Behnam Bahrak, Ph.D. - Publications
Affiliations: | 2013 | Electrical Engineering | Virginia Polytechnic Institute and State University, Blacksburg, VA, United States |
Area:
Electronics and Electrical EngineeringYear | Citation | Score | |||
---|---|---|---|---|---|
2019 | Ansari MH, Vakili VT, Bahrak B. Evaluation of big data frameworks for analysis of smart grids Journal of Big Data. 6: 1-14. DOI: 10.1186/S40537-019-0270-8 | 0.356 | |||
2019 | Nia MA, Bahrak B, Kargahi M, Fabian B. Detecting new generations of threats using attribute-based attack graphs Iet Information Security. 13: 293-303. DOI: 10.1049/Iet-Ifs.2018.5409 | 0.375 | |||
2018 | Ansari MH, Vakili VT, Bahrak B, Tavassoli P. Graph theoretical defense mechanisms against false data injection attacks in smart grids Journal of Modern Power Systems and Clean Energy. 6: 860-871. DOI: 10.1007/S40565-018-0432-2 | 0.409 | |||
2018 | Jannati H, Ardeshir-Larijani E, Bahrak B. Privacy in Cross-User Data Deduplication Mobile Networks and Applications. 1-13. DOI: 10.1007/S11036-018-1100-5 | 0.375 | |||
2017 | Jannati H, Bahrak B. An improved authentication protocol for distributed mobile cloud computing services International Journal of Critical Infrastructure Protection. 19: 59-67. DOI: 10.1016/J.Ijcip.2017.10.003 | 0.412 | |||
2017 | Jannati H, Bahrak B. An Oblivious Transfer Protocol Based on Elgamal Encryption for Preserving Location Privacy Wireless Personal Communications. 97: 3113-3123. DOI: 10.1007/S11277-017-4664-7 | 0.411 | |||
2015 | Jannati H, Bahrak B. Security analysis of an RFID tag search protocol Information Processing Letters. DOI: 10.1016/J.Ipl.2016.05.001 | 0.406 | |||
2014 | Bahrak B, Park JMJ. Coexistence decision making for spectrum sharing among heterogeneous wireless systems Ieee Transactions On Wireless Communications. 13: 1298-1307. DOI: 10.1109/Twc.2014.012314.122009 | 0.302 | |||
2014 | Park JM, Reed JH, Beex AA, Clancy TC, Kumar V, Bahrak B. Security and enforcement in spectrum sharing Proceedings of the Ieee. 102: 270-281. DOI: 10.1109/JPROC.2014.2301972 | 0.347 | |||
2008 | Bahrak B, Aref MR. Impossible differential attack on seven-round AES-128 Iet Information Security. 2: 28-32. DOI: 10.1049/Iet-Ifs:20070078 | 0.369 | |||
Show low-probability matches. |