Simin Nadjm-Tehrani

Orcid: 0000-0002-1485-0802

Affiliations:
  • Linköping University, Sweden


According to our database1, Simin Nadjm-Tehrani authored at least 139 papers between 1988 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
The Necessary Shift: Toward a Sufficient Edge Computing.
IEEE Pervasive Comput., 2024

NetGAP: A graph grammar approach for concept design of networked platforms with extra-functional requirements.
Eng. Appl. Artif. Intell., 2024

NeuralGAP: Deep Learning Evaluation of Networked Avionic Architectures.
Proceedings of the 19th European Dependable Computing Conference, 2024

2023
Dependable and secure infrastructures and systems in intelligent environments.
J. Reliab. Intell. Environ., September, 2023

Protocol study and anomaly detection for server-driven traffic in SCADA networks.
Int. J. Crit. Infrastructure Prot., September, 2023

VioLinn: Proximity-aware Edge Placementwith Dynamic and Elastic Resource Provisioning.
ACM Trans. Internet Things, February, 2023

Security-Enhancing Digital Twins: Characteristics, Indicators, and Future Perspectives.
IEEE Secur. Priv., 2023

Finding Minimum-Cost Explanations for Predictions made by Tree Ensembles.
CoRR, 2023

5G Handover: When Forward Security Breaks.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

Vulnerability Analysis of an Electric Vehicle Charging Ecosystem.
Proceedings of the Critical Information Infrastructures Security, 2023

Mapping and Analysis of Common Vulnerabilities in Popular Web Servers.
Proceedings of the Critical Information Infrastructures Security, 2023

Formal Verification of Tree Ensembles against Real-World Composite Geometric Perturbations.
Proceedings of the Workshop on Artificial Intelligence Safety 2023 (SafeAI 2023) co-located with the Thirty-Seventh AAAI Conference on Artificial Intelligence (AAAI 2023), 2023

2022
Digital Twins for Cyber-Physical Systems Security (Dagstuhl Seminar 22171).
Dagstuhl Reports, 2022

Synthesis of a Controller Algorithm for Safety-Critical Systems.
IEEE Access, 2022

2021
On Generating Network Traffic Datasets with Synthetic Attacks for Intrusion Detection.
ACM Trans. Priv. Secur., 2021

Abstraction models for verifying resource adequacy of IMA systems at concept level.
Sci. Comput. Program., 2021

Scaling up Memory-Efficient Formal Verification Tools for Tree Ensembles.
CoRR, 2021

A model-based approach for analysing network communication timeliness in IMA systems at concept level.
Proceedings of the RTNS'2021: 29th International Conference on Real-Time Networks and Systems, 2021

2020
Timing Assurance of Avionic Reconfiguration Schemes Using Formal Analysis.
IEEE Trans. Aerosp. Electron. Syst., 2020

Formal verification of input-output mappings of tree ensembles.
Sci. Comput. Program., 2020

Blockchain-based event processing in supply chains - A case study at IKEA.
Robotics Comput. Integr. Manuf., 2020

Characterization and modeling of an edge computing mixed reality workload.
J. Cloud Comput., 2020

Permissioned blockchains and distributed databases: A performance study.
Concurr. Comput. Pract. Exp., 2020

A Comparative Analysis of Emulated and Real IEC-104 Spontaneous Traffic in Power System Networks.
Proceedings of the Cyber-Physical Security for Critical Infrastructures Protection, 2020

2019
A STAMP-based ontology approach to support safety and security analyses.
J. Inf. Secur. Appl., 2019

Performance Study of Mixed Reality for Edge Computing.
Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing, 2019

Towards Edge Benchmarking: A Methodology for Characterizing Edge Workloads.
Proceedings of the IEEE 4th International Workshops on Foundations and Applications of Self* Systems, 2019

An Abstraction-Refinement Approach to Formal Verification of Tree Ensembles.
Proceedings of the Computer Safety, Reliability, and Security, 2019

Combining GSN and STPA for Safety Arguments.
Proceedings of the Computer Safety, Reliability, and Security, 2019

Timing Patterns and Correlations in Spontaneous SCADA Traffic for Anomaly Detection.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

ORCH: Distributed Orchestration Framework using Mobile Edge Devices.
Proceedings of the 3rd IEEE International Conference on Fog and Edge Computing, 2019

Verifying Resource Adequacy of Networked IMA Systems at Concept Level.
Proceedings of the Formal Techniques for Safety-Critical Systems, 2019

2018
A Taxonomy for Management and Optimization of Multiple Resources in Edge Computing.
Wirel. Commun. Mob. Comput., 2018

Fault and timing analysis in critical multi-core systems: A survey with an avionics perspective.
J. Syst. Archit., 2018

In-Store Payments Using Bitcoin.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

Formal Verification of Random Forests in Safety-Critical Applications.
Proceedings of the Formal Techniques for Safety-Critical Systems, 2018

RICS-el: Building a National Testbed for Research and Training on SCADA Security (Short Paper).
Proceedings of the Critical Information Infrastructures Security, 2018

Understanding IEC-60870-5-104 Traffic Patterns in SCADA Networks.
Proceedings of the 4th ACM Workshop on Cyber-Physical System Security, 2018

2017
Schedulability and Memory Interference Analysis of Multicore Preemptive Real-time Systems.
Proceedings of the 8th ACM/SPEC on International Conference on Performance Engineering, 2017

Towards Combined Safety and Security Constraints Analysis.
Proceedings of the Computer Safety, Reliability, and Security, 2017

Timing-Based Anomaly Detection in SCADA Networks.
Proceedings of the Critical Information Infrastructures Security, 2017

Where Resources Meet at the Edge.
Proceedings of the 2017 IEEE International Conference on Computer and Information Technology, 2017

2016
Fairness and Incentive Considerations in Energy Apportionment Policies.
ACM Trans. Model. Perform. Evaluation Comput. Syst., 2016

Detection and Visualization of Android Malware Behavior.
J. Electr. Comput. Eng., 2016

Attitudes and Perceptions of IoT Security in Critical Societal Services.
IEEE Access, 2016

Understanding Shared Memory Bank Access Interference in Multi-Core Avionics.
Proceedings of the 16th International Workshop on Worst-Case Execution Time Analysis, 2016

Maintainability of functional reactive programs in a telecom server software.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Performance-aware scheduling of multicore time-critical systems.
Proceedings of the 2016 ACM/IEEE International Conference on Formal Methods and Models for System Design, 2016

Exploiting Bro for Intrusion Detection in a SCADA System.
Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security, 2016

2015
Support for cross-domain composition of embedded systems using MARTE models.
SIGBED Rev., 2015

Quantifying Risks to Data Assets Using Formal Metrics in Embedded System Design.
Proceedings of the Computer Safety, Reliability, and Security, 2015

Sharing the Cost of Lunch: Energy Apportionment Policies.
Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks, 2015

Communication Energy Overhead of Mobiles Games.
Proceedings of the 2nd Workshop on Mobile Gaming, MobiGames@MobiSys 2015, Florence, Italy, 2015

Experience report: Memory accesses for avionic applications and operating systems on a multi-core platform.
Proceedings of the 26th IEEE International Symposium on Software Reliability Engineering, 2015

2014
EnergyBox: Disclosing the wireless transmission energy cost for mobile devices.
Sustain. Comput. Informatics Syst., 2014

Integrating security mechanisms into embedded systems by domain-specific modelling.
Secur. Commun. Networks, 2014

Modelling Correlated Mobility.
CoRR, 2014

Cooperative proxies: Optimally trading energy and quality of service in mobile devices.
Comput. Networks, 2014

Monkey Gamer: Automatic profiling of Android games.
Proceedings of the 6th International Conference on Mobile Computing, 2014

Challenges in Future Avionic Systems on Multi-Core Platforms.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering Workshops, 2014

When mice consume like elephants: instant messaging applications.
Proceedings of the Fifth International Conference on Future Energy Systems, 2014

Model-Based Security Risk Analysis for Networked Embedded Systems.
Proceedings of the Critical Information Infrastructures Security, 2014

2013
Exploiting resource heterogeneity in delay-tolerant networks.
Wirel. Commun. Mob. Comput., 2013

Kernel level energy-efficient 3G background traffic shaper for android smartphones.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

Watts2Share: Energy-Aware Traffic Consolidation.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Mobile location sharing: an energy consumption study.
Proceedings of the Fourth International Conference on Future Energy Systems, 2013

EnergyBox: A Trace-Driven Tool for Data Transmission Energy Consumption Studies.
Proceedings of the Energy Efficiency in Large Scale Distributed Systems, 2013

2012
Anomaly Detection in Water Management Systems.
Proceedings of the Critical Infrastructure Protection, 2012

Surviving Attacks in Challenged Networks.
IEEE Trans. Dependable Secur. Comput., 2012

Worst-case latency of broadcast in intermittently connected networks.
Int. J. Ad Hoc Ubiquitous Comput., 2012

A framework for performance analysis of geographic delaytolerant routing.
EURASIP J. Wirel. Commun. Netw., 2012

BATMAN store-and-forward: The best of the two worlds.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012

Security asset elicitation for collaborative models.
Proceedings of the Model-Driven Security Workshop, 2012

Energy-aware cross-layer burst buffering for wireless communication.
Proceedings of the 3rd International Conference on Energy-Efficient Computing and Networking, 2012

Embedded Cyber-Physical Anomaly Detection in Smart Meters.
Proceedings of the Critical Information Infrastructures Security, 2012

Analysing Delay-Tolerant Networks with Correlated Mobility.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 11th International Conference, 2012

2011
Geographical Routing With Location Service in Intermittently Connected MANETs.
IEEE Trans. Veh. Technol., 2011

Energy-based adaptation in simulations of survivability of ad hoc communication.
Proceedings of the IFIP Wireless Days Conference 2011, 2011

Modular Anomaly Detection for Smartphone Ad Hoc Communication.
Proceedings of the Information Security Technology for Applications, 2011

Resource Footprint of a Manycast Protocol Implementation on Multiple Mobile Platforms.
Proceedings of the 5th International Conference on Next Generation Mobile Applications, 2011

Software-related energy footprint of a wireless broadband module.
Proceedings of the 9th ACM International Workshop on Mobility Management & Wireless Access, 2011

Predicting the performance of geographic delay-tolerant routing.
Proceedings of the MILCOM 2011, 2011

Towards a Security Domain Model for Embedded Systems.
Proceedings of the 13th IEEE International Symposium on High-Assurance Systems Engineering, 2011

Crowdroid: behavior-based malware detection system for Android.
Proceedings of the SPSM'11, 2011

2010
Adding Redundancy to Replication in Window-aware Delay-tolerant Routing.
J. Commun., 2010

Vicinity resource cartography for delay-tolerant networks: A holistic perspective.
Proceedings of the 3rd IFIP Wireless Days Conference 2010, 2010

Anomaly Detection and Mitigation for Disaster Area Networks.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

Wireless ad hoc dissemination for search and rescue.
Proceedings of the 7th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2010

2009
Middleware extensions that trade consistency for availability.
Concurr. Comput. Pract. Exp., 2009

A Partition-Tolerant Manycast Algorithm for Disaster Area Networks.
Proceedings of the 28th IEEE Symposium on Reliable Distributed Systems (SRDS 2009), 2009

Wheels within Wheels: Making Fault Management Cost-Effective.
Proceedings of the Self-Healing and Self-Adaptive Systems, 10.05. - 15.05.2009, 2009

2008
A Bidding Algorithm for Optimized Utility-Based Resource Allocation in Ad Hoc Networks.
IEEE Trans. Mob. Comput., 2008

Formal Support for Quantitative Analysis of Residual Risks in Safety-Critical Systems.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008

Tool Support for Incremental Failure Mode and Effects Analysis of Component-Based Systems.
Proceedings of the Design, Automation and Test in Europe, 2008

Emerging Information Infrastructures: Cooperation in Disasters.
Proceedings of the Critical Information Infrastructure Security, 2008

Opportunistic DTN routing with window-aware adaptive replication.
Proceedings of the AINTEC '08, 2008

Geographical Routing in Intermittently Connected Ad Hoc Networks.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Adaptive real-time anomaly detection with incremental clustering.
Inf. Secur. Tech. Rep., 2007

Measuring Availability in Optimistic Partition-Tolerant Systems with Data Constraints.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007

2006
Safety-Oriented Design of Component Assemblies using Safety Interfaces.
Proceedings of the Third International Workshop on Formal Aspects of Component Software, 2006

Post-partition reconciliation protocols for maintaining consistency.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

Formalising Reconciliation in Partitionable Networks with Distributed Services.
Proceedings of the Rigorous Development of Complex Fault-Tolerant Systems [FP6 IST-511599 RODIN project], 2006

Comparative study of price-based resource allocation algorithms for ad hoc networks.
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006

Mobility Models for UAV Group Reconnaissance Applications.
Proceedings of the Second International Conference on Wireless and Mobile Communications (ICWMC'06), 2006

2005
Modular Verification of Reconfigurable Components.
Proceedings of the Component-Based Software Development for Embedded Systems, 2005

Time-Aware Utility-Based Resource Allocation in Wireless Networks.
IEEE Trans. Parallel Distributed Syst., 2005

Formal verification of fault tolerance in safety-critical reconfigurable modules.
Int. J. Softw. Tools Technol. Transf., 2005

Price/utility-based optimized resource allocation in wireless ad hoc networks.
Proceedings of the Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005

Safety Interfaces for Component-Based Systems.
Proceedings of the Computer Safety, 2005

Utility-based Adaptive Resource Allocation in Hybrid Wireless Networks.
Proceedings of the Second International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks (QSHINE 2005), 2005

Optimal Choice of Checkpointing Interval for High Availability.
Proceedings of the 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 2005

Adaptive Real-Time Anomaly Detection with Improved Index and Ability to Forget.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

Fault Analysis of a Distributed Flight Control System.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

Configuring Fault-Tolerant Servers for Best Performance.
Proceedings of the 16th International Workshop on Database and Expert Systems Applications (DEXA 2005), 2005

Intents and Upgrades in Component-Based High-Assurance Systems.
Proceedings of the Model-Driven Software Development, 2005

2004
Alarm Reduction and Correlation in Defence of IP Networks.
Proceedings of the 13th IEEE International Workshops on Enabling Technologies (WETICE 2004), 2004

Raising motivation in real-time laboratories: the soccer scenario.
Proceedings of the 35th SIGCSE Technical Symposium on Computer Science Education, 2004

Aspects for Improvement of Performance in Fault-Tolerant Software.
Proceedings of the 10th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2004), 2004

Scale-up and performance studies of three agent platforms.
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004

ADWICE - Anomaly Detection with Real-Time Incremental Clustering.
Proceedings of the Information Security and Cryptology, 2004

2003
Development of Safety-Critical Reconfigurable Hardware with Esterel.
Proceedings of the Eighth International Workshop on Formal Methods for Industrial Critical Systems, 2003

Time-Aware Utility-Based QoS Optimisation.
Proceedings of the 15th Euromicro Conference on Real-Time Systems (ECRTS 2003), 2003

2002
Adaptive load control algorithms for 3<sup>rd</sup> generation mobile networks.
Proceedings of the 5th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2002

Mid-term course evaluations with muddy cards.
Proceedings of the 7th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2002

2001
Real-time lab excercises: a teacher's dilemma.
Proceedings of the 32rd SIGCSE Technical Symposium on Computer Science Education, 2001

2000
Co-simulation of Hybrid Systems: Signal-Simulink.
Proceedings of the Formal Techniques in Real-Time and Fault-Tolerant Systems, 2000

1999
Formal Verification of Dynamic Properties in an Aerospace Application.
Formal Methods Syst. Des., 1999

Integration of Analog and Discrete Synchronous Design.
Proceedings of the Hybrid Systems: Computation and Control, Second International Workshop, 1999

Combining Theorem Proving and Continuous Models in Synchronous Design.
Proceedings of the FM'99 - Formal Methods, 1999

On Semantics and Correctness of Reactive Rule-Based Programs.
Proceedings of the Perspectives of System Informatics, 1999

1997
Time-Deterministic Hybrid Transition Systems.
Proceedings of the Hybrid Systems V, 1997

On Semantics of Reactive Rule-Based Systems.
Proceedings of the Advances in Computing Science, 1997

1996
Verification of Embedded Systems Using Synchronous Observers.
Proceedings of the Formal Techniques in Real-Time and Fault-Tolerant Systems, 1996

1995
Proving Dynamic Properties in an Aerospace Application.
Proceedings of the 16th IEEE Real-Time Systems Symposium, 1995

Switched Bond Graphs as Front-End to Formal Verification of Hybrid Systems.
Proceedings of the Hybrid Systems III: Verification and Control, 1995

1994
From Physical Modelling to Compositional Models of Hybrid Systems.
Proceedings of the Formal Techniques in Real-Time and Fault-Tolerant Systems, Third International Symposium Organized Jointly with the Working Group Provably Correct Systems, 1994

1992
Real-Time Hierarchical Control.
IEEE Softw., 1992

1988
Algorithmic Debugging with Assertions.
Proceedings of the Meta-Programming in Logic Programming, 1988

The Use of Assertions in Algorithmic Debugging.
Proceedings of the International Conference on Fifth Generation Computer Systems, 1988


  Loading...