default search action
Arash Shaghaghi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c15]Shohreh Deldari, Mohammad Goudarzi, Aditya Joshi, Arash Shaghaghi, Simon Finn, Flora D. Salim, Sanjay Jha:
AuditNet: Conversational AI Security Assistant. MobileHCI (Companion) 2024: 22:1-22:4 - [i19]Andrew Reeves, Arash Shaghaghi, Shiri Krebs, Debi Ashenden:
Data After Death: Australian User Preferences and Future Solutions to Protect Posthumous User Data. CoRR abs/2407.01282 (2024) - [i18]Mohammad Goudarzi, Arash Shaghaghi, Simon Finn, Sanjay Jha:
Lack of Systematic Approach to Security of IoT Context Sharing Platforms. CoRR abs/2407.05290 (2024) - [i17]Akanksha Saini, Arash Shaghaghi, Zhibo Huang, Salil S. Kanhere:
Multi-MedChain: Multi-Party Multi-Blockchain Medical Supply Chain Management System. CoRR abs/2407.11207 (2024) - [i16]Shohreh Deldari, Mohammad Goudarzi, Aditya Joshi, Arash Shaghaghi, Simon Finn, Flora D. Salim, Sanjay Jha:
AuditNet: A Conversational AI-based Security Assistant [DEMO]. CoRR abs/2407.14116 (2024) - [i15]Uzma Maroof, Gustavo Batista, Arash Shaghaghi, Sanjay K. Jha:
Towards Detecting IoT Event Spoofing Attacks Using Time-Series Classification. CoRR abs/2407.19662 (2024) - [i14]Mohammad Goudarzi, Arash Shaghaghi, Simon Finn, Burkhard Stiller, Sanjay K. Jha:
Towards Threat Modelling of IoT Context-Sharing Platforms. CoRR abs/2408.12081 (2024) - [i13]Carlos A. Rivera Alvarez, Arash Shaghaghi, Gustavo Batista, Salil S. Kanhere:
Towards Weaknesses and Attack Patterns Prediction for IoT Devices. CoRR abs/2408.13172 (2024) - 2022
- [j7]Naeem Firdous Syed, Syed W. Shah, Arash Shaghaghi, Adnan Anwar, Zubair A. Baig, Robin Doss:
Zero Trust Architecture (ZTA): A Comprehensive Survey. IEEE Access 10: 57143-57179 (2022) - [j6]Uzma Maroof, Arash Shaghaghi, Regio A. Michelin, Sanjay K. Jha:
iRECOVer: Patch your IoT on-the-fly. Future Gener. Comput. Syst. 132: 178-193 (2022) - [j5]Sukhpal Singh Gill, Minxian Xu, Carlo Ottaviani, Panos Patros, Rami Bahsoon, Arash Shaghaghi, Muhammed Golec, Vlado Stankovski, Huaming Wu, Ajith Abraham, Manmeet Singh, Harshit Mehta, Soumya K. Ghosh, Thar Baker, Ajith Kumar Parlikad, Hanan Lutfiyya, Salil S. Kanhere, Rizos Sakellariou, Schahram Dustdar, Omer F. Rana, Ivona Brandic, Steve Uhlig:
AI for next generation computing: Emerging trends and future directions. Internet Things 19: 100514 (2022) - [i12]Sukhpal Singh Gill, Minxian Xu, Carlo Ottaviani, Panos Patros, Rami Bahsoon, Arash Shaghaghi, Muhammed Golec, Vlado Stankovski, Huaming Wu, Ajith Abraham, Manmeet Singh, Harshit Mehta, Soumya K. Ghosh, Thar Baker, Ajith Kumar Parlikad, Hanan Lutfiyya, Salil S. Kanhere, Rizos Sakellariou, Schahram Dustdar, Omer F. Rana, Ivona Brandic, Steve Uhlig:
AI for Next Generation Computing: Emerging Trends and Future Directions. CoRR abs/2203.04159 (2022) - 2021
- [j4]Ben Stephens, Arash Shaghaghi, Robin Doss, Salil S. Kanhere:
Detecting Internet of Things Bots: A Comparative Study. IEEE Access 9: 160391-160401 (2021) - [j3]Syed W. Shah, Naeem Firdous Syed, Arash Shaghaghi, Adnan Anwar, Zubair A. Baig, Robin Doss:
LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA). Comput. Secur. 108: 102351 (2021) - [c14]Carlos A. Rivera Alvarez, Arash Shaghaghi, David D. Nguyen, Salil S. Kanhere:
Is This IoT Device Likely to Be Secure? Risk Score Prediction for IoT Devices Using Gradient Boosting Machines. MobiQuitous 2021: 115-127 - [i11]Carlos A. Rivera Alvarez, Arash Shaghaghi, David D. Nguyen, Salil S. Kanhere:
Is this IoT Device Likely to be Secure? Risk Score Prediction for IoT Devices Using Gradient Boosting Machines. CoRR abs/2111.11874 (2021) - 2020
- [j2]Syed Wajid Ali Shah, Arash Shaghaghi, Salil S. Kanhere, Jin Zhang, Adnan Anwar, Robin Doss:
Echo-ID: Smart User Identification Leveraging Inaudible Sound Signals. IEEE Access 8: 194508-194522 (2020) - [j1]Sukhpal Singh Gill, Arash Shaghaghi:
Security-Aware Autonomic Allocation of Cloud Resources: A Model, Research Trends, and Future Directions. J. Organ. End User Comput. 32(3): 15-22 (2020) - [c13]Dimitri Kamenski, Arash Shaghaghi, Matthew J. Warren, Salil S. Kanhere:
Attacking with Bitcoin: Using Bitcoin to Build Resilient Botnet Armies. CISIS 2020: 3-12 - [c12]Zainab Abaid, Arash Shaghaghi, Ravin Gunawardena, Suranga Seneviratne, Aruna Seneviratne, Sanjay Jha:
Health Access Broker: Secure, Patient-Controlled Management of Personal Health Records in the Cloud. CISIS 2020: 111-121 - [c11]Carlos A. Rivera Alvarez, Arash Shaghaghi, Salil S. Kanhere:
Towards a Distributed Defence Mechanism Against IoT-based Bots. LCN 2020: 449-452 - [c10]Edoardo Puggioni, Arash Shaghaghi, Robin Doss, Salil S. Kanhere:
Towards Decentralized IoT Updates Delivery Leveraging Blockchain and Zero-Knowledge Proofs. NCA 2020: 1-10 - [c9]Syed W. Shah, Naeem Firdous Syed, Arash Shaghaghi, Adnan Anwar, Zubair A. Baig, Robin Doss:
Towards a Lightweight Continuous Authentication Protocol for Device-to-Device Communication. TrustCom 2020: 1119-1126 - [p1]Arash Shaghaghi, Mohamed Ali Kâafar, Rajkumar Buyya, Sanjay Jha:
Software-Defined Network (SDN) Data Plane Security: Issues, Solutions, and Future Directions. Handbook of Computer Networks and Cyber Security 2020: 341-387 - [i10]Dimitri Kamenski, Arash Shaghaghi, Matthew J. Warren, Salil S. Kanhere:
Attacking with bitcoin: Using Bitcoin to Build Resilient Botnet Armies. CoRR abs/2004.01855 (2020) - [i9]Zainab Abaid, Arash Shaghaghi, Ravin Gunawardena, Suranga Seneviratne, Aruna Seneviratne, Sanjay Jha:
Health Access Broker: Secure, Patient-Controlled Management of Personal Health Records in the Cloud. CoRR abs/2005.07987 (2020) - [i8]Syed W. Shah, Naeem Firdous Syed, Arash Shaghaghi, Adnan Anwar, Zubair A. Baig, Robin Doss:
Towards a Lightweight Continuous Authentication Protocol for Device-to-Device Communication. CoRR abs/2010.05144 (2020) - [i7]Edoardo Puggioni, Arash Shaghaghi, Robin Doss, Salil S. Kanhere:
Towards Decentralized IoT Updates Delivery Leveraging Blockchain and Zero-Knowledge Proofs. CoRR abs/2010.12134 (2020)
2010 – 2019
- 2019
- [c8]Uzma Maroof, Arash Shaghaghi, Sanjay K. Jha:
PLAR: Towards a Pluggable Software Architecture for Securing IoT Devices. IoT S&P@CCS 2019: 50-57 - 2018
- [b1]Arash Shaghaghi:
Securing Software-Defined Network Enabled Enterprises Against Insider Threats. University of New South Wales, Sydney, Australia, 2018 - [c7]Yvo Desmedt, Arash Shaghaghi:
Function-Based Access Control (FBAC): Towards Preventing Insider Threats in Organizations. From Database to Cyber Security 2018: 143-165 - [c6]Arash Shaghaghi, Salil S. Kanhere, Mohamed Ali Kâafar, Elisa Bertino, Sanjay Jha:
Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations. LCN 2018: 553-561 - [c5]Arash Shaghaghi, Salil S. Kanhere, Mohamed Ali Kâafar, Sanjay Jha:
Gwardar: Towards Protecting a Software-Defined Network from Malicious Network Operating Systems. NCA 2018: 1-5 - [i6]Arash Shaghaghi, Mohamed Ali Kâafar, Rajkumar Buyya, Sanjay Jha:
Software-Defined Network (SDN) Data Plane Security: Issues, Solutions and Future Directions. CoRR abs/1804.00262 (2018) - [i5]Arash Shaghaghi, Salil S. Kanhere, Mohamed Ali Kâafar, Elisa Bertino, Sanjay Jha:
Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations. CoRR abs/1807.02593 (2018) - [i4]Arash Shaghaghi, Salil S. Kanhere, Mohamed Ali Kâafar, Sanjay Jha:
Gwardar: Towards Protecting a Software-Defined Network from Malicious Network Operating Systems. CoRR abs/1809.06988 (2018) - 2017
- [c4]Arash Shaghaghi, Mohamed Ali Kâafar, Sanjay Jha:
WedgeTail: An Intrusion Prevention System for the Data Plane of Software Defined Networks. AsiaCCS 2017: 849-861 - [i3]Arash Shaghaghi, Mohamed Ali Kâafar, Sanjay Jha:
WedgeTail 2.0: An Intrusion Prevention System for the Data Plane of Software Defined Networks. CoRR abs/1708.05477 (2017) - 2016
- [c3]Yvo Desmedt, Arash Shaghaghi:
Function-Based Access Control (FBAC): From Access Control Matrix to Access Control Tensor. MIST@CCS 2016: 89-92 - [c2]Arash Shaghaghi, Mohamed Ali Kâafar, Sandra Scott-Hayward, Salil S. Kanhere, Sanjay K. Jha:
Towards Policy Enforcement Point as a Service (PEPS). NFV-SDN 2016: 50-55 - [i2]Yvo Desmedt, Arash Shaghaghi:
Function-Based Access Control (FBAC): From Access Control Matrix to Access Control Tensor. CoRR abs/1609.04514 (2016) - [i1]Arash Shaghaghi, Mohamed Ali Kâafar, Sandra Scott-Hayward, Salil S. Kanhere, Sanjay K. Jha:
Towards Policy Enforcement Point as a Service (PEPS). CoRR abs/1610.02526 (2016) - 2014
- [c1]Arash Shaghaghi, Jaesung Hong, Sanjay Jha:
An SDN-based Framework for Detection of Illegal Rebroadcasting of Channels in P2PTV. VideoNext@CoNEXT 2014: 47-49
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 19:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint