Analyzing well-known countermeasures against distributed denial of service attacks H Beitollahi, G Deconinck Computer Communications 35 (11), 1312-1332, 2012 | 175 | 2012 |
Tackling application-layer DDoS attacks H Beitollahi, G Deconinck Procedia Computer Science 10, 432-441, 2012 | 75 | 2012 |
Peer-to-peer networks applied to power grid H Beitollahi, G Deconinck Proceedings of the International conference on Risks and Security of …, 2007 | 61 | 2007 |
ConnectionScore: a statistical technique to resist application-layer DDoS attacks H Beitollahi, G Deconinck Journal of Ambient Intelligence and Humanized Computing 5, 425-442, 2014 | 54 | 2014 |
ICT resilience of power control systems: experimental results from the CRUTIAL testbeds G Dondossola, G Garrone, J Szanto, G Deconinck, T Loix, H Beitollahi 2009 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2009 | 41 | 2009 |
RTHS: A low-cost high-performance real-time hardware sorter, using a multidimensional sorting algorithm A Norollah, D Derafshi, H Beitollahi, M Fazeli IEEE Transactions on Very Large Scale Integration (VLSI) Systems 27 (7 …, 2019 | 34 | 2019 |
Fault-tolerant earliest-deadline-first scheduling algorithm H Beitollahi, SG Miremadi, G Deconinck 2007 IEEE International Parallel and Distributed Processing Symposium, 1-6, 2007 | 32 | 2007 |
A robust semantic overlay network for microgrid control applications G Deconinck, K Vanthournout, H Beitollahi, Z Qui, R Duan, B Nauwelaers, ... Architecting Dependable Systems V, 101-123, 2008 | 31 | 2008 |
Communication overlays and agents for dependable smart power grids G Deconinck, W Labeeuw, S Vandael, H Beitollahi, K De Craemer, ... 2010 5th International Conference on Critical Infrastructure (CRIS), 1-7, 2010 | 26 | 2010 |
FOSeL: filtering by helping an overlay security layer to mitigate DoS attacks H Beitollahi, G Deconinck 2008 Seventh IEEE International Symposium on Network Computing and …, 2008 | 25 | 2008 |
HRHS: A high-performance real-time hardware scheduler D Derafshi, A Norollah, M Khosroanjam, H Beitollahi IEEE Transactions on Parallel and distributed Systems 31 (4), 897-908, 2019 | 23 | 2019 |
Application layer DDoS attack detection using cuckoo search algorithm-trained radial basis function H Beitollahi, DM Sharif, M Fazeli IEEE Access 10, 63844-63854, 2022 | 22 | 2022 |
Testbeds for assessing critical scenarios in power control systems G Dondossola, G Deconinck, F Garrone, H Beitollahi Critical Information Infrastructure Security: Third International Workshop …, 2009 | 22 | 2009 |
Fault-tolerant partitioning scheduling algorithms in real-time multiprocessor systems H Beitollahi, G Deconinck 2006 12th Pacific Rim International Symposium on Dependable Computing (PRDC …, 2006 | 21 | 2006 |
A dependable architecture to mitigate distributed denial of service attacks on network-based control systems H Beitollahi, G Deconinck International Journal of Critical Infrastructure Protection 4 (3-4), 107-123, 2011 | 20 | 2011 |
A cooperative mechanism to defense against distributed denial of service attacks H Beitollahi, G Deconinck 2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011 | 20 | 2011 |
Testbed deployment of representative control algorithms G Deconinck, H Beitollahi, G Dondossola, F Garrone, T Rigole Deliverable D9, Project CRUTIAL EC IST-FP6-STREP 27513, 2008 | 16 | 2008 |
An overlay protection layer against denial-of-service attacks H Beitollahi, G Deconinck 2008 IEEE International Symposium on Parallel and Distributed Processing, 1-8, 2008 | 15 | 2008 |
Analyzing the chord peer-to-peer network for power grid applications H Beitollahi, G Deconinck Fourth IEEE Young Researchers Symposium in Electrical Power Engineering, 5, 2008 | 15 | 2008 |
Q-thermal: A Q-learning-based thermal-aware routing algorithm for 3-D network on-chips N Shahabinejad, H Beitollahi IEEE Transactions on Components, Packaging and Manufacturing Technology 10 …, 2020 | 14 | 2020 |