Siavash Ahmadi
Orcid: 0000-0002-8801-337X
According to our database1,
Siavash Ahmadi
authored at least 19 papers
between 2014 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Spotting and Mitigating DDoS Attacks Using Deep Learning for Online Traffic Analysis.
ISC Int. J. Inf. Secur., July, 2025
A Lightweight Online Intrusion Detection and Localization Framework for Industrial Control Systems.
ISC Int. J. Inf. Secur., July, 2025
ISC Int. J. Inf. Secur., July, 2025
ISC Int. J. Inf. Secur., July, 2025
Impossible 4-Tuple Attack: A New Mixture-Based Cryptanalysis Applied to Reduced-Round AES-128.
IEEE Access, 2025
GenAtt NIDS Attack: A Practical Generative Adversarial Attack Against Network Intrusion Detection Systems.
Proceedings of the 29th International Computer Conference, Computer Society of Iran, 2025
2024
IEEE Internet Things J., March, 2024
2023
ISC Int. J. Inf. Secur., October, 2023
2020
Generalized Meet in the Middle Cryptanalysis of Block Ciphers With an Automated Search Algorithm.
IEEE Access, 2020
2019
Biclique Cryptanalysis of Block Ciphers LBlock and TWINE-80 with Practical Data Complexity.
ISC Int. J. Inf. Secur., 2019
2018
Int. J. Commun. Syst., 2018
2017
Inf. Process. Lett., 2017
Proceedings of the 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2017
Proceedings of the 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2017
2016
Proceedings of the 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, 2016
Proceedings of the 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, 2016
2014
Low-Data Complexity Biclique Cryptanalysis of Block Ciphers With Application to Piccolo and HIGHT.
IEEE Trans. Inf. Forensics Secur., 2014
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014