Behnam Bahrak, Ph.D.

Affiliations: 
2013 Electrical Engineering Virginia Polytechnic Institute and State University, Blacksburg, VA, United States 
Area:
Electronics and Electrical Engineering
Google:
"Behnam Bahrak"

Parents

Sign in to add mentor
Jung-Min J. Park grad student 2013 Virginia Tech
 (Ex Ante Approaches for Security, Privacy, and Enforcement in Spectrum Sharing.)
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Ansari MH, Vakili VT, Bahrak B. (2019) Evaluation of big data frameworks for analysis of smart grids Journal of Big Data. 6: 1-14
Nia MA, Bahrak B, Kargahi M, et al. (2019) Detecting new generations of threats using attribute-based attack graphs Iet Information Security. 13: 293-303
Ansari MH, Vakili VT, Bahrak B, et al. (2018) Graph theoretical defense mechanisms against false data injection attacks in smart grids Journal of Modern Power Systems and Clean Energy. 6: 860-871
Jannati H, Ardeshir-Larijani E, Bahrak B. (2018) Privacy in Cross-User Data Deduplication Mobile Networks and Applications. 1-13
Jannati H, Bahrak B. (2017) An improved authentication protocol for distributed mobile cloud computing services International Journal of Critical Infrastructure Protection. 19: 59-67
Jannati H, Bahrak B. (2017) An Oblivious Transfer Protocol Based on Elgamal Encryption for Preserving Location Privacy Wireless Personal Communications. 97: 3113-3123
Jannati H, Bahrak B. (2015) Security analysis of an RFID tag search protocol Information Processing Letters
Bahrak B, Park JMJ. (2014) Coexistence decision making for spectrum sharing among heterogeneous wireless systems Ieee Transactions On Wireless Communications. 13: 1298-1307
Park JM, Reed JH, Beex AA, et al. (2014) Security and enforcement in spectrum sharing Proceedings of the Ieee. 102: 270-281
Bahrak B, Aref MR. (2008) Impossible differential attack on seven-round AES-128 Iet Information Security. 2: 28-32
See more...