Follow
Babak Sadeghiyan
Babak Sadeghiyan
Associate Professor of Computer Engineering, Amirkabir University of Technology (Tehran Polytechnic)
Verified email at aut.ac.ir - Homepage
Title
Cited by
Cited by
Year
Malware dynamic analysis evasion techniques: A survey
A Afianian, S Niksefat, B Sadeghiyan, D Baptiste
ACM Computing Surveys (CSUR) 52 (6), 1-28, 2019
2592019
MIBS: A new lightweight block cipher
M Izadi, B Sadeghiyan, SS Sadeghian, HA Khanooki
International Conference on Cryptology and Network Security, 334-348, 2009
2572009
Design of hashing algorithms
J Pieprzyk, B Sadeghiyan
Springer Berlin Heidelberg, 1993
1131993
An efficient protocol for oblivious DFA evaluation and applications
P Mohassel, S Niksefat, S Sadeghian, B Sadeghiyan
Topics in Cryptology–CT-RSA 2012: The Cryptographers’ Track at the RSA …, 2012
702012
Privacy issues in intrusion detection systems: A taxonomy, survey and future directions
S Niksefat, P Kaghazgaran, B Sadeghiyan
Computer Science Review 25, 69-78, 2017
502017
ZIDS: a privacy-preserving intrusion detection system using secure two-party computation protocols
S Niksefat, B Sadeghiyan, P Mohassel, S Sadeghian
The Computer Journal 57 (4), 494-509, 2014
452014
A construction for super pseudorandom permutations from a single pseudorandom function
B Sadeghiyan, J Pieprzyk
Workshop on the Theory and Application of of Cryptographic Techniques, 267-284, 1992
431992
Finding the differential characteristics of block ciphers with neural networks
AG Bafghi, R Safabakhsh, B Sadeghiyan
Information Sciences 178 (15), 3118-3132, 2008
382008
On necessary and sufficient conditions for the construction of super pseudorandom permutations
B Sadeghiyan, J Pieprzyk
Advances in Cryptology—ASIACRYPT'91: International Conference on the Theory …, 1993
251993
Intrusion detection with data correlation relation graph
A Hassanzadeh, B Sadeghian
2008 Third International Conference on Availability, Reliability and …, 2008
222008
DDPM: dynamic deterministic packet marking for IP traceback
R Shokri, A Varshovi, H Mohammadi, N Yazdani, B Sadeghian
2006 14th IEEE International Conference on Networks 2, 1-6, 2006
222006
Smart fuzzing method for detecting stack‐based buffer overflow in binary codes
M Mouzarani, B Sadeghiyan, M Zolfaghari
Iet Software 10 (4), 96-107, 2016
212016
Finding suitable differential characteristics for block ciphers with Ant colony technique
AG Bafghi, B Sadeghiyan
Proceedings. ISCC 2004. Ninth International Symposium on Computers And …, 2004
212004
Design of S-boxes based on neural networks
MNA Noughabi, B Sadeghiyan
2010 International Conference on Electronics and Information Engineering 2 …, 2010
182010
Designing a new method for detecting money laundering based on social network analysis
M Mahootiha, AH Golpayegani, B Sadeghian
2021 26th International Computer Conference, Computer Society of Iran (CSICC …, 2021
172021
A smart fuzzing method for detecting heap-based buffer overflow in executable codes
M Mouzarani, B Sadeghiyan, M Zolfaghari
2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing …, 2015
172015
RUPSec: extending business modeling and requirements disciplines of RUP for developing secure systems
P Jaferian, G Elahi, MRA Shirazi, B Sadeghian
31st EUROMICRO Conference on Software Engineering and Advanced Applications …, 2005
172005
A new image encryption scheme with Feistel like structure using chaotic S-box and Rubik cube based P-box
M Mousavi, B Sadeghiyan
Multimedia Tools and Applications 80 (9), 13157-13177, 2021
162021
Detecting injection vulnerabilities in executable codes with concolic execution
M Mouzarani, B Sadeghiyan, M Zolfaghari
2017 8th IEEE International Conference on Software Engineering and Service …, 2017
142017
Ontological classification of network denial of service attacks: basis for a unified detection framework
A VARSHOUEI, B Sadeghian
SCIENTIA IRANICA 17 (2), 133-148, 2010
142010
The system can't perform the operation now. Try again later.
Articles 1–20