A Survey of Android Security Threats and Defenses. B Rashidi, CJ Fung J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 6 (3), 3-35, 2015 | 115 | 2015 |
A collaborative DDoS defence framework using network function virtualization B Rashidi, C Fung, E Bertino IEEE Transactions on Information Forensics and Security 12 (10), 2483-2497, 2017 | 93 | 2017 |
Vfence: A defense against distributed denial of service attacks using network function virtualization AHM Jakaria, W Yang, B Rashidi, C Fung, MA Rahman 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC …, 2016 | 65 | 2016 |
Design and implementation of low power digital FIR filter based on low power multipliers and adders on Xilinx FPGA B Rashidi, B Rashidi, M Pourormazd 2011 3rd International Conference on Electronics Computer Technology 2, 18-22, 2011 | 52 | 2011 |
Android resource usage risk assessment using hidden Markov model and online learning B Rashidi, C Fung, E Bertino Computers & Security 65, 90-107, 2017 | 51 | 2017 |
CoFence: A collaborative DDoS defence using network function virtualization B Rashidi, C Fung 2016 12th international conference on network and service management (CNSM …, 2016 | 47 | 2016 |
Dude, ask the experts!: Android resource access permission recommendation with RecDroid B Rashidi, C Fung, T Vu 2015 IFIP/IEEE international symposium on integrated network management (IM …, 2015 | 40 | 2015 |
Recdroid: A resource access permission control portal and recommendation service for smartphone users B Rashidi, C Fung, T Vu Proceedings of the ACM MobiCom workshop on Security and privacy in mobile …, 2014 | 39 | 2014 |
Android malicious application detection using support vector machine and active learning B Rashidi, C Fung, E Bertino Network and Service Management (CNSM), 2017 13th International Conference on, 2017 | 36 | 2017 |
Android User Privacy Preserving through Crowdsourcing B Rashidi, C Fung, A Nguyen, T Vu, E Bertino IEEE Transactions on Information Forensics and Security (TIFS), 2017 | 34 | 2017 |
A survey on interoperability in the cloud computing environments B Rashidi, M Sharifi, T Jafari International Journal of Modern Education and Computer Science 5 (6), 17, 2013 | 26 | 2013 |
Dynamic ddos defense resource allocation using network function virtualization AHM Jakaria, B Rashidi, MA Rahman, C Fung, W Yang Proceedings of the ACM international workshop on security in software …, 2017 | 23 | 2017 |
Implementation of an optimized and pipelined combinational logic rijndael S-Box on FPGA B Rashidi, B Rashidi IJ Computer Network and Information Security 1, 41-48, 2013 | 23 | 2013 |
Android fine-grained permission control system with real-time expert recommendations B Rashidi, C Fung, T Vu Pervasive and Mobile Computing 32, 62-77, 2016 | 22 | 2016 |
CARAF: crypto agility risk assessment framework C Ma, L Colon, J Dera, B Rashidi, V Garg Journal of Cybersecurity 7 (1), tyab013, 2021 | 15 | 2021 |
Xdroid: An android permission control using hidden markov chain and online learning B Rashidi, C Fung 2016 IEEE Conference on Communications and Network Security (CNS), 46-54, 2016 | 14 | 2016 |
A Scalable and Flexible DDoS Mitigation System Using Network Function Virtualization B Rashidi, C Fung, M Rahman Network Operations and Management Symposium (NOMS), 2018 IEEE/IFIP, 2018 | 13 | 2018 |
Low Power FPGA implementation of digital FIR filter based on low power multiplexer base shift/add multiplier B Rashidi, F Mirzaei, B Rashidi, M Pourormazd International Journal of Computer Theory and Engineering 5 (2), 346, 2013 | 13 | 2013 |
FPGA based a new low power and self-timed AES 128-bit encryption algorithm for encryption audio signal B Rashidi, B Rashidi International Journal of Computer Network and Information Security 5 (2), 10, 2013 | 13 | 2013 |
A game-theoretic model for defending against malicious users in recdroid B Rashidi, C Fung 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015 | 11 | 2015 |