Security challenges with network functions virtualization MD Firoozjaei, JP Jeong, H Ko, H Kim Future Generation Computer Systems 67, 315-324, 2017 | 97 | 2017 |
An evaluation framework for industrial control system cyber incidents MD Firoozjaei, N Mahmoudyar, Y Baseri, AA Ghorbani International Journal of Critical Infrastructure Protection 36, 100487, 2022 | 38 | 2022 |
Hy-Bridge: A Hybrid Blockchain for Privacy-Preserving and Trustful Energy Transactions in Internet-of-Things Platforms MD Firoozjaei, A Ghorbani, H Kim, J Song Sensors 20 (3), 928, 2020 | 38 | 2020 |
An evaluation framework for privacy‐preserving solutions applicable for blockchain‐based internet‐of‐things platforms MD Firoozjaei, R Lu, AA Ghorbani Security and Privacy, e131, 2020 | 27 | 2020 |
SDN-based security services using interface to network security functions J Kim, MD Firoozjaei, JP Jeong, H Kim, JS Park 2015 International Conference on Information and Communication Technology …, 2015 | 26 | 2015 |
Implementing geo-encryption in GSM cellular network MD Firoozjaei, J Vahidi Communications (COMM), 2012 9th International Conference on, 299-302, 2012 | 19 | 2012 |
Privacy-preserving nearest neighbor queries using geographical features of cellular networks MD Firoozjaei, J Yu, H Choi, H Kim Computer Communications 98, 11-19, 2017 | 18 | 2017 |
EVChain: A Blockchain-based Credit Sharing in Electric Vehicles Charging MD Firoozjaei, A Ghorbani, H Kim, J Song 2019 17th International Conference on Privacy, Security and Trust (PST), 1-5, 2019 | 17 | 2019 |
Memory forensics tools: a comparative analysis MD Firoozjaei, A Habibi Lashkari, AA Ghorbani Journal of Cyber Security Technology 6 (3), 149-173, 2022 | 10 | 2022 |
Detecting False Emergency Requests Using Callers' Reporting Behaviors and Locations MD Firoozjaei, J Park, H Kim 2016 30th International Conference on Advanced Information Networking and …, 2016 | 8 | 2016 |
Privacy Preserving Nearest Neighbor Search based on Topologies in Cellular Networks MD Firoozjaei, J Yu, H Kim AINA 2015, 2015 | 7 | 2015 |
O2TR: Offline OTR messaging system under network disruption MD Firoozjaei, MC Kim, JS Song, H Kim Computers & Security 82, 227-240, 2019 | 4 | 2019 |
O2TR: Offline Off-the-Record (OTR) Messaging MD Firoozjaei, SM Lee, H Kim International Workshop on Information Security Applications, 61-71, 2017 | 4 | 2017 |
Time-series load data analysis for user power profiling MD Firoozjaei, MC Kim, D Alhadidi 2023 25th International Conference on Advanced Communication Technology …, 2023 | 3 | 2023 |
Other Operating Systems AF Abdul Kadir, A Habibi Lashkari, M Daghmehchi Firoozjaei Understanding Cybersecurity on Smartphones: Challenges, Strategies, and …, 2024 | 1 | 2024 |
Parent process termination: an adversarial technique for persistent malware MD Firoozjaei, S Samet, AA Ghorbani Journal of Cyber Security Technology, 1-26, 2023 | 1* | 2023 |
iPhone Operating System (iOS) AF Abdul Kadir, A Habibi Lashkari, M Daghmehchi Firoozjaei Understanding Cybersecurity on Smartphones: Challenges, Strategies, and …, 2024 | | 2024 |
The Best Security Practices AF Abdul Kadir, A Habibi Lashkari, M Daghmehchi Firoozjaei Understanding Cybersecurity on Smartphones: Challenges, Strategies, and …, 2024 | | 2024 |
Windows Operating System AF Abdul Kadir, A Habibi Lashkari, M Daghmehchi Firoozjaei Understanding Cybersecurity on Smartphones: Challenges, Strategies, and …, 2024 | | 2024 |
Mobile Application Security AF Abdul Kadir, A Habibi Lashkari, M Daghmehchi Firoozjaei Understanding Cybersecurity on Smartphones: Challenges, Strategies, and …, 2024 | | 2024 |