Simin Nadjm-Tehrani
TitleCited byYear
Crowdroid: behavior-based malware detection system for android
I Burguera, U Zurutuza, S Nadjm-Tehrani
Proceedings of the 1st ACM workshop on Security and privacy in smartphones …, 2011
10442011
Mobility models for UAV group reconnaissance applications
E Kuiper, S Nadjm-Tehrani
2006 International Conference on Wireless and Mobile Communications (ICWMC …, 2006
1442006
Geographical routing with location service in intermittently connected MANETs
E Kuiper, S Nadjm-Tehrani
IEEE Transactions on Vehicular Technology 60 (2), 592-604, 2010
1172010
Opportunistic DTN routing with window-aware adaptive replication
G Sandulescu, S Nadjm-Tehrani
Proceedings of the 4th Asian Conference on Internet Engineering, 103-112, 2008
1172008
Algorithmic debugging with assertions
L Drabent, S Nadjm-Tehrani
Meta-programming in logic programming, 1989
1001989
ADWICE–anomaly detection with real-time incremental clustering
K Burbeck, S Nadjm-Tehrani
International Conference on Information Security and Cryptology, 407-424, 2004
942004
The use of assertions in algorithmic debugging
W Drabent
Proc. International Conference of fifth generation computer systems, 1988, 1988
671988
Scale-up and performance studies of three agent platforms
K Burbeck, D Garpe, S Nadjm-Tehrani
IEEE International Conference on Performance, Computing, and Communications …, 2004
622004
Adaptive real-time anomaly detection with incremental clustering
K Burbeck, S Nadjm-Tehrani
information security technical report 12 (1), 56-67, 2007
602007
Time-aware utility-based resource allocation in wireless networks
C Curescu, S Nadjm-Tehrani
IEEE Transactions on Parallel and Distributed Systems 16 (7), 624-636, 2005
542005
Real-time hierarchical control
M Morin, S Nadjm-Tehrani, P Osterling, E Sandewall
IEEE software 9 (5), 51-57, 1992
521992
Emerging information infrastructures: Cooperation in disasters
M Asplund, S Nadjm-Tehrani, J Sigholm
International Workshop on Critical Information Infrastructures Security, 258-270, 2008
492008
Attitudes and perceptions of IoT security in critical societal services
M Asplund, S Nadjm-Tehrani
IEEE Access 4, 2130-2138, 2016
472016
Geographical routing in intermittently connected ad hoc networks
E Kuiper, S Nadjm-Tehrani
22nd International Conference on Advanced Information Networking and …, 2008
472008
Price/utility-based optimized resource allocation in wireless ad hoc networks.
C Curescu, S Nadjm-Tehrani
SECON, 85-95, 2005
362005
Anomaly detection in water management systems
M Raciti, J Cucurull, S Nadjm-Tehrani
Critical infrastructure protection, 98-119, 2012
352012
Energy-aware cross-layer burst buffering for wireless communication
EJ Vergara, S Nadjm-Tehrani
2012 Third International Conference on Future Systems: Where Energy …, 2012
342012
Alarm reduction and correlation in defence of ip networks
T Chyssler, S Nadjm-Tehrani, S Burschka, K Burbeck
13th IEEE International Workshops on Enabling Technologies: Infrastructure …, 2004
322004
A partition-tolerant manycast algorithm for disaster area networks
M Asplund, S Nadjm-Tehrani
2009 28th IEEE International Symposium on Reliable Distributed Systems, 156-165, 2009
312009
Batman store-and-forward: The best of the two worlds
L Delosieres, S Nadjm-Tehrani
2012 IEEE International Conference on Pervasive Computing and Communications …, 2012
302012
The system can't perform the operation now. Try again later.
Articles 1–20