A new image encryption method: parallel sub-image encryption with hyper chaos O Mirzaei, M Yaghoobi, H Irani Nonlinear Dynamics 67 (1), 557-566, 2012 | 257 | 2012 |
AndrODet: An Adaptive Android Obfuscation Detector O Mirzaei, JM de Fuentes, J Tapiador, L Gonzalez-Manzano Future Generation Computer Systems 90, 240-261, 2019 | 69 | 2019 |
AndrEnsemble: Leveraging API Ensembles to Characterize Android Malware Families O Mirzaei, G Suarez-Tangil, JM de Fuentes, J Tapiador, G Stringhini ACM Asia Conference on Computer and Communications Security (ASIACCS), 307-314, 2019 | 35 | 2019 |
Preventing Server-Side Request Forgery Attacks B Jabiyev, O Mirzaei, A Kharraz, E Kirda ACM Symposium on Applied Computing (SAC), 1626-1635, 2021 | 29 | 2021 |
TriFlow: Triaging Android Applications using Speculative Information Flows O Mirzaei, G Suarez-Tangil, J Tapiador, JM de Fuentes ACM Asia Conference on Computer and Communications Security (ASIACCS), 640-651, 2017 | 24 | 2017 |
Offline signature recognition using modular neural networks with fuzzy response integration O Mirzaei, H Irani, HR Pourreza Proceedings of the 2011 International Conference on Network and Electronics …, 2011 | 19 | 2011 |
SCRUTINIZER: Detecting Code Reuse in Malware via Decompilation and Machine Learning O Mirzaei, R Vasilenko, E Kirda, L Lu, A Kharraz International Conference on Detection of Intrusions and Malware, and …, 2021 | 17 | 2021 |
A novel learning algorithm based on a multi-agent structure for solving multi-mode resource-constrained project scheduling problem O Mirzaei, MR Akbarzadeh-T Journal of Convergence 4 (1), 47-52, 2013 | 17 | 2013 |
Privacy models in wireless sensor networks: A survey JM de Fuentes, L González-Manzano, O Mirzaei Journal of Sensors 2016 (1), 4082084, 2016 | 16 | 2016 |
Dynamic Risk Assessment in IT Environments: A Decision Guide O Mirzaei, JM de Fuentes, LG Manzano Handbook of Research on Information and Cyber Security in the Fourth …, 2018 | 7 | 2018 |
A novel learning algorithm based on a multi-agent structure for solving multi-mode resource-constrained project scheduling problem O Mirzaei, MR Akbarzadeh-T Computer Science and its Applications, 231-242, 2012 | 6 | 2012 |
Analysis of an asymmetric cryptosystem based on boolean matrices and permutations M Nejati, M Kargozar, O Mirzaei, V Chahkandi 2015 International Congress on Technology, Communication and Knowledge …, 2015 | 5 | 2015 |
A stack-based chaotic algorithm for encryption of colored images H Khodadadi, O Mirzaei Journal of AI and Data Mining 5 (1), 29-37, 2017 | 3 | 2017 |
Vertex coloring based on artificial bee colony algorithm V Chahkandi, O Mirzaei 2015 International Congress on Technology, Communication and Knowledge …, 2015 | 2 | 2015 |
Techniques for Advanced Android Malware Triage O Mirzaei PhD Thesis, Universidad Carlos III de Madrid (UC3M), Spain, 2019 | 1 | 2019 |
Different Victims, Same Layout: Email Visual Similarity Detection for Enhanced Email Protection S Shukla, O Mirzaei arXiv preprint arXiv:2408.16945, 2024 | | 2024 |
Systems and Methods for Detecting Visually Similar Emails O Mirzaei, S Kapoor, S Shukla US Patent App. US18/786,766, 2024 | | 2024 |
Retrospective Email Campaign Detection, Categorization, Classification, and Remediation A Singh, O Mirzaei US Patent 63/535,534, 2023 | | 2023 |