Behnam Bahrak
Behnam Bahrak
Assistant Professor, University of Tehran
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
Protecting the primary users' operational privacy in spectrum sharing
B Bahrak, S Bhattarai, A Ullah, JMJ Park, J Reed, D Gurney
2014 IEEE International Symposium on Dynamic Spectrum Access Networks …, 2014
Impossible differential attack on seven-round AES-128
B Bahrak, MR Aref
IET Information Security 2 (2), 28-32, 2008
Security and Enforcement in Spectrum Sharing
JM Park, JH Reed, AA Beex, TC Clancy, V Kumar, B Bahrak
Proceedings of the IEEE 102 (3), 270-281, 2014
Quantitative analysis of cryptocurrencies transaction graph
AP Motamed, B Bahrak
Applied Network Science 4 (1), 1-21, 2019
Graph theoretical defense mechanisms against false data injection attacks in smart grids
MH Ansari, VT Vakili, B Bahrak, P Tavassoli
Journal of Modern Power Systems and Clean Energy 6 (5), 860-871, 2018
An oblivious transfer protocol based on elgamal encryption for preserving location privacy
H Jannati, B Bahrak
Wireless Personal Communications 97, 3113-3123, 2017
Coexistence Decision Making for Spectrum Sharing Among Heterogeneous Wireless Systems
B Bahrak, J Park
IEEE Transactions on Wireless Communications, 1-10, 2014
Bresap: A policy reasoner for processing spectrum access policies represented by binary decision diagrams
B Bahrak, A Deshpande, M Whitaker, JM Park
2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN), 1-12, 2010
A novel impossible differential cryptanalysis of AES
B Bahrak, MR Aref
proceedings of the Western European Workshop on Research in Cryptology 2007, 2007
Evaluation of big data frameworks for analysis of smart grids
MH Ansari, V Tabatab Vakili, B Bahrak
Journal of Big Data 6, 1-14, 2019
Multi-tier exclusion zones for dynamic spectrum sharing
A Ullah, S Bhattarai, JM Park, JH Reed, D Gurney, B Bahrak
2015 IEEE International Conference on Communications (ICC), 7659-7664, 2015
Short-term demand forecasting for online car-hailing services using recurrent neural networks
A Nejadettehad, H Mahini, B Bahrak
Applied Artificial Intelligence 34 (9), 674-689, 2020
Detecting new generations of threats using attribute‐based attack graphs
MA Nia, B Bahrak, M Kargahi, B Fabian
IET Information Security 13 (4), 293-303, 2019
Security analysis of an RFID tag search protocol
H Jannati, B Bahrak
Information Processing Letters 116 (10), 618-622, 2016
Ontology-based spectrum access policies for policy-based cognitive radios
B Bahrak, JM Park, H Wu
2012 IEEE International Symposium on Dynamic Spectrum Access Networks, 489-500, 2012
Sentiment analysis of persian-english code-mixed texts
N Sabri, A Edalat, B Bahrak
2021 26th International Computer Conference, Computer Society of Iran (CSICC …, 2021
An improved authentication protocol for distributed mobile cloud computing services
H Jannati, B Bahrak
International Journal of Critical Infrastructure Protection 19, 59-67, 2017
Ex ante approaches for security, privacy, and enforcement in spectrum sharing
B Bahrak
Virginia Polytechnic Institute and State University, 2013
Impossible Differential Cryptanalysis of Safer++.
B Bahrak, T Eghlidos, MR Aref
Security and Management, 10-14, 2008
Spectrum access policy reasoning for policy-based cognitive radios
B Bahrak, A Deshpande
Computer Networks 56 (11), 2649-2663, 2012
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20