A method for evaluating the consequence propagation of security attacks in cyber–physical systems H Orojloo, MA Azgomi Future Generation Computer Systems 67, 57-71, 2017 | 75 | 2017 |
A game-theoretic approach to model and quantify the security of cyber-physical systems H Orojloo, MA Azgomi Computers in Industry 88, 44-57, 2017 | 71 | 2017 |
A Tabu search based routing algorithm for wireless sensor networks H Orojloo, AT Haghighat Wireless Networks 22, 1711-1724, 2016 | 36 | 2016 |
A method for modeling and evaluation of the security of cyber-physical systems H Orojloo, MA Azgomi 2014 11th International ISC Conference on Information Security and …, 2014 | 35 | 2014 |
Modelling and evaluation of the security of cyber‐physical systems using stochastic Petri nets H Orojloo, M Abdollahi Azgomi IET Cyber‐Physical Systems: Theory & Applications 4 (1), 50-57, 2019 | 32 | 2019 |
Predicting the behavior of attackers and the consequences of attacks against cyber‐physical systems H Orojloo, M Abdollahi Azgomi Security and Communication Networks 9 (18), 6111-6136, 2016 | 24 | 2016 |
A stochastic game model for evaluating the impacts of security attacks against cyber-physical systems H Orojloo, MA Azgomi Journal of Network and Systems Management 26, 929-965, 2018 | 23 | 2018 |
Energy and path aware ant colony optimization based routing algorithm for wireless sensor networks H Orojloo, RA Moghadam, AT Haghighat Global Trends in Computing and Communication Systems: 4th International …, 2012 | 11 | 2012 |
Evaluating the complexity and impacts of attacks on cyber-physical systems H Orojloo, MA Azgomi 2015 CSI Symposium on Real-Time and Embedded Systems and Technologies (RTEST …, 2015 | 10 | 2015 |
A method for assessing the security risk in cyber-physical systems with incomplete information using Bayesian game theory H Sepehrzadeh Karafan Quarterly Scientific Journal 19 (1), 495-521, 2022 | 2 | 2022 |
A method for insider threat assessment by modeling the internal employee interactions H Sepehrzadeh International Journal of Information Security 22 (5), 1385-1393, 2023 | | 2023 |
A method for quantitative evaluation of security risk in cyber-physical systems H Sepehrzadeh Electronic and Cyber Defense 11 (2), 71-80, 2023 | | 2023 |
مدلی برای قدرت سایبری؛ بعد پنجم قدرت ملّی سپهرزاده, حامد فصلنامه علمی کارافن 19 (3), 501-527, 2022 | | 2022 |
Predicting Malicious Behavior of Employees using Game Theory H Sepehrzadeh | | 2022 |
A Method for Reliability Evaluation of Cyber-Physical Systems H Sepehrzadeh C4I Journal 6 (1), 16-30, 2022 | | 2022 |
Security Evaluation of Cyber-Physical Systems with Redundant Components H Sepehrzadeh 2022 CPSSI 4th International Symposium on Real-Time and Embedded Systems and …, 2022 | | 2022 |
روشی برای ارزیابی مخاطره امنیتی در سیستمهای سایبر-فیزیکی با اطلاعات ناقص با استفاده از نظریه بازی بیزی سپهرزاده, حامد فصلنامه علمی کارافن 19 (1), 495-521, 2022 | | 2022 |
A Model for Cyber Power, the Fifth Dimension of National Power H Sepehrzadeh Karafan Quarterly Research Journal, In Persian, 2022 | | 2022 |
A Method for Estimating the Uncertainties in Attacker's Behavior Using Attack Graph Structure LS Mohajirani, H Orojloo Recent Advances in Communications and Networking Technology (Formerly Recent …, 2017 | | 2017 |