Your selections:
Detection and compensation of covert service-degrading intrusions in cyber physical systems through intelligent adaptive control
- Farivar, Faezeh, Haghighi, Mohammad, Barchinezhad, Soheila, Jolfaei, Alireza
Data exchange in delay tolerant networks using joint inter- and intra-flow network coding
- Ostovari, Pouya, Wu, Jie, Jolfaei, Alireza
- Peng, Yuhuai, Jolfaei, Alireza, Yu, Keping
SPEED: A deep learning assisted privacy-preserved framework for intelligent transportation systems
- Usman, Muhammad, Jan, Mian, Jolfaei, Alireza
Preserving the confidentiality of digital images using a chaotic encryption scheme
- Jolfaei, Alireza, Matinfar, Ahmadreza, Mirghadri, Abdolrasoul
A lightweight integrity protection scheme for low latency smart grid applications
- Jolfaei, Alireza, Kant, Krishna
Secure passive keyless entry and start system using machine learning
- Ahmad, Usman, Song, Hong, Bilal, Awais, Alazab, Mamoun, Jolfaei, Alireza
Cybersecurity indexes for eHealth
- Burke, Wendy, Oseni, Taiwo, Jolfaei, Alireza, Gondal, Iqbal
Microgrid communications - protocols and standards
- Kumar, Shantanu, Islam, Syed, Jolfaei, Alireza
A secure lightweight texture encryption scheme
- Jolfaei, Alireza, Wu, Xinwen, Muthukkumarasamy, Vallipuram
A lightweight integrity protection scheme for fast communications in smart grid
- Jolfaei, Alireza, Kant, Krishna
- Usman, Muhammad, Jan, Mian, Jolfaei, Alireza, Xu, Min, He, Xiangjian, Chen, Jinjun
RaSEC : an intelligent framework for reliable and secure multilevel edge computing in industrial environments
- Usman, Muhammad, Jolfaei, Alireza, Jan, Mian
A scalable framework for healthcare monitoring application using the Internet of Medical Things
- Balasubramanian, Venki, Jolfaei, Alireza
Differentially private streaming to untrusted edge servers in intelligent transportation system
- Ezabadi, Soheila, Jolfaei, Alireza, Kulik, Lars, Ramamohanarao, Kotagiri
Vulnerability modelling for hybrid industrial control system networks
- Ur-Rehman, Attiq, Gondal, Iqbal, Kamruzzaman, Joarder, Jolfaei, Alireza
Sensitivity analysis for vulnerability mitigation in hybrid networks
- Ur‐rehman, Attiq, Gondal, Iqbal, Kamruzzaman, Joarder, Jolfaei, Alireza
A low-complexity equalizer for video broadcasting in cyber-physical social systems through handheld mobile devices
- Solyman, Ahmad, Attar, Hani, Khosravi, Mohammad, Menon, Varun, Jolfaei, Alireza, Balasubramanian, Venki, Selvaraj, Buvana, Tavallali, Pooya
Attacks on self-driving cars and their countermeasures : a survey
- Chowdhury, Abdullahi, Karmakar, Gour, Kamruzzaman, Joarder, Jolfaei, Alireza, Das, Rajkumar
SCA-LFD : side-channel analysis-based load forecasting disturbance in the energy internet
- Ding, Li, Wu, Jun, Li, Changlian, Jolfaei, Alireza, Zheng, Xi
Are you sure you would like to clear your session, including search history and login status?