, 2023

Federated Learning Approach for Distributed Ransomware Analysis.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023

2022
HoneyComb: A Darknet-Centric Proactive Deception Technique For Curating IoT Malware Forensic Artifacts.
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022

Separating privacy and security in online decision-making process: The case of Venmo.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022

Crowdfunding Project Success for Game Developers: Evidence from Kickstarter and Steam.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022

A Near Real-Time Scheme for Collecting and Analyzing IoT Malware Artifacts at Scale.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Sanitizing the IoT Cyber Security Posture: An Operational CTI Feed Backed up by Internet Measurements.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

2020
Internet-scale Insecurity of Consumer Internet of Things: An Empirical Measurements Perspective.
ACM Trans. Manag. Inf. Syst., 2020

Stochastic Modeling, Analysis and Investigation of IoT-Generated Internet Scanning Activities.
IEEE Netw. Lett., 2020

On data-driven curation, learning, and analysis for inferring evolving internet-of-Things (IoT) botnets in the wild.
Comput. Secur., 2020

2019
Comprehending the IoT cyber threat landscape: A data dimensionality reduction technique to infer and characterize Internet-scale IoT probing campaigns.
Digit. Investig., 2019

Theoretic derivations of scan detection operating on darknet traffic.
Comput. Commun., 2019

Data-driven Curation, Learning and Analysis for Inferring Evolving IoT Botnets in the Wild.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Implications of Theoretic Derivations on Empirical Passive Measurements for Effective Cyber Threat Intelligence Generation.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Assessing Internet-wide Cyber Situational Awareness of Critical Sectors.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
A new CPA resistant software implementation for symmetric ciphers with smoothed power consumption: SIMON case study.
ISC Int. J. Inf. Secur., 2017

2016
A new CPA resistant software implementation for symmetric ciphers with smoothed power consumption.
Proceedings of the 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, 2016


  Loading...