Arash Shaghaghi

Orcid: 0000-0001-6630-9519

According to our database1, Arash Shaghaghi authored at least 34 papers between 2014 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Enhancing Security in Third-Party Library Reuse - Comprehensive Detection of 1-day Vulnerability through Code Patch Analysis.
CoRR, 2024

Towards Weaknesses and Attack Patterns Prediction for IoT Devices.
CoRR, 2024

Towards Threat Modelling of IoT Context-Sharing Platforms.
CoRR, 2024

Towards Detecting IoT Event Spoofing Attacks Using Time-Series Classification.
CoRR, 2024

AuditNet: A Conversational AI-based Security Assistant [DEMO].
CoRR, 2024

Multi-MedChain: Multi-Party Multi-Blockchain Medical Supply Chain Management System.
CoRR, 2024

Lack of Systematic Approach to Security of IoT Context Sharing Platforms.
Proceedings of the 21st Annual International Conference on Privacy, Security and Trust, 2024

AuditNet: Conversational AI Security Assistant.
Proceedings of the Adjunct Proceedings of the 26th International Conference on Mobile Human-Computer Interaction, 2024

Data After Death: Australian User Preferences and Future Solutions to Protect Posthumous User Data.
Proceedings of the Human Aspects of Information Security and Assurance, 2024

2022
AI for next generation computing: Emerging trends and future directions.
Internet Things, 2022

iRECOVer: Patch your IoT on-the-fly.
Future Gener. Comput. Syst., 2022

Zero Trust Architecture (ZTA): A Comprehensive Survey.
IEEE Access, 2022

2021
LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA).
Comput. Secur., 2021

Detecting Internet of Things Bots: A Comparative Study.
IEEE Access, 2021

Is This IoT Device Likely to Be Secure? Risk Score Prediction for IoT Devices Using Gradient Boosting Machines.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking and Services, 2021

2020
Security-Aware Autonomic Allocation of Cloud Resources: A Model, Research Trends, and Future Directions.
J. Organ. End User Comput., 2020

Echo-ID: Smart User Identification Leveraging Inaudible Sound Signals.
IEEE Access, 2020

Towards a Lightweight Continuous Authentication Protocol for Device-to-Device Communication.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Towards Decentralized IoT Updates Delivery Leveraging Blockchain and Zero-Knowledge Proofs.
Proceedings of the 19th IEEE International Symposium on Network Computing and Applications, 2020

Towards a Distributed Defence Mechanism Against IoT-based Bots.
Proceedings of the 45th IEEE Conference on Local Computer Networks, 2020

Attacking with Bitcoin: Using Bitcoin to Build Resilient Botnet Armies.
Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems, 2020

Health Access Broker: Secure, Patient-Controlled Management of Personal Health Records in the Cloud.
Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems, 2020

Software-Defined Network (SDN) Data Plane Security: Issues, Solutions, and Future Directions.
Proceedings of the Handbook of Computer Networks and Cyber Security, 2020

2019
PLAR: Towards a Pluggable Software Architecture for Securing IoT Devices.
Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, 2019

2018
Securing Software-Defined Network Enabled Enterprises Against Insider Threats.
PhD thesis, 2018

Software-Defined Network (SDN) Data Plane Security: Issues, Solutions and Future Directions.
CoRR, 2018

Gwardar: Towards Protecting a Software-Defined Network from Malicious Network Operating Systems.
Proceedings of the 17th IEEE International Symposium on Network Computing and Applications, 2018

Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations.
Proceedings of the 43rd IEEE Conference on Local Computer Networks, 2018

Function-Based Access Control (FBAC): Towards Preventing Insider Threats in Organizations.
Proceedings of the From Database to Cyber Security, 2018

2017
WedgeTail 2.0: An Intrusion Prevention System for the Data Plane of Software Defined Networks.
CoRR, 2017

WedgeTail: An Intrusion Prevention System for the Data Plane of Software Defined Networks.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Towards Policy Enforcement Point as a Service (PEPS).
Proceedings of the 2016 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), 2016

Function-Based Access Control (FBAC): From Access Control Matrix to Access Control Tensor.
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016

2014
An SDN-based Framework for Detection of Illegal Rebroadcasting of Channels in P2PTV.
Proceedings of the 2014 Workshop on Design, 2014


  Loading...