Follow
M. Hossain Heydari
Title
Cited by
Cited by
Year
Content based file type detection algorithms
M McDaniel, MH Heydari
36th Annual Hawaii International Conference on System Sciences, 2003 …, 2003
2482003
Combinatorial optimization of group key management
M Eltoweissy, MH Heydari, L Morales, IH Sudborough
Journal of Network and Systems Management 12, 33-50, 2004
2382004
On the diameter of the pancake network
MH Heydari, IH Sudborough
Journal of Algorithms 25 (1), 67-94, 1997
1811997
Techniques for finding ring covers in survivable networks
LM Gardner, M Heydari, J Shah, IH Sudborough, IG Tollis, C Xia
1994 IEEE GLOBECOM. Communications: The Global Bridge 3, 1862-1866, 1994
761994
Improving the security of wireless sensor networks in an IoT environmental monitoring system
M Tellez, S El-Tawab, HM Heydari
2016 IEEE systems and information engineering design symposium (SIEDS), 72-77, 2016
522016
On sorting by prefix reversals and the diameter of pancake networks
MH Heydari, IH Sudborough
Heinz Nixdorf Symposium at the University of Paderborn, 218-227, 1992
471992
Security analysis of an IoT system used for indoor localization in healthcare facilities
C Bradley, S El-Tawab, MH Heydari
2018 Systems and Information Engineering Design Symposium (SIEDS), 147-152, 2018
372018
IoT security attacks using reverse engineering methods on WSN applications
M Tellez, S El-Tawab, MH Heydari
2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), 182-187, 2016
332016
Combinatorial optimization of multicast key management
L Morales, IH Sudborough, M Eltoweissy, MH Heydari
36th Annual Hawaii International Conference on System Sciences, 2003 …, 2003
312003
Localization of health center assets through an iot environment (locate)
TD McAllister, S El-Tawab, MH Heydari
2017 Systems and Information Engineering Design Symposium (SIEDS), 132-137, 2017
272017
Efficient algorithms for batch re-keying operations in secure multicast
MH Heydari, L Morales, IH Sudborough
Proceedings of the 39th Annual Hawaii International Conference on System …, 2006
242006
Data analysis and information security of an Internet of Things (IoT) intelligent transit system
Z Yorio, R Oram, S El-Tawab, A Salman, MH Heydari, BB Park
2018 Systems and Information Engineering Design Symposium (SIEDS), 24-29, 2018
192018
Computing cross associations for attack graphs and other applications
MH Heydari, L Morales, CO Shields, IH Sudborough
2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007
192007
Security measurement on a cloud-based cyber-physical system used for intelligent transportation
K Evers, R Oram, S El-Tawab, MH Heydari, BB Park
2017 IEEE International Conference on Vehicular Electronics and Safety …, 2017
172017
An intrusion-tolerant password authentication system
X Wang, MH Heydari, H Lin
19th Annual Computer Security Applications Conference, 2003. Proceedings …, 2003
152003
The pancake problem
MH Heydari
The University of Texas at Dallas, 1993
101993
Sorting by prefix reversals is NP-complete
MH Heydari, IH Sudborough
To be submitted 66, 0
9
BTEXS removal from aqueous phase by MCM-41 green synthesis using rice husk silica
M Heydari, T Tabatabaie, F Amiri, SE Hashemi
Iranica Journal of Energy & Environment 14 (4), 321-335, 2023
62023
A Comparative Analysis of Solar Energy Strategies in Middle East with Rich Fossil Resources
MR Hayati, S Ranjbar, MR Abdar, M Molaei Nasab, S Homayounmajd, ...
Iranica Journal of Energy & Environment 14 (3), 271-288, 2023
52023
Algorithms and bounds for layer assignment of MCM routing
MH Heydari, IG Tollis, C Xis
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 2 (2), 265-270, 1994
51994
The system can't perform the operation now. Try again later.
Articles 1–20