Follow
Mahdi Daghmehchi Firoozjaei
Mahdi Daghmehchi Firoozjaei
Assistant Professor, University of Windsor
Verified email at uwindsor.ca - Homepage
Title
Cited by
Cited by
Year
Security challenges with network functions virtualization
MD Firoozjaei, JP Jeong, H Ko, H Kim
Future Generation Computer Systems 67, 315-324, 2017
822017
Hy-Bridge: A Hybrid Blockchain for Privacy-Preserving and Trustful Energy Transactions in Internet-of-Things Platforms
MD Firoozjaei, A Ghorbani, H Kim, J Song
Sensors 20 (3), 928, 2020
292020
SDN-based security services using interface to network security functions
J Kim, MD Firoozjaei, JP Jeong, H Kim, JS Park
2015 International Conference on Information and Communication Technology …, 2015
242015
An evaluation framework for privacy‐preserving solutions applicable for blockchain‐based internet‐of‐things platforms
MD Firoozjaei, R Lu, AA Ghorbani
Security and Privacy, e131, 2020
202020
An evaluation framework for industrial control system cyber incidents
MD Firoozjaei, N Mahmoudyar, Y Baseri, AA Ghorbani
International Journal of Critical Infrastructure Protection 36, 100487, 2022
172022
Privacy-preserving nearest neighbor queries using geographical features of cellular networks
MD Firoozjaei, J Yu, H Choi, H Kim
Computer Communications 98, 11-19, 2017
162017
Implementing geo-encryption in GSM cellular network
MD Firoozjaei, J Vahidi
Communications (COMM), 2012 9th International Conference on, 299-302, 2012
152012
EVChain: A Blockchain-based Credit Sharing in Electric Vehicles Charging
MD Firoozjaei, A Ghorbani, H Kim, J Song
2019 17th International Conference on Privacy, Security and Trust (PST), 1-5, 2019
142019
Privacy Preserving Nearest Neighbor Search based on Topologies in Cellular Networks
MD Firoozjaei, J Yu, H Kim
AINA 2015, 2015
62015
J.(Paul) Jeong, H. Ko, and H. Kim,“
MD Firoozjaei
Security challenges with network functions virtualization,” Futur. Gener …, 2017
52017
Detecting False Emergency Requests Using Callers' Reporting Behaviors and Locations
MD Firoozjaei, J Park, H Kim
2016 30th International Conference on Advanced Information Networking and …, 2016
42016
Memory forensics tools: a comparative analysis
MD Firoozjaei, A Habibi Lashkari, AA Ghorbani
Journal of Cyber Security Technology 6 (3), 149-173, 2022
32022
O2TR: Offline OTR messaging system under network disruption
MD Firoozjaei, MC Kim, JS Song, H Kim
Computers & Security 82, 227-240, 2019
32019
O2TR: Offline Off-the-Record (OTR) Messaging
MD Firoozjaei, SM Lee, H Kim
International Workshop on Information Security Applications, 61-71, 2017
32017
Time-Series Load Data Analysis for User Power Profiling
MD Firoozjaei, MC Kim, D Alhadidi
2023 25th International Conference on Advanced Communication Technology …, 2023
2023
A Study on Privacy-preserving Systems for Network Services
MD Firoozjaei
Sungkyunkwan University, 2018
2018
How Practical is OTR?
MD Firoozjaei, MC Kim, H Kim
CISC 2016, 2016
2016
IPSec Security Weaknesses against decryption key forgery situation
MD Firoozjaei, A Yazdian
16th CSI Computer Conference, 2011
2011
Evaluating Geo-Encryption Applicability in GSM Cellular Network
MD Firoozjaei, J Vahidi
14th Iranian Student Conference on Electrical Engineering, 2011
2011
The system can't perform the operation now. Try again later.
Articles 1–19