default search action
Hakem Beitollahi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Ababakr Ibrahim Rasul, Hakem Beitollahi:
Optimizing Information Freshness in Dual-Connection Cellular Networks for Real-Time Applications. IEEE Access 12: 94164-94175 (2024) - [j23]Maryam Esmaeilian, Hakem Beitollahi:
Experimental evaluation of RISC-V micro-architecture against fault injection attack. Microprocess. Microsystems 104: 104991 (2024) - [j22]Hakem Beitollahi, Marziye Pandi, Mostafa Moghaddas:
Edge-sorter: A hardware sorting engine for area & power constrained edge computing devices. Microprocess. Microsystems 105: 105006 (2024) - 2023
- [j21]Dyari Mohammad Sharif, Hakem Beitollahi, Mahdi Fazeli:
Detection of Application-Layer DDoS Attacks Produced by Various Freely Accessible Toolkits Using Machine Learning. IEEE Access 11: 51810-51819 (2023) - [j20]Dyari Mohammad Sharif, Hakem Beitollahi:
Detection of application-layer DDoS attacks using machine learning and genetic algorithms. Comput. Secur. 135: 103511 (2023) - [j19]Arash Salahvarzi, Mohsen Khosroanjam, Amir Mahdi Hosseini Monazzah, Hakem Beitollahi, Ümit Y. Ogras, Mahdi Fazeli:
WiSE: When Learning Assists Resolving STT-MRAM Efficiency Challenges. IEEE Trans. Emerg. Top. Comput. 11(1): 43-55 (2023) - [j18]Paria Darbani, Hakem Beitollahi, Pejman Lotfi-Kamran:
Rei: A Reconfigurable Interconnection Unit for Array-Based CNN Accelerators. IEEE Trans. Emerg. Top. Comput. 11(4): 895-906 (2023) - 2022
- [j17]Hakem Beitollahi, Dyari Mohammad Sharif, Mahdi Fazeli:
Application Layer DDoS Attack Detection Using Cuckoo Search Algorithm-Trained Radial Basis Function. IEEE Access 10: 63844-63854 (2022) - [j16]Amin Norollah, Zahra Kazemi, Hakem Beitollahi, David Hély:
Hardware Support for Efficient and Low-Power Data Sorting in Massive Data Application: The 3-D Sorting Method. IEEE Consumer Electron. Mag. 11(3): 87-94 (2022) - [j15]Mahsa Mohammadi, Hakem Beitollahi:
Q-scheduler: A temperature and energy-aware deep Q-learning technique to schedule tasks in real-time multiprocessor embedded systems. IET Comput. Digit. Tech. 16(4): 125-140 (2022) - [j14]Mohammad Reza Saberikia, Hakem Beitollahi:
An Energy- and Reliability-Aware Task Scheduling in Real-Time MPSoC Systems. J. Circuits Syst. Comput. 31(13): 2250225:1-2250225:27 (2022) - [j13]Amin Norollah, Hakem Beitollahi, Zahra Kazemi, Mahdi Fazeli:
A security-aware hardware scheduler for modern multi-core systems with hard real-time constraints. Microprocess. Microsystems 95: 104716 (2022) - [j12]Paria Darbani, Nezam Rohbani, Hakem Beitollahi, Pejman Lotfi-Kamran:
RASHT: A Partially Reconfigurable Architecture for Efficient Implementation of CNNs. IEEE Trans. Very Large Scale Integr. Syst. 30(7): 860-868 (2022) - 2021
- [j11]Mohammad Sajjad Aghadadi, Mahdi Fazeli, Hakem Beitollahi:
Joint Effects of Aging and Process Variations on Soft Error Rate of Nano-Scale Digital Circuits. J. Circuits Syst. Comput. 30(1): 2150012:1-2150012:21 (2021) - [c25]Amin Norollah, Zahra Kazemi, Niloufar Sayadi, Hakem Beitollahi, Mahdi Fazeli, David Hély:
Efficient Scheduling of Dependent Tasks in Many-Core Real-Time System Using a Hardware Scheduler. HPEC 2021: 1-7 - 2020
- [j10]Danesh Derafshi, Amin Norollah, Mohsen Khosroanjam, Hakem Beitollahi:
HRHS: A High-Performance Real-Time Hardware Scheduler. IEEE Trans. Parallel Distributed Syst. 31(4): 897-908 (2020) - [j9]Ali A. D. Farahani, Hakem Beitollahi, Mahmood Fathi:
A Dynamic General Accelerator for Integer and Fixed-Point Processing. IEEE Trans. Very Large Scale Integr. Syst. 28(12): 2509-2517 (2020) - [c24]Mohammad Taherifard, Hakem Beitollahi, Fateme Jamali, Amin Norollah, Ahmad Patooghy:
Mist-Scan: A Secure Scan Chain Architecture to Resist Scan-Based Attacks in Cryptographic Chips. SoCC 2020: 135-140
2010 – 2019
- 2019
- [j8]Seyed Mohammad Sebt, Ahmad Patooghy, Hakem Beitollahi:
An Efficient Technique to Detect Stealthy Hardware Trojans Independent of the Trigger Size. J. Electron. Test. 35(6): 839-852 (2019) - [j7]Zohreh Ekhtiyari, Vahidreza Moghaddas, Hakem Beitollahi:
A temperature-aware and energy-efficient fuzzy technique to schedule tasks in heterogeneous MPSoC systems. J. Supercomput. 75(8): 5398-5419 (2019) - [j6]Amin Norollah, Danesh Derafshi, Hakem Beitollahi, Mahdi Fazeli:
RTHS: A Low-Cost High-Performance Real-Time Hardware Sorter, Using a Multidimensional Sorting Algorithm. IEEE Trans. Very Large Scale Integr. Syst. 27(7): 1601-1613 (2019) - [c23]Amin Norollah, Zahra Kazemi, Hakem Beitollahi:
An Efficient Sorting Architecture for Area and Energy Constrained Edge Computing Devices. HPCS 2019: 455-462 - [c22]Amin Norollah, Hakem Beitollahi, Ahmad Patooghy:
A New Hardware Accelerator for Data Sorting in Area & Energy Constrained Architectures. MWSCAS 2019: 985-988 - 2018
- [j5]Seyed Mohammad Sebt, Ahmad Patooghy, Hakem Beitollahi, Michel A. Kinsy:
Circuit enclaves susceptible to hardware Trojans insertion at gate-level designs. IET Comput. Digit. Tech. 12(6): 251-257 (2018) - [c21]Hossein Hosseinzadeh, Hakem Beitollahi, Nasser Mozayani:
A Flexible and Efficient Reconfigurable Architecture based on Multi-Agent Systems. IST 2018: 429-434 - [c20]Amin Norollah, Danesh Derafshi, Hakem Beitollahi, Ahmad Patooghy:
PAT-Noxim: A Precise Power & Thermal Cycle-Accurate NoC Simulator. SoCC 2018: 163-168 - 2014
- [j4]Hakem Beitollahi, Geert Deconinck:
ConnectionScore: a statistical technique to resist application-layer DDoS attacks. J. Ambient Intell. Humaniz. Comput. 5(3): 425-442 (2014) - 2012
- [j3]Hakem Beitollahi, Geert Deconinck:
Ferris wheel: A ring based onion circuit for hidden services. Comput. Commun. 35(7): 829-841 (2012) - [j2]Hakem Beitollahi, Geert Deconinck:
Analyzing well-known countermeasures against distributed denial of service attacks. Comput. Commun. 35(11): 1312-1332 (2012) - [c19]Hakem Beitollahi, Geert Deconinck:
Tackling Application-layer DDoS Attacks. ANT/MobiWIS 2012: 432-441 - [c18]Hakem Beitollahi, Geert Deconinck:
A Four-StepTechnique forTackling DDoS Attacks. ANT/MobiWIS 2012: 507-516 - 2011
- [j1]Hakem Beitollahi, Geert Deconinck:
A dependable architecture to mitigate distributed denial of service attacks on network-based control systems. Int. J. Crit. Infrastructure Prot. 4(3-4): 107-123 (2011) - [c17]Hakem Beitollahi, Geert Deconinck:
A Ring Based Onion Circuit for Hidden Services. NordSec 2011: 13-30 - [c16]Hakem Beitollahi, Geert Deconinck:
A Cooperative Mechanism to Defense against Distributed Denial of Service Attacks. TrustCom 2011: 11-20 - 2010
- [c15]Hakem Beitollahi, Geert Deconinck:
Dynamic Multilayer Routing to Achieve Location-Hiding. PRDC 2010: 207-214
2000 – 2009
- 2009
- [c14]Giovanna Dondossola, Fabrizio Garrone, Judit Szanto, Geert Deconinck, T. Loix, Hakem Beitollahi:
ICT resilience of power control systems: experimental results from the CRUTIAL testbeds. DSN 2009: 554-559 - [c13]Hakem Beitollahi, Geert Deconinck:
Empirical Study of Tolerating Denial-of-Service Attacks with the Fosel Architecture. NCA 2009: 258-261 - [c12]Hakem Beitollahi, Geert Deconinck:
Making Overlay Networks more Robust to Massive Failures. PRDC 2009: 214-221 - 2008
- [c11]Hakem Beitollahi, Geert Deconinck:
Analysis of Peer-to-Peer networks from a dependability perspective. CRiSIS 2008: 101-108 - [c10]Hakem Beitollahi, Geert Deconinck:
Comparing Chord, CAN, and Pastry overlay networks for resistance to DoS attacks. CRiSIS 2008: 261-266 - [c9]Giovanna Dondossola, Geert Deconinck, Fabrizio Garrone, Hakem Beitollahi:
Testbeds for Assessing Critical Scenarios in Power Control Systems. CRITIS 2008: 223-234 - [c8]Hakem Beitollahi, Geert Deconinck:
An overlay protection layer against Denial-of-Service attacks. IPDPS 2008: 1-8 - [c7]Hakem Beitollahi, Geert Deconinck:
FOSeL: Filtering by Helping an Overlay Security Layer to Mitigate DoS Attacks. NCA 2008: 19-28 - [c6]Hakem Beitollahi, Geert Deconinck:
Dependable Overlay Networks. PRDC 2008: 104-111 - 2007
- [c5]Geert Deconinck, Koen Vanthournout, Hakem Beitollahi, Zhifeng Qui, Rui Duan, Bart Nauwelaers, Emmanuel Van Lil, Johan Driesen, Ronnie Belmans:
A Robust Semantic Overlay Network for Microgrid Control Applications. WADS 2007: 101-123 - [c4]Hakem Beitollahi, Seyed Ghassem Miremadi, Geert Deconinck:
Fault-Tolerant Earliest-Deadline-First Scheduling Algorithm. IPDPS 2007: 1-6 - 2006
- [c3]Hakem Beitollahi, Geert Deconinck:
Fault-Tolerant Partitioning Scheduling Algorithms in Real-Time Multiprocessor Systems. PRDC 2006: 296-304 - [c2]Hakem Beitollahi, Geert Deconinck:
Fault-Tolerant Rate-Monotonic Scheduling Algorithm in Uniprocessor Embedded Systems. PRDC 2006: 395-396 - 2005
- [c1]Hakem Beitollahi, Seyed Ghassem Miremadi:
Performance Evaluation of Fault-Tolerant Scheduling Algorithms in Real-Time Multiprocessor Systems. Parallel and Distributed Computing and Networks 2005: 479-484
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint