Hakem Beitollahi

Orcid: 0000-0002-8420-6545

According to our database1, Hakem Beitollahi authored at least 49 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Experimental evaluation of RISC-V micro-architecture against fault injection attack.
Microprocess. Microsystems, 2024

Edge-sorter: A hardware sorting engine for area & power constrained edge computing devices.
Microprocess. Microsystems, 2024

Optimizing Information Freshness in Dual-Connection Cellular Networks for Real-Time Applications.
IEEE Access, 2024

2023
Detection of application-layer DDoS attacks using machine learning and genetic algorithms.
Comput. Secur., December, 2023

WiSE: When Learning Assists Resolving STT-MRAM Efficiency Challenges.
IEEE Trans. Emerg. Top. Comput., 2023

Rei: A Reconfigurable Interconnection Unit for Array-Based CNN Accelerators.
IEEE Trans. Emerg. Top. Comput., 2023

Detection of Application-Layer DDoS Attacks Produced by Various Freely Accessible Toolkits Using Machine Learning.
IEEE Access, 2023

2022
A security-aware hardware scheduler for modern multi-core systems with hard real-time constraints.
Microprocess. Microsystems, November, 2022

RASHT: A Partially Reconfigurable Architecture for Efficient Implementation of CNNs.
IEEE Trans. Very Large Scale Integr. Syst., 2022

An Energy- and Reliability-Aware Task Scheduling in Real-Time MPSoC Systems.
J. Circuits Syst. Comput., 2022

Q-scheduler: A temperature and energy-aware deep Q-learning technique to schedule tasks in real-time multiprocessor embedded systems.
IET Comput. Digit. Tech., 2022

Hardware Support for Efficient and Low-Power Data Sorting in Massive Data Application: The 3-D Sorting Method.
IEEE Consumer Electron. Mag., 2022

Application Layer DDoS Attack Detection Using Cuckoo Search Algorithm-Trained Radial Basis Function.
IEEE Access, 2022

2021
Joint Effects of Aging and Process Variations on Soft Error Rate of Nano-Scale Digital Circuits.
J. Circuits Syst. Comput., 2021

Efficient Scheduling of Dependent Tasks in Many-Core Real-Time System Using a Hardware Scheduler.
Proceedings of the 2021 IEEE High Performance Extreme Computing Conference, 2021

2020
A Dynamic General Accelerator for Integer and Fixed-Point Processing.
IEEE Trans. Very Large Scale Integr. Syst., 2020

HRHS: A High-Performance Real-Time Hardware Scheduler.
IEEE Trans. Parallel Distributed Syst., 2020

Mist-Scan: A Secure Scan Chain Architecture to Resist Scan-Based Attacks in Cryptographic Chips.
Proceedings of the 33rd IEEE International System-on-Chip Conference, 2020

2019
RTHS: A Low-Cost High-Performance Real-Time Hardware Sorter, Using a Multidimensional Sorting Algorithm.
IEEE Trans. Very Large Scale Integr. Syst., 2019

A temperature-aware and energy-efficient fuzzy technique to schedule tasks in heterogeneous MPSoC systems.
J. Supercomput., 2019

An Efficient Technique to Detect Stealthy Hardware Trojans Independent of the Trigger Size.
J. Electron. Test., 2019

A New Hardware Accelerator for Data Sorting in Area & Energy Constrained Architectures.
Proceedings of the 62nd IEEE International Midwest Symposium on Circuits and Systems, 2019

An Efficient Sorting Architecture for Area and Energy Constrained Edge Computing Devices.
Proceedings of the 17th International Conference on High Performance Computing & Simulation, 2019

2018
Circuit enclaves susceptible to hardware Trojans insertion at gate-level designs.
IET Comput. Digit. Tech., 2018

PAT-Noxim: A Precise Power & Thermal Cycle-Accurate NoC Simulator.
Proceedings of the 31st IEEE International System-on-Chip Conference, 2018

A Flexible and Efficient Reconfigurable Architecture based on Multi-Agent Systems.
Proceedings of the 9th International Symposium on Telecommunications, 2018

2014
ConnectionScore: a statistical technique to resist application-layer DDoS attacks.
J. Ambient Intell. Humaniz. Comput., 2014

2012
A Four-StepTechnique forTackling DDoS Attacks.
Proceedings of the 3rd International Conference on Ambient Systems, 2012

Tackling Application-layer DDoS Attacks.
Proceedings of the 3rd International Conference on Ambient Systems, 2012

Analyzing well-known countermeasures against distributed denial of service attacks.
Comput. Commun., 2012

Ferris wheel: A ring based onion circuit for hidden services.
Comput. Commun., 2012

2011
A dependable architecture to mitigate distributed denial of service attacks on network-based control systems.
Int. J. Crit. Infrastructure Prot., 2011

A Cooperative Mechanism to Defense against Distributed Denial of Service Attacks.
Proceedings of the IEEE 10th International Conference on Trust, 2011

A Ring Based Onion Circuit for Hidden Services.
Proceedings of the Information Security Technology for Applications, 2011

2010
Dynamic Multilayer Routing to Achieve Location-Hiding.
Proceedings of the 16th IEEE Pacific Rim International Symposium on Dependable Computing, 2010

2009
Making Overlay Networks more Robust to Massive Failures.
Proceedings of the 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing, 2009

Empirical Study of Tolerating Denial-of-Service Attacks with the Fosel Architecture.
Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, 2009

ICT resilience of power control systems: experimental results from the CRUTIAL testbeds.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

2008
Dependable Overlay Networks.
Proceedings of the 14th IEEE Pacific Rim International Symposium on Dependable Computing, 2008

FOSeL: Filtering by Helping an Overlay Security Layer to Mitigate DoS Attacks.
Proceedings of The Seventh IEEE International Symposium on Networking Computing and Applications, 2008

An overlay protection layer against Denial-of-Service attacks.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008

Testbeds for Assessing Critical Scenarios in Power Control Systems.
Proceedings of the Critical Information Infrastructure Security, 2008

Comparing Chord, CAN, and Pastry overlay networks for resistance to DoS attacks.
Proceedings of the CRiSIS '08, 2008

Analysis of Peer-to-Peer networks from a dependability perspective.
Proceedings of the CRiSIS '08, 2008

2007
Fault-Tolerant Earliest-Deadline-First Scheduling Algorithm.
Proceedings of the 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), 2007

A Robust Semantic Overlay Network for Microgrid Control Applications.
Proceedings of the Architecting Dependable Systems V [the book is a result from the WADS 2007 and the Third Workshop on the Role of Software Architecture for Testing and Analysis], 2007

2006
Fault-Tolerant Rate-Monotonic Scheduling Algorithm in Uniprocessor Embedded Systems.
Proceedings of the 12th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2006), 2006

Fault-Tolerant Partitioning Scheduling Algorithms in Real-Time Multiprocessor Systems.
Proceedings of the 12th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2006), 2006

2005
Performance Evaluation of Fault-Tolerant Scheduling Algorithms in Real-Time Multiprocessor Systems.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2005


  Loading...