Behnam Bahrak, Ph.D.
Affiliations: | 2013 | Electrical Engineering | Virginia Polytechnic Institute and State University, Blacksburg, VA, United States |
Area:
Electronics and Electrical EngineeringGoogle:
"Behnam Bahrak"Parents
Sign in to add mentorJung-Min J. Park | grad student | 2013 | Virginia Tech | |
(Ex Ante Approaches for Security, Privacy, and Enforcement in Spectrum Sharing.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Ansari MH, Vakili VT, Bahrak B. (2019) Evaluation of big data frameworks for analysis of smart grids Journal of Big Data. 6: 1-14 |
Nia MA, Bahrak B, Kargahi M, et al. (2019) Detecting new generations of threats using attribute-based attack graphs Iet Information Security. 13: 293-303 |
Ansari MH, Vakili VT, Bahrak B, et al. (2018) Graph theoretical defense mechanisms against false data injection attacks in smart grids Journal of Modern Power Systems and Clean Energy. 6: 860-871 |
Jannati H, Ardeshir-Larijani E, Bahrak B. (2018) Privacy in Cross-User Data Deduplication Mobile Networks and Applications. 1-13 |
Jannati H, Bahrak B. (2017) An improved authentication protocol for distributed mobile cloud computing services International Journal of Critical Infrastructure Protection. 19: 59-67 |
Jannati H, Bahrak B. (2017) An Oblivious Transfer Protocol Based on Elgamal Encryption for Preserving Location Privacy Wireless Personal Communications. 97: 3113-3123 |
Jannati H, Bahrak B. (2015) Security analysis of an RFID tag search protocol Information Processing Letters |
Bahrak B, Park JMJ. (2014) Coexistence decision making for spectrum sharing among heterogeneous wireless systems Ieee Transactions On Wireless Communications. 13: 1298-1307 |
Park JM, Reed JH, Beex AA, et al. (2014) Security and enforcement in spectrum sharing Proceedings of the Ieee. 102: 270-281 |
Bahrak B, Aref MR. (2008) Impossible differential attack on seven-round AES-128 Iet Information Security. 2: 28-32 |