MIBS: A new lightweight block cipher M Izadi, B Sadeghiyan, SS Sadeghian, HA Khanooki International Conference on Cryptology and Network Security, 334-348, 2009 | 256 | 2009 |
Malware dynamic analysis evasion techniques: A survey A Afianian, S Niksefat, B Sadeghiyan, D Baptiste ACM Computing Surveys (CSUR) 52 (6), 1-28, 2019 | 249 | 2019 |
Design of hashing algorithms J Pieprzyk, B Sadeghiyan Springer Berlin Heidelberg, 1993 | 112 | 1993 |
An efficient protocol for oblivious DFA evaluation and applications P Mohassel, S Niksefat, S Sadeghian, B Sadeghiyan Topics in Cryptology–CT-RSA 2012: The Cryptographers’ Track at the RSA …, 2012 | 70 | 2012 |
Privacy issues in intrusion detection systems: A taxonomy, survey and future directions S Niksefat, P Kaghazgaran, B Sadeghiyan Computer Science Review 25, 69-78, 2017 | 48 | 2017 |
ZIDS: a privacy-preserving intrusion detection system using secure two-party computation protocols S Niksefat, B Sadeghiyan, P Mohassel, S Sadeghian The Computer Journal 57 (4), 494-509, 2014 | 44 | 2014 |
A construction for super pseudorandom permutations from a single pseudorandom function B Sadeghiyan, J Pieprzyk Workshop on the Theory and Application of of Cryptographic Techniques, 267-284, 1992 | 41 | 1992 |
Finding the differential characteristics of block ciphers with neural networks AG Bafghi, R Safabakhsh, B Sadeghiyan Information Sciences 178 (15), 3118-3132, 2008 | 38 | 2008 |
On necessary and sufficient conditions for the construction of super pseudorandom permutations B Sadeghiyan, J Pieprzyk Advances in Cryptology—ASIACRYPT'91: International Conference on the Theory …, 1993 | 24 | 1993 |
Intrusion detection with data correlation relation graph A Hassanzadeh, B Sadeghian 2008 Third International Conference on Availability, Reliability and …, 2008 | 22 | 2008 |
DDPM: dynamic deterministic packet marking for IP traceback R Shokri, A Varshovi, H Mohammadi, N Yazdani, B Sadeghian 2006 14th IEEE International Conference on Networks 2, 1-6, 2006 | 22 | 2006 |
Smart fuzzing method for detecting stack‐based buffer overflow in binary codes M Mouzarani, B Sadeghiyan, M Zolfaghari Iet Software 10 (4), 96-107, 2016 | 21 | 2016 |
Finding suitable differential characteristics for block ciphers with Ant colony technique AG Bafghi, B Sadeghiyan Proceedings. ISCC 2004. Ninth International Symposium on Computers And …, 2004 | 21 | 2004 |
Design of S-boxes based on neural networks MNA Noughabi, B Sadeghiyan 2010 International Conference on Electronics and Information Engineering 2 …, 2010 | 18 | 2010 |
RUPSec: extending business modeling and requirements disciplines of RUP for developing secure systems P Jaferian, G Elahi, MRA Shirazi, B Sadeghian 31st EUROMICRO Conference on Software Engineering and Advanced Applications …, 2005 | 17 | 2005 |
Designing a new method for detecting money laundering based on social network analysis M Mahootiha, AH Golpayegani, B Sadeghian 2021 26th International Computer Conference, Computer Society of Iran (CSICC …, 2021 | 16 | 2021 |
A new image encryption scheme with Feistel like structure using chaotic S-box and Rubik cube based P-box M Mousavi, B Sadeghiyan Multimedia Tools and Applications 80 (9), 13157-13177, 2021 | 15 | 2021 |
A smart fuzzing method for detecting heap-based buffer overflow in executable codes M Mouzarani, B Sadeghiyan, M Zolfaghari 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing …, 2015 | 15 | 2015 |
Detecting injection vulnerabilities in executable codes with concolic execution M Mouzarani, B Sadeghiyan, M Zolfaghari 2017 8th IEEE International Conference on Software Engineering and Service …, 2017 | 14 | 2017 |
Ontological classification of network denial of service attacks: basis for a unified detection framework A VARSHOUEI, B Sadeghian SCIENTIA IRANICA 17 (2), 133-148, 2010 | 14 | 2010 |