Content based file type detection algorithms M McDaniel, MH Heydari 36th Annual Hawaii International Conference on System Sciences, 2003 …, 2003 | 261 | 2003 |
Combinatorial optimization of group key management M Eltoweissy, MH Heydari, L Morales, IH Sudborough Journal of Network and Systems Management 12, 33-50, 2004 | 239 | 2004 |
On the diameter of the pancake network MH Heydari, IH Sudborough Journal of Algorithms 25 (1), 67-94, 1997 | 194 | 1997 |
Techniques for finding ring covers in survivable networks LM Gardner, M Heydari, J Shah, IH Sudborough, IG Tollis, C Xia 1994 IEEE GLOBECOM. Communications: The Global Bridge 3, 1862-1866, 1994 | 73 | 1994 |
Improving the security of wireless sensor networks in an IoT environmental monitoring system M Tellez, S El-Tawab, HM Heydari 2016 IEEE systems and information engineering design symposium (SIEDS), 72-77, 2016 | 54 | 2016 |
On sorting by prefix reversals and the diameter of pancake networks MH Heydari, IH Sudborough Heinz Nixdorf Symposium at the University of Paderborn, 218-227, 1992 | 47 | 1992 |
Security analysis of an IoT system used for indoor localization in healthcare facilities C Bradley, S El-Tawab, MH Heydari 2018 Systems and Information Engineering Design Symposium (SIEDS), 147-152, 2018 | 42 | 2018 |
IoT security attacks using reverse engineering methods on WSN applications M Tellez, S El-Tawab, MH Heydari 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), 182-187, 2016 | 37 | 2016 |
Combinatorial optimization of multicast key management L Morales, IH Sudborough, M Eltoweissy, MH Heydari 36th Annual Hawaii International Conference on System Sciences, 2003 …, 2003 | 32 | 2003 |
Localization of health center assets through an iot environment (locate) TD McAllister, S El-Tawab, MH Heydari 2017 Systems and Information Engineering Design Symposium (SIEDS), 132-137, 2017 | 28 | 2017 |
Efficient algorithms for batch re-keying operations in secure multicast MH Heydari, L Morales, IH Sudborough Proceedings of the 39th Annual Hawaii International Conference on System …, 2006 | 23 | 2006 |
Data analysis and information security of an Internet of Things (IoT) intelligent transit system Z Yorio, R Oram, S El-Tawab, A Salman, MH Heydari, BB Park 2018 Systems and Information Engineering Design Symposium (SIEDS), 24-29, 2018 | 22 | 2018 |
Computing cross associations for attack graphs and other applications MH Heydari, L Morales, CO Shields, IH Sudborough 2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007 | 19 | 2007 |
Security measurement on a cloud-based cyber-physical system used for intelligent transportation K Evers, R Oram, S El-Tawab, MH Heydari, BB Park 2017 IEEE International Conference on Vehicular Electronics and Safety …, 2017 | 17 | 2017 |
An intrusion-tolerant password authentication system X Wang, MH Heydari, H Lin 19th Annual Computer Security Applications Conference, 2003. Proceedings …, 2003 | 16 | 2003 |
A comparative analysis of solar energy strategies in Middle East with rich fossil resources MR Hayati, S Ranjbar, MR Abdar, M Molaei Nasab, S Homayounmajd, ... Iranica Journal of Energy & Environment 14 (3), 271-288, 2023 | 14 | 2023 |
The pancake problem MH Heydari The University of Texas at Dallas, 1993 | 10 | 1993 |
Sorting by prefix reversals is NP-complete MH Heydari, IH Sudborough To be submitted 66, 0 | 10 | |
Problems of clinical education of nursing students in clinical settings M Heydari, R Ali-Sheikhi, K Heydari Health Care 13 (1), 19-23, 2012 | 9 | 2012 |
BTEXS removal from aqueous phase by MCM-41 green synthesis using rice husk silica M Heydari, T Tabatabaie, F Amiri, SE Hashemi Iranica Journal of Energy & Environment 14 (4), 321-335, 2023 | 8 | 2023 |