Follow
Alireza Sadighian
Title
Cited by
Cited by
Year
Poised: Spotting twitter spam off the beaten paths
S Nilizadeh, F Labrèche, A Sadighian, A Zand, J Fernandez, C Kruegel, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
722017
An efficient approach to detect torrentlocker ransomware in computer systems
F Mbol, JM Robert, A Sadighian
Cryptology and Network Security: 15th International Conference, CANS 2016 …, 2016
662016
Ontids: A highly flexible context-aware and ontology-based alert correlation framework
A Sadighian, JM Fernandez, A Lemay, ST Zargar
Foundations and Practice of Security: 6th International Symposium, FPS 2013 …, 2014
582014
Semantic-based context-aware alert fusion for distributed Intrusion Detection Systems
A Sadighian, ST Zargar, JM Fernandez, A Lemay
2013 International Conference on Risks and Security of Internet and Systems …, 2013
342013
Afmap: Anonymous forward-secure mutual authentication protocols for rfid systems
A Sadighian, R Jalili
2009 Third International Conference on Emerging Security Information …, 2009
292009
FLMAP: A fast lightweight mutual authentication protocol for RFID systems
A Sadighian, R Jalili
2008 16th IEEE International Conference on Networks, 1-6, 2008
222008
Characterizing the 2022-Russo-Ukrainian conflict through the lenses of aspect-based sentiment analysis: dataset, methodology, and key findings
M Caprolu, A Sadighian, R Di Pietro
2023 32nd international conference on computer communications and networks …, 2023
192023
A reliable and efficient time synchronization protocol for heterogeneous wireless sensor network
M Jabbarifar, AS Sendi, A Sadighian, NE Jivan, M Dagenais
Wireless Sensor Network 2 (12), 910, 2010
112010
Intrusion detection from heterogenous sensors
A Sadighian
École Polytechnique de Montréal, 2015
72015
MITRE ATT&CK: State of the Art and Way Forward
B Al-Sada, A Sadighian, G Oligeri
arXiv preprint arXiv:2308.14016, 2023
32023
A Context-Aware Malware Detection Based on Low-Level Hardware Indicators as a Last Line of Defense
A Sadighian, JM Robert, S Sarencheh, S Basu
The Eleventh International Conference on Emerging Security Information …, 2017
32017
Lightweight journaling for scada systems via event correlation
A Lemay, A Sadighian, J Fernandez
Critical Infrastructure Protection X: 10th IFIP WG 11.10 International …, 2016
32016
Analysis and Characterization of Cyber Threats Leveraging the MITRE ATT&CK Database
B Al-Sada, A Sadighian, G Oligeri
IEEE Access, 2023
22023
FadePrint-Satellite Spoofing Detection via Fading Fingerprinting
G Oligeri, S Sciancalepore, A Sadighian
IEEE Consumer Communications and Networking Conference (CCNC) 2024, 2024
12024
David and Goliath: Asymmetric Advantage in MIoT
G Oligeri, S Sciancalepore, A Sadighian
2023 6th International Conference on Advanced Communication Technologies and …, 2023
12023
False data injection attacks in smart grids: State of the art and way forward
M Irfan, A Sadighian, A Tanveer, SJ Al-Naimi, G Oligeri
arXiv preprint arXiv:2308.10268, 2023
12023
SatPrint: Satellite Link Fingerprinting
G Oligeri, S Sciancalepore, A Sadighian
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 177-185, 2024
2024
A survey on detection and localisation of false data injection attacks in smart grids
M Irfan, A Sadighian, A Tanveer, SJ Al‐Naimi, G Oligeri
IET Cyber‐Physical Systems: Theory & Applications, 2024
2024
Early Malware Characterization based on Online Social Networks
A Sadighian, I Abbes, G Oligeri
2023 6th International Conference on Advanced Communication Technologies and …, 2023
2023
Ayoub El idrissi 231 Ayush Bhardwaj 212 Aziz Benlarbi-Delaï 356
A Benkuider, A Farchi, A Haidine, A Ouaguid, A Maizate, A Najid, ...
CommNet 2023, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20