Ali Sedaghatbaf

Orcid: 0000-0002-3424-0067

According to our database1, Ali Sedaghatbaf authored at least 16 papers between 2014 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
DELFASE: A Deep Learning Method for Fault Space Exploration.
Proceedings of the 18th European Dependable Computing Conference, 2022

2021
DenDrift: A Drift-Aware Algorithm for Host Profiling.
CoRR, 2021

Automated Performance Testing Based on Active Deep Learning.
Proceedings of the 2nd IEEE/ACM International Conference on Automation of Software Test, 2021

2020
A Comparative Analysis of Hybrid Deep Learning Models for Human Activity Recognition.
Sensors, 2020

Safe Design of Flow Management Systems Using Rebeca.
J. Inf. Process., 2020

An Actor-Based Approach for Security Analysis of Cyber-Physical Systems.
Proceedings of the Formal Methods for Industrial Critical Systems, 2020

Developing Safe Smart Contracts.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

2019
SQME: a framework for modeling and evaluation of software architecture quality attributes.
Softw. Syst. Model., 2019

On-Off Attack on a Blockchain-based IoT System.
Proceedings of the 24th IEEE International Conference on Emerging Technologies and Factory Automation, 2019

An Actor-Based Design Platform for System of Systems.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

Using Bayesian Networks for a Cyberattacks Propagation Analysis in Systems-of-Systems.
Proceedings of the 26th Asia-Pacific Software Engineering Conference, 2019

2018
Reliability evaluation of UML/DAM software architectures under parameter uncertainty.
IET Softw., 2018

A method for dependability evaluation of software architectures.
Computing, 2018

2016
Quantitative evaluation of software security: an approach based on UML/SecAM and evidence theory.
ISC Int. J. Inf. Secur., 2016

2015
Software Architecture Modeling and Evaluation Based on Stochastic Activity Networks.
Proceedings of the Fundamentals of Software Engineering - 6th International Conference, 2015

2014
Attack modelling and security evaluation based on stochastic activity networks.
Secur. Commun. Networks, 2014


  Loading...