Hakem Beitollahi
Zitiert von
Zitiert von
Analyzing well-known countermeasures against distributed denial of service attacks
H Beitollahi, G Deconinck
Computer Communications 35 (11), 1312-1332, 2012
Tackling application-layer DDoS attacks
H Beitollahi, G Deconinck
Procedia Computer Science 10, 432-441, 2012
ConnectionScore: A statistical technique to resist application-layer DDoS attacks
H Beitollahi, G Deconinck
Journal of Ambient Intelligence and Humanized Computing 5 (3), 425-442, 2014
Peer-to-peer networks applied to power grid
H Beitollahi, G Deconinck
Proceedings of the International conference on Risks and Security of …, 2007
ICT resilience of power control systems: experimental results from the CRUTIAL testbeds
G Dondossola, G Garrone, J Szanto, G Deconinck, T Loix, H Beitollahi
2009 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2009
Fault-tolerant earliest-deadline-first scheduling algorithm
H Beitollahi, SG Miremadi, G Deconinck
2007 IEEE International Parallel and Distributed Processing Symposium, 1-6, 2007
Communication overlays and agents for dependable smart power grids
G Deconinck, W Labeeuw, S Vandael, H Beitollahi, K De Craemer, ...
2010 5th International Conference on Critical Infrastructure (CRIS), 1-7, 2010
A robust semantic overlay network for microgrid control applications
G Deconinck, K Vanthournout, H Beitollahi, Z Qui, R Duan, B Nauwelaers, ...
Architecting Dependable Systems V, 101-123, 2008
FOSeL: filtering by helping an overlay security layer to mitigate DoS attacks
H Beitollahi, G Deconinck
2008 Seventh IEEE International Symposium on Network Computing and …, 2008
A cooperative mechanism to defense against distributed denial of service attacks
H Beitollahi, G Deconinck
2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011
Fault-tolerant partitioning scheduling algorithms in real-time multiprocessor systems
H Beitollahi, G Deconinck
2006 12th Pacific Rim International Symposium on Dependable Computing (PRDC …, 2006
Testbeds for assessing critical scenarios in power control systems
G Dondossola, G Deconinck, F Garrone, H Beitollahi
International Workshop on Critical Information Infrastructures Security, 223-234, 2008
A dependable architecture to mitigate distributed denial of service attacks on network-based control systems
H Beitollahi, G Deconinck
International Journal of Critical Infrastructure Protection 4 (3-4), 107-123, 2011
Testbed deployment of representative control algorithms
G Deconinck, H Beitollahi, G Dondossola, F Garrone, T Rigole
Deliverable D9, Project CRUTIAL EC IST-FP6-STREP 27513, 2008
Analyzing the chord peer-to-peer network for power grid applications
H Beitollahi, G Deconinck
Fourth IEEE Young Researchers Symposium in Electrical Power Engineering, 5, 2008
Robust overlay networks for microgrid control systems
G Deconinck, T Rigole, H Beitollahi, R Duan, B Nauwelaers, E Van Lil, ...
Proc. Workshop on Architecting Dependable Systems (WADS 2007), co-located …, 2007
An overlay protection layer against denial-of-service attacks
H Beitollahi, G Deconinck
2008 IEEE International Symposium on Parallel and Distributed Processing, 1-8, 2008
RTHS: A low-cost high-performance real-time hardware sorter, using a multidimensional sorting algorithm
A Norollah, D Derafshi, H Beitollahi, M Fazeli
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 27 (7 …, 2019
Denial of Service attacks: a tutorial
H Beitollahi, G Deconinck
Ferris wheel: A ring based onion circuit for hidden services
H Beitollahi, G Deconinck
Computer Communications 35 (7), 829-841, 2012
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20