Seguir
Arash Shaghaghi
Arash Shaghaghi
Senior Lecturer, University of New South Wales (UNSW), Sydney, Australia.
Dirección de correo verificada de unsw.edu.au
Título
Citado por
Citado por
Año
AI for next generation computing: Emerging trends and future directions
SS Gill, M Xu, C Ottaviani, P Patros, R Bahsoon, A Shaghaghi, M Golec, ...
Internet of Things 19, 100514, 2022
3272022
Software-defined network (SDN) data plane security: issues, solutions, and future directions
A Shaghaghi, MA Kaafar, R Buyya, S Jha
Handbook of Computer Networks and Cyber Security: Principles and Paradigms …, 2020
1532020
Zero trust architecture (zta): A comprehensive survey
NF Syed, SW Shah, A Shaghaghi, A Anwar, Z Baig, R Doss
IEEE Access 10, 57143-57179, 2022
832022
Wedgetail: An intrusion prevention system for the data plane of software defined networks
A Shaghaghi, MA Kaafar, S Jha
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
642017
LCDA: Lightweight continuous device-to-device authentication for a zero trust architecture (ZTA)
SW Shah, NF Syed, A Shaghaghi, A Anwar, Z Baig, R Doss
Computers & Security 108, 102351, 2021
322021
Function-Based Access Control (FBAC) From Access Control Matrix to Access Control Tensor
Y Desmedt, A Shaghaghi
Proceedings of the 8th ACM CCS International Workshop on Managing Insider …, 2016
252016
Attacking with bitcoin: Using bitcoin to build resilient botnet armies
D Kamenski, A Shaghaghi, M Warren, SS Kanhere
13th International Conference on Computational Intelligence in Security for …, 2021
142021
Security-aware autonomic allocation of cloud resources: a model, research trends, and future directions
SS Gill, A Shaghaghi
Journal of Organizational and End User Computing (JOEUC) 32 (3), 15-22, 2020
132020
PLAR: Towards a pluggable software architecture for securing IoT devices
U Maroof, A Shaghaghi, S Jha
Proceedings of the 2nd International ACM Workshop on Security and Privacy …, 2019
132019
Gargoyle: A network-based insider attack resilient framework for organizations
A Shaghaghi, SS Kanhere, MA Kaafar, E Bertino, S Jha
2018 IEEE 43rd Conference on Local Computer Networks (LCN), 553-561, 2018
122018
Detecting internet of things bots: A comparative study
B Stephens, A Shaghaghi, R Doss, SS Kanhere
IEEE Access 9, 160391-160401, 2021
112021
Health access broker: Secure, patient-controlled management of personal health records in the cloud
Z Abaid, A Shaghaghi, R Gunawardena, S Seneviratne, A Seneviratne, ...
13th International Conference on Computational Intelligence in Security for …, 2021
112021
Ai for next generation computing: Emerging trends and future directions. Internet Things 19: 100514
SS Gill, M Xu, C Ottaviani, P Patros, R Bahsoon, A Shaghaghi, M Golec, ...
102022
AI for next generation computing: emerging trends and future directions. Internet of Things 19, 100514 (2022)
SS Gill, M Xu, C Ottaviani, P Patros, R Bahsoon, A Shaghaghi, S Uhlig
102022
Towards decentralized IoT updates delivery leveraging blockchain and zero-knowledge proofs
E Puggioni, A Shaghaghi, R Doss, SS Kanhere
2020 IEEE 19th International Symposium on Network Computing and Applications …, 2020
102020
Towards policy enforcement point as a service (peps)
A Shaghaghi, MA Kaafar, S Scott-Hayward, SS Kanhere, S Jha
2016 IEEE Conference on Network Function Virtualization and Software Defined …, 2016
92016
Towards a lightweight continuous authentication protocol for device-to-device communication
SWA Shah, NF Syed, A Shaghaghi, A Anwar, Z Baig, R Doss
2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020
82020
iRECOVer: Patch your IoT on-the-fly
U Maroof, A Shaghaghi, R Michelin, S Jha
Future Generation Computer Systems 132, 178-193, 2022
62022
Gwardar: Towards protecting a software-defined network from malicious network operating systems
A Shaghaghi, SS Kanhere, MA Kaafar, S Jha
2018 IEEE 17th international symposium on network computing and applications …, 2018
62018
Function-based access control (fbac): Towards preventing insider threats in organizations
Y Desmedt, A Shaghaghi
From Database to Cyber Security: Essays Dedicated to Sushil Jajodia on the …, 2018
62018
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20