Vafa Andalibi
Vafa Andalibi
Security Software Engineer
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
Throwing {MUD} into the {FOG}: Defending {IoT} and Fog by expanding {MUD} to Fog network
V Andalibi, DI Kim, LJ Camp
2nd USENIX Workshop on Hot Topics in Edge Computing (HotEdge 19), 2019
Data correction for seven activity trackers based on regression models
V Andalibi, H Honko, F Christophe, J Viik
2015 37th Annual International Conference of the IEEE Engineering in …, 2015
On the Analysis of MUD-Files’ Interactions, Conflicts, and Configuration Requirements Before Deployment
V Andalibi, E Lear, D Kim, J Camp
5th EAI International Conference on Safety and Security in Internet of …, 2021
Pattern recognition with spiking neural networks: a simple training method.
F Christophe, T Mikkonen, V Andalibi, K Koskimies, T Laukkarinen
SPLST, 296-308, 2015
W2E-–Wellness Warehouse Engine for Semantic Interoperability of Consumer Health Data
H Honko, V Andalibi, T Aaltonen, J Parak, M Saaranen, J Viik, I Korhonen
IEEE Journal of Biomedical and Health Informatics 20 (6), 1632-1639, 2015
Controlling complexity of cerebral cortex simulations—I: CxSystem, a flexible cortical simulation framework
V Andalibi, H Hokkanen, S Vanni
Neural Computation 31 (6), 1048-1065, 2019
Analysis of Paradoxes in Fingerprint Countermeasures
V Andalibi, F Christophe, T Mikkonen
Proceedings of the 21st Conference of Open Innovations Association FRUCT …, 2017
Survey and evaluation of neural computation models for bio-integrated systems
F Christophe, V Andalibi, T Laukkarinen, T Mikkonen, K Koskimies
Nano Communication Networks 6 (4), 155-165, 2015
Making access control easy in IoT
V Andalibi, J Dev, DI Kim, E Lear, LJ Camp
Human Aspects of Information Security and Assurance: 15th IFIP WG 11.12 …, 2021
Fingerprinting edge and cloud services in iot
DI Kim, V Andalibi, LJ Camp
2020 13th International Conference on Systematic Approaches to Digital …, 2020
Controlling complexity of cerebral cortex simulations—II: Streamlined microcircuits
H Hokkanen, V Andalibi, S Vanni
Neural Computation 31 (6), 1066-1084, 2019
Is visualization enough? Evaluating the efficacy of mud-visualizer in enabling ease of deployment for manufacturer usage description (mud)
V Andalibi, J Dev, DI Kim, E Lear, LJ Camp
Annual Computer Security Applications Conference, 337-348, 2021
Biophysical parameters control signal transfer in spiking network
T Garnier Artiñano, V Andalibi, I Atula, M Maestri, S Vanni
Frontiers in computational neuroscience 17, 1011814, 2023
Privacy Lessons Learnt from Deploying an IoT Ecosystem in the Home
J Abbott, J Dev, D Kim, S Gopavaram, M Iyer, S Sadam, S Mare, ...
Proceedings of the 2022 European Symposium on Usable Security, 98-110, 2022
Criteria and Analysis for Human-Centered Browser Fingerprinting Countermeasures
V Andalibi, E Sadeqi Azer, LJ Camp
Hawaii International Conference on System Sciences (HICSS), 2022
SBOM vulnerability assessment & corresponding requirements
LJ Camp, V Andalibi
NTIA Response to Notice and Request for Comments on Software Bill of …, 2021
Building wireless sensor networks with biological cultures: components and integration challenges
F Christophe, T Laukkarinen, T Mikkonen, J Massera, V Andalibi
International Journal of Parallel, Emergent and Distributed Systems 32 (1 …, 2017
Effective connectivity analysis in brain networks: a gpu-accelerated implementation of the cox method
V Andalibi, F Christophe, T Laukkarinen, T Mikkonen
IEEE Journal of Selected Topics in Signal Processing 10 (7), 1226-1237, 2016
Leveraging Machine Learning for End-User Security and Privacy Protection
V Andalibi
Indiana University, 2022
Protecting IoT Devices through Localized Detection of BGP Hijacks for Individual Things
DI Kim, V Andalibi, J Camp
2021 IEEE Security and Privacy Workshops (SPW), 260-267, 2021
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20