Markov modeling of moving target defense games H Maleki, S Valizadeh, W Koch, A Bestavros, M van Dijk Proceedings of the 2016 ACM Workshop on Moving Target Defense, 81−92, 2016 | 122 | 2016 |
On the universally composable security of openstack K Hogan, H Maleki, R Rahaeimehr, R Canetti, M Van Dijk, J Hennessey, ... 2019 IEEE Cybersecurity Development (SecDev), 20-33, 2019 | 11 | 2019 |
New clone-detection approach for RFID-based supply chains H Maleki, R Rahaeimehr, C Jin, M Van Dijk 2017 IEEE International Symposium on Hardware Oriented Security and Trust …, 2017 | 10 | 2017 |
SoK: RFID-based clone detection mechanisms for supply chains H Maleki, R Rahaeimehr, M Van Dijk Proceedings of the 2017 Workshop on Attacks and Solutions in Hardware …, 2017 | 9 | 2017 |
Weak-Unforgeable Tags for Secure Supply Chain Management M van Dijk, C Jin, H Maleki, PH Nguyen, R Rahaeimehr 2018 International Conference on Financial Cryptography and Data Security (FC), 2018 | 6 | 2018 |
ForensiBlock: A Provenance-Driven Blockchain Framework for Data Forensics and Auditability AJ Akbarfam, M Heidaripour, H Maleki, G Dorai, G Agrawal arXiv preprint arXiv:2308.03927, 2023 | 5 | 2023 |
Dlacb: Deep learning based access control using blockchain AJ Akbarfam, S Barazandeh, H Maleki, D Gupta arXiv preprint arXiv:2303.14758, 2023 | 4 | 2023 |
Privacy-preserving framework to facilitate shared data access for wearable devices D Troyer, J Henry, H Maleki, G Dorai, B Sumner, G Agrawal, J Ingram 2021 IEEE International Conference on Big Data (Big Data), 2583-2592, 2021 | 4 | 2021 |
Lightsource: Ultra lightweight clone detection of rfid tags from software unclonable responses H Maleki, R Rahaeimehr, M van Dijk Cryptology ePrint Archive, 2016 | 4 | 2016 |
Using universal composition to design and analyze secure complex hardware systems R Canetti, M Van Dijk, H Maleki, U Rührmair, P Schaumont 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), 520-525, 2020 | 2 | 2020 |
Deep Learning Meets Blockchain for Automated and Secure Access Control A Jodeiri Akbarfam, S Barazandeh, H Maleki International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 12, 2023 | | 2023 |
SecFob: A Remote Keyless Entry Security Solution B Bolt, H Maleki, G Agrawal, JD Morris, K Farabi 2023 IEEE International Smart Cities Conference (ISC2), 1-7, 2023 | | 2023 |
Securing Pseudonym Schemes for Vehicular Privacy M Hasan, H Maleki, G Agrawal 2022 IEEE International Conference on Big Data (Big Data), 6647-6649, 2022 | | 2022 |
CCSW'22: The 2022 Cloud Computing Security Workshop M van Dijk, F Regazzoni Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | | 2022 |
Trusted CI-the NSF Cybersecurity Center of Excellence: Award Year 3 Report K Shute | | 2022 |
Towards Security Analysis of OpenStack H Maleki | | 2019 |
Compound of reversible one-dimensional CA rules for two-dimensional CA with cryptographic applications H Maleki, B Sadeghiyan 2009 14th International CSI Computer Conference, 287-292, 2009 | | 2009 |
3rd High-Performance Computing Security Workshop NNSF Joint | | |
SecDev 2019 BM Brosgol, C Dross, Y Moy, KD Albab, R Issa, K Hogan, H Maleki, W Bai, ... | | |