Følg
M. Hossain Heydari
M. Hossain Heydari
Professor of Computer Science, James Madison University
Verificeret mail på jmu.edu - Startside
Titel
Citeret af
Citeret af
År
Content based file type detection algorithms
M McDaniel, MH Heydari
36th Annual Hawaii International Conference on System Sciences, 2003 …, 2003
2612003
Combinatorial optimization of group key management
M Eltoweissy, MH Heydari, L Morales, IH Sudborough
Journal of Network and Systems Management 12, 33-50, 2004
2392004
On the diameter of the pancake network
MH Heydari, IH Sudborough
Journal of Algorithms 25 (1), 67-94, 1997
1941997
Techniques for finding ring covers in survivable networks
LM Gardner, M Heydari, J Shah, IH Sudborough, IG Tollis, C Xia
1994 IEEE GLOBECOM. Communications: The Global Bridge 3, 1862-1866, 1994
731994
Improving the security of wireless sensor networks in an IoT environmental monitoring system
M Tellez, S El-Tawab, HM Heydari
2016 IEEE systems and information engineering design symposium (SIEDS), 72-77, 2016
542016
On sorting by prefix reversals and the diameter of pancake networks
MH Heydari, IH Sudborough
Heinz Nixdorf Symposium at the University of Paderborn, 218-227, 1992
471992
Security analysis of an IoT system used for indoor localization in healthcare facilities
C Bradley, S El-Tawab, MH Heydari
2018 Systems and Information Engineering Design Symposium (SIEDS), 147-152, 2018
422018
IoT security attacks using reverse engineering methods on WSN applications
M Tellez, S El-Tawab, MH Heydari
2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), 182-187, 2016
372016
Combinatorial optimization of multicast key management
L Morales, IH Sudborough, M Eltoweissy, MH Heydari
36th Annual Hawaii International Conference on System Sciences, 2003 …, 2003
322003
Localization of health center assets through an iot environment (locate)
TD McAllister, S El-Tawab, MH Heydari
2017 Systems and Information Engineering Design Symposium (SIEDS), 132-137, 2017
282017
Efficient algorithms for batch re-keying operations in secure multicast
MH Heydari, L Morales, IH Sudborough
Proceedings of the 39th Annual Hawaii International Conference on System …, 2006
232006
Data analysis and information security of an Internet of Things (IoT) intelligent transit system
Z Yorio, R Oram, S El-Tawab, A Salman, MH Heydari, BB Park
2018 Systems and Information Engineering Design Symposium (SIEDS), 24-29, 2018
222018
Computing cross associations for attack graphs and other applications
MH Heydari, L Morales, CO Shields, IH Sudborough
2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007
192007
Security measurement on a cloud-based cyber-physical system used for intelligent transportation
K Evers, R Oram, S El-Tawab, MH Heydari, BB Park
2017 IEEE International Conference on Vehicular Electronics and Safety …, 2017
172017
An intrusion-tolerant password authentication system
X Wang, MH Heydari, H Lin
19th Annual Computer Security Applications Conference, 2003. Proceedings …, 2003
162003
A comparative analysis of solar energy strategies in Middle East with rich fossil resources
MR Hayati, S Ranjbar, MR Abdar, M Molaei Nasab, S Homayounmajd, ...
Iranica Journal of Energy & Environment 14 (3), 271-288, 2023
142023
The pancake problem
MH Heydari
The University of Texas at Dallas, 1993
101993
Sorting by prefix reversals is NP-complete
MH Heydari, IH Sudborough
To be submitted 66, 0
10
Problems of clinical education of nursing students in clinical settings
M Heydari, R Ali-Sheikhi, K Heydari
Health Care 13 (1), 19-23, 2012
92012
BTEXS removal from aqueous phase by MCM-41 green synthesis using rice husk silica
M Heydari, T Tabatabaie, F Amiri, SE Hashemi
Iranica Journal of Energy & Environment 14 (4), 321-335, 2023
82023
Systemet kan ikke foretage handlingen nu. Prøv igen senere.
Artikler 1–20