Analyzing well-known countermeasures against distributed denial of service attacks H Beitollahi, G Deconinck Computer Communications 35 (11), 1312-1332, 2012 | 188 | 2012 |
Tackling application-layer DDoS attacks H Beitollahi, G Deconinck Procedia Computer Science 10, 432-441, 2012 | 74 | 2012 |
Peer-to-peer networks applied to power grid H Beitollahi, G Deconinck Proceedings of the International conference on Risks and Security of …, 2007 | 62 | 2007 |
ConnectionScore: a statistical technique to resist application-layer DDoS attacks H Beitollahi, G Deconinck Journal of Ambient Intelligence and Humanized Computing 5, 425-442, 2014 | 55 | 2014 |
ICT resilience of power control systems: experimental results from the CRUTIAL testbeds G Dondossola, G Garrone, J Szanto, G Deconinck, T Loix, H Beitollahi 2009 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2009 | 41 | 2009 |
Application layer DDoS attack detection using cuckoo search algorithm-trained radial basis function H Beitollahi, DM Sharif, M Fazeli IEEE Access 10, 63844-63854, 2022 | 39 | 2022 |
RTHS: A low-cost high-performance real-time hardware sorter, using a multidimensional sorting algorithm A Norollah, D Derafshi, H Beitollahi, M Fazeli IEEE Transactions on Very Large Scale Integration (VLSI) Systems 27 (7 …, 2019 | 35 | 2019 |
Fault-tolerant earliest-deadline-first scheduling algorithm H Beitollahi, SG Miremadi, G Deconinck 2007 IEEE International Parallel and Distributed Processing Symposium, 1-6, 2007 | 35 | 2007 |
A robust semantic overlay network for microgrid control applications G Deconinck, K Vanthournout, H Beitollahi, Z Qui, R Duan, B Nauwelaers, ... Architecting Dependable Systems V, 101-123, 2008 | 31 | 2008 |
Communication overlays and agents for dependable smart power grids G Deconinck, W Labeeuw, S Vandael, H Beitollahi, K De Craemer, ... 2010 5th International Conference on Critical Infrastructure (CRIS), 1-7, 2010 | 26 | 2010 |
FOSeL: filtering by helping an overlay security layer to mitigate DoS attacks H Beitollahi, G Deconinck 2008 Seventh IEEE International Symposium on Network Computing and …, 2008 | 25 | 2008 |
HRHS: A high-performance real-time hardware scheduler D Derafshi, A Norollah, M Khosroanjam, H Beitollahi IEEE Transactions on Parallel and distributed Systems 31 (4), 897-908, 2019 | 23 | 2019 |
Testbeds for assessing critical scenarios in power control systems G Dondossola, G Deconinck, F Garrone, H Beitollahi Critical Information Infrastructure Security: Third International Workshop …, 2009 | 22 | 2009 |
A dependable architecture to mitigate distributed denial of service attacks on network-based control systems H Beitollahi, G Deconinck International Journal of Critical Infrastructure Protection 4 (3-4), 107-123, 2011 | 21 | 2011 |
A cooperative mechanism to defense against distributed denial of service attacks H Beitollahi, G Deconinck 2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011 | 21 | 2011 |
Detection of application-layer DDoS attacks produced by various freely accessible toolkits using machine learning DM Sharif, H Beitollahi, M Fazeli IEEE Access 11, 51810-51819, 2023 | 20 | 2023 |
Circuit enclaves susceptible to hardware Trojans insertion at gate‐level designs SM Sebt, A Patooghy, H Beitollahi, M Kinsy IET Computers & Digital Techniques 12 (6), 251-257, 2018 | 19 | 2018 |
PAT-NOXIM: a precise power & thermal cycle-accurate NoC SImulator A Norollah, D Derafshi, H Beitollahi, A Patooghy 2018 31st IEEE International System-on-Chip Conference (SOCC), 163-168, 2018 | 18 | 2018 |
Fault-tolerant partitioning scheduling algorithms in real-time multiprocessor systems H Beitollahi, G Deconinck 2006 12th Pacific Rim International Symposium on Dependable Computing (PRDC …, 2006 | 18 | 2006 |
An overlay protection layer against denial-of-service attacks H Beitollahi, G Deconinck 2008 IEEE International Symposium on Parallel and Distributed Processing, 1-8, 2008 | 16 | 2008 |