A review on security of smart farming and precision agriculture: Security aspects, attacks, threats and countermeasures A Yazdinejad, B Zolfaghari, A Azmoodeh, A Dehghantanha, H Karimipour, ... Applied Sciences 11 (16), 7518, 2021 | 92 | 2021 |
Content Delivery Networks: State of the Art, Trends and Future Roadmap B Zolfaghari, G Srivastava, S Roy, HR Nemati, F Afghah, T Koshiba, ... ACM Computing Surveys, 2020 | 82 | 2020 |
Fuzzy sliding mode control design for a class of nonlinear systems with structured and unstructured uncertainties MR Soltanpour, B Zolfaghari, M Soltani, MH Khooban International Journal of Innovative Computing, Information and Control 9 (7 …, 2013 | 70 | 2013 |
Accurate threat hunting in industrial internet of things edge devices A Yazdinejad, B Zolfaghari, A Dehghantanha, H Karimipour, G Srivastava, ... Digital Communications and Networks 9 (5), 1123-1130, 2023 | 52 | 2023 |
Chaotic image encryption: state-of-the-art, ecosystem, and future roadmap B Zolfaghari, T Koshiba Applied System Innovation 5 (3), 57, 2022 | 44 | 2022 |
Steeleye: An application-layer attack detection and attribution model in industrial control systems using semi-deep learning S Nakhodchi, B Zolfaghari, A Yazdinejad, A Dehghantanha 2021 18th International Conference on Privacy, Security and Trust (PST), 1-8, 2021 | 32 | 2021 |
Root causing, detecting, and fixing flaky tests: State of the art and future roadmap B Zolfaghari, RM Parizi, G Srivastava, Y Hailemariam Software: Practice and Experience 51 (5), 851-867, 2021 | 26 | 2021 |
The odyssey of entropy: cryptography B Zolfaghari, K Bibak, T Koshiba Entropy 24 (2), 266, 2022 | 22 | 2022 |
MCIC: automated identification of cellulases from metagenomic data and characterization based on temperature and pH dependence M Foroozandeh Shahraki, S Ariaeenejad, F Fallah Atanaki, B Zolfaghari, ... Frontiers in Microbiology 11, 567863, 2020 | 22 | 2020 |
The dichotomy of cloud and iot: Cloud-assisted iot from a security perspective B Zolfaghari, A Yazdinejad, A Dehghantanha, J Krzciok, K Bibak arXiv preprint arXiv:2207.01590, 2022 | 21 | 2022 |
IIoT deep malware threat hunting: from adversarial example detection to adversarial scenario detection B Esmaeili, A Azmoodeh, A Dehghantanha, H Karimipour, B Zolfaghari, ... IEEE Transactions on Industrial Informatics 18 (12), 8477-8486, 2022 | 18 | 2022 |
Cancer Prognosis and Diagnosis Methods Based on Ensemble Learning B Zolfaghari, L Mirsadeghi, K Bibak, K Kavousi ACM Computing Surveys 55 (12), 1-34, 2023 | 17 | 2023 |
Supplementary Materials for: Cancer Prognosis and Diagnosis Methods Based on Ensemble Learning B Zolfaghari, L Mirsadeghi, K Bibak, K Kavousi ACM Computing Surveys 55, 262:1-262:18, 2023 | 17* | 2023 |
Everlasting security of quantum key distribution with 1K-DWCDM and quadratic hash. K Bibak, R Ritchie, B Zolfaghari Quantum Inf. Comput. 21 (3&4), 181-202, 2021 | 17 | 2021 |
The dichotomy of neural networks and cryptography: war and peace B Zolfaghari, T Koshiba Applied System Innovation 5 (4), 61, 2022 | 16 | 2022 |
Cryptography in hierarchical coded caching: System model and cost analysis B Zolfaghari, V Singh, BK Rai, K Bibak, T Koshiba Entropy 23 (11), 1459, 2021 | 14 | 2021 |
Statistical trend analysis of physically unclonable functions: An approach via text mining B Zolfaghari, K Bibak, T Koshiba, HR Nemati, P Mitra CRC Press, 2021 | 14 | 2021 |
An Efficient and Secure Approach to Multi-User Image Steganography Using CRC-Based CDMA H Sheidaeian, B Zolfaghari Third International Conference on Signal Acquisition and Processing, 2011 | 14* | 2011 |
Key-Dependent Feedback Configuration Matrix of Primitive σ–LFSR and Resistance to Some Known Plaintext Attacks S Nandi, S Krishnaswamy, B Zolfaghari, P Mitra Ieee Access 10, 44840-44854, 2022 | 11 | 2022 |
Crypto makes ai evolve B Zolfaghari, H Nemati, N Yanai, K Bibak Crypto and AI: From Coevolution to Quantum Revolution, 73-92, 2023 | 10 | 2023 |