Abbas Ghaemi Bafghi

Orcid: 0000-0001-6193-6804

According to our database1, Abbas Ghaemi Bafghi authored at least 33 papers between 2004 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
A robust PRNU-based source camera attribution with convolutional neural networks.
J. Supercomput., January, 2025

2023
CAPTAIN: Community-based Advanced Persistent Threat Analysis in IT Networks.
Int. J. Crit. Infrastructure Prot., September, 2023

Towards Event Aggregation for Reducing the Volume of Logged Events During IKC Stages of APT Attacks.
ISC Int. J. Inf. Secur., July, 2023

Machine Learning in Digital Forensics: A Systematic Literature Review.
CoRR, 2023

2020
Bayesian Decision Network-Based Security Risk Management Framework.
J. Netw. Syst. Manag., 2020

Extension of Cube Attack with Probabilistic Equations and its Application on Cryptanalysis of KATAN Cipher.
ISC Int. J. Inf. Secur., 2020

Cube distinguisher extraction using division property in block ciphers.
IET Inf. Secur., 2020

A drift aware adaptive method based on minimum uncertainty for anomaly detection in social networking.
Expert Syst. Appl., 2020

2019
Applying Catastrophe Theory for Network Anomaly Detection in Cloud Computing Traffic.
Secur. Commun. Networks, 2019

2018
A Systematic Mapping Study on Intrusion Alert Analysis in Intrusion Detection Systems.
ACM Comput. Surv., 2018

2017
PiSHi: click the images and I tell if you are a human.
Int. J. Inf. Sec., 2017

Software Implementation And Evaluation Of Lightweight Symmetric Block Ciphers Of The Energy Perspectives And Memory.
CoRR, 2017

Evaluation of Lightweight Block Ciphers in Hardware Implementation: A Comprehensive Survey.
CoRR, 2017

2016
A foresight model for intrusion response management.
Comput. Secur., 2016

A comprehensive approach for network attack forecasting.
Comput. Secur., 2016

2015
Anomaly detection and foresight response strategy for wireless sensor networks.
Wirel. Networks, 2015

E-correlator: an entropy-based alert correlation system.
Secur. Commun. Networks, 2015

2014
An anonymous mobile payment protocol based on SWPP.
Electron. Commer. Res., 2014

A Privacy-Preserving Electronic Payment System for DRM.
CoRR, 2014

Considering temporal and environmental characteristics of vulnerabilities in network security risk assessment.
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014

2013
Design and formal verification of DZMBE+.
ISC Int. J. Inf. Secur., 2013

CATEF: Confidence-aware trust estimation framework.
Proceedings of the 10th International ISC Conference on Information Security and Cryptology, 2013

A security analysis tool for web application reinforcement against SQL injection attacks (SQLIAs).
Proceedings of the 10th International ISC Conference on Information Security and Cryptology, 2013

2012
A confidence-aware interval-based trust model.
ISC Int. J. Inf. Secur., 2012

SEIMCHA: a new semantic image CAPTCHA using geometric transformations.
ISC Int. J. Inf. Secur., 2012

2011
Centralized Key Management Scheme in Wireless Sensor Networks.
Wirel. Pers. Commun., 2011

Propagation of trust and confidence using intervals.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

Multiple SEIMCHA: Multiple semantic image CAPTCHA.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

2010
Alternative Shared Key Replacement in Heterogeneous Wireless Sensor Networks.
Proceedings of the 8th Annual Conference on Communication Networks and Services Research, 2010

Improving multiplication and reminder using implementation based on word and index.
Proceedings of the 1st Amrita ACM-W Celebration on Women in Computing in India, 2010

2008
Finding the differential characteristics of block ciphers with neural networks.
Inf. Sci., 2008

Incremental Hybrid Intrusion Detection Using Ensemble of Weak Classifiers.
Proceedings of the Advances in Computer Science and Engineering, 2008

2004
Finding suitable differential characteristics for block ciphers with Ant colony technique.
Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28, 2004


  Loading...