Intrusion detection system using voting-based neural network MH Haghighat, J Li Tsinghua Science and Technology 26 (4), 484-495, 2021 | 62 | 2021 |
Payload attribution via character dependent multi-bloom filters MH Haghighat, M Tavakoli, M Kharrazi IEEE Transactions on Information Forensics and Security 8 (5), 705-716, 2013 | 16 | 2013 |
SAWANT: smart window based anomaly detection using netflow traffic MH Haghighat, ZA Foroushani, J Li 2019 IEEE 19th International Conference on Communication Technology (ICCT …, 2019 | 11 | 2019 |
Edmund: Entropy based attack Detection and Mitigation engine Using Netflow Data MH Haghighat, J Li 8th International Conference on Communication and Network Security, 1-6, 2018 | 8 | 2018 |
Formal verification of authentication-type properties of an electronic voting protocol using mcrl2 HR Mahrooghi, MH Haghighat, R Jalili Fourth International Workshop on Verification and Evaluation of Computer and …, 2010 | 6 | 2010 |
HES: Highly Efficient and Scalable Technique for Matching Regex Patterns MH Haghighat, Z Fu, J Li Proceedings of the 2018 2nd High Performance Computing and Cluster …, 2018 | 3 | 2018 |
Toward fast regex pattern matching using simple patterns MH Haghighat, J Li 2018 IEEE 24th International Conference on Parallel and Distributed Systems …, 2018 | 2 | 2018 |
Automatic checking of eligibility in electronic voting protocolsusing mCRL2 MH Haghighat, HR Mahrooghi, R Jalili 2011 CSI International Symposium on Computer Science and Software …, 2011 | | 2011 |