Site Maintenance will take place from 4:00 PM on 2024-04-29 to 9:00 AM on 2024-05-01.
Please do not make any content change during this time, otherwise all the changes will be lost.

Select Publications

Book Chapters

Shaghaghi A; Kaafar MA; Buyya R; Jha S, 2019, 'Software-Defined Network (SDN) data plane security: Issues, solutions, and future directions', in Handbook of Computer Networks and Cyber Security: Principles and Paradigms, pp. 341 - 387, http://dx.doi.org/10.1007/978-3-030-22277-2_14

Desmedt Y; Shaghaghi A, 2018, 'Function-based access control (FBAC): Towards preventing insider threats in organizations', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 143 - 165, http://dx.doi.org/10.1007/978-3-030-04834-1_8

Journal articles

Gill SS; Xu M; Ottaviani C; Patros P; Bahsoon R; Shaghaghi A; Golec M; Stankovski V; Wu H; Abraham A; Singh M; Mehta H; Ghosh SK; Baker T; Parlikad AK; Lutfiyya H; Kanhere SS; Sakellariou R; Dustdar S; Rana O; Brandic I; Uhlig S, 2022, 'AI for next generation computing: Emerging trends and future directions', Internet of Things (Netherlands), 19, http://dx.doi.org/10.1016/j.iot.2022.100514

Maroof U; Shaghaghi A; Michelin R; Jha S, 2022, 'iRECOVer: Patch your IoT on-the-fly', Future Generation Computer Systems, 132, pp. 178 - 193, http://dx.doi.org/10.1016/j.future.2022.02.014

Syed NF; Shah SW; Shaghaghi A; Anwar A; Baig Z; Doss R, 2022, 'Zero Trust Architecture (ZTA): A Comprehensive Survey', IEEE Access, 10, pp. 57143 - 57179, http://dx.doi.org/10.1109/ACCESS.2022.3174679

Shah SW; Syed NF; Shaghaghi A; Anwar A; Baig Z; Doss R, 2021, 'LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA)', Computers and Security, 108, http://dx.doi.org/10.1016/j.cose.2021.102351

Stephens B; Shaghaghi A; Doss R; Kanhere SS, 2021, 'Detecting Internet of Things Bots: A Comparative Study', IEEE Access, 9, pp. 160391 - 160401, http://dx.doi.org/10.1109/ACCESS.2021.3130714

Gill SS; Shaghaghi A, 2020, 'Security-aware autonomic allocation of cloud resources: A model, research trends, and future directions', Journal of Organizational and End User Computing, 32, pp. 15 - 22, http://dx.doi.org/10.4018/JOEUC.2020070102

Ali Shah SW; Shaghaghi A; Kanhere SS; Zhang J; Anwar A; Doss R, 2020, 'Echo-id: Smart user identification leveraging inaudible sound signals', IEEE Access, 8, pp. 194508 - 194522, http://dx.doi.org/10.1109/ACCESS.2020.3031899

Conference Papers

Rivera A CA; Shaghaghi A; Nguyen DD; Kanhere SS, 2022, 'Is This IoT Device Likely to Be Secure? Risk Score Prediction for IoT Devices Using Gradient Boosting Machines', in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, pp. 115 - 127, http://dx.doi.org/10.1007/978-3-030-94822-1_7

Kamenski D; Shaghaghi A; Warren M; Kanhere SS, 2021, 'Attacking with bitcoin: Using bitcoin to build resilient botnet armies', in Advances in Intelligent Systems and Computing, pp. 3 - 12, http://dx.doi.org/10.1007/978-3-030-57805-3_1

Abaid Z; Shaghaghi A; Gunawardena R; Seneviratne S; Seneviratne A; Jha S, 2021, 'Health access broker: Secure, patient-controlled management of personal health records in the cloud', in Advances in Intelligent Systems and Computing, Springer Nature, pp. 111 - 121, http://dx.doi.org/10.1007/978-3-030-57805-3_11

Shah SW; Syed NF; Shaghaghi A; Anwar A; Baig Z; Doss R, 2020, 'Towards a lightweight continuous authentication protocol for device-to-device communication', in Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, pp. 1119 - 1126, http://dx.doi.org/10.1109/TrustCom50675.2020.00148

Puggioni E; Shaghaghi A; Doss R; Kanhere SS, 2020, 'Towards Decentralized IoT Updates Delivery Leveraging Blockchain and Zero-Knowledge Proofs', in 2020 IEEE 19th International Symposium on Network Computing and Applications, NCA 2020, http://dx.doi.org/10.1109/NCA51143.2020.9306689

Rivera A CA; Shaghaghi A; Kanhere SS, 2020, 'Towards a Distributed Defence Mechanism against IoT-based Bots', in Proceedings - Conference on Local Computer Networks, LCN, pp. 449 - 452, http://dx.doi.org/10.1109/LCN48667.2020.9314830

Jha S; Zhou J; Michelin R; Ahmed N; Shaghaghi A, 2020, 'Massage from the chairs', in Proceedings - 2020 Workshop on Emerging Technologies for Security in IoT, ETSecIoT 2020, pp. VI, http://dx.doi.org/10.1109/ETSecIoT50046.2020.00011

Maroof U; Shaghaghi A; Jha S, 2019, 'PLAR: Towards a Pluggable Software Architecture for Securing IoT Devices', in IoT S and P 2019 - Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, Association for Computing Machinery (ACM), ENGLAND, London, pp. 50 - 56, presented at Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, ENGLAND, London, 15 November 2019, http://dx.doi.org/10.1145/3338507.3358619

Shaghaghi A; Kanhere SS; Kaafar MA; Jha S, 2018, 'Gwardar: Towards protecting a software-defined network from malicious network operating systems', in NCA 2018 - 2018 IEEE 17th International Symposium on Network Computing and Applications, IEEE, Cambridge, MA, USA, presented at The 17th IEEE International Symposium on Network Computing and Applications (NCA 2018), Cambridge, MA, USA, 01 November 2018 - 03 November 2018, http://dx.doi.org/10.1109/NCA.2018.8548074

Shaghaghi A; Kanhere SS; Kaafar MA; Bertino E; Jha S, 2018, 'Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations', in Proceedings - Conference on Local Computer Networks, LCN, pp. 553 - 561, http://dx.doi.org/10.1109/LCN.2018.8638245

Shaghaghi A; Kaafar MA; Scott-Hayward S; Kanhere SS; Jha S, 2017, 'Towards Policy Enforcement Point as a Service (PEPS)', in 2016 IEEE Conference on Network Function Virtualization and Software Defined Networks, NFV-SDN 2016, pp. 50 - 55, http://dx.doi.org/10.1109/NFV-SDN.2016.7919475

Shaghaghi A; Kaafar MA; Jha S, 2017, 'WedgeTail: An intrusion prevention system for the data plane of software defined networks', in ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security, Abu Dhabi, United Arab Emirates, pp. 849 - 861, presented at 2017 ACM on Asia Conference on Computer and Communications Security, Abu Dhabi, United Arab Emirates, 02 April 2017 - 06 April 2017, http://dx.doi.org/10.1145/3052973.3053039

Desmedt Y; Shaghaghi A, 2016, 'Function-based access control (FBAC): From access control Matrix to access control tensor', in MIST 2016 - Proceedings of the International Workshop on Managing Insider Security Threats, co-located with CCS 2016, pp. 89 - 92, http://dx.doi.org/10.1145/2995959.2995974

Conference Abstracts

Shaghaghi A; Hong J; Jha S, 2014, 'An SDN-based framework for detection of illegal rebroadcasting of channels in P2PTV', in VideoNEXT 2014 - Proceedings of the 2014 Workshop on Design, Quality and Deployment of Adaptive Video Streaming, pp. 47 - 49, http://dx.doi.org/10.1145/2676652.2683465

Preprints

Gill SS; Xu M; Ottaviani C; Patros P; Bahsoon R; Shaghaghi A; Golec M; Stankovski V; Wu H; Abraham A; Singh M; Mehta H; Ghosh SK; Baker T; Parlikad AK; Lutfiyya H; Kanhere SS; Sakellariou R; Dustdar S; Rana O; Brandic I; Uhlig S, 2022, AI for Next Generation Computing: Emerging Trends and Future Directions, , http://dx.doi.org/10.48550/arxiv.2203.04159

Alvarez CAR; Shaghaghi A; Nguyen DD; Kanhere SS, 2021, Is this IoT Device Likely to be Secure? Risk Score Prediction for IoT Devices Using Gradient Boosting Machines, , http://dx.doi.org/10.48550/arxiv.2111.11874

Puggioni E; Shaghaghi A; Doss R; Kanhere SS, 2020, Towards Decentralized IoT Updates Delivery Leveraging Blockchain and Zero-Knowledge Proofs, , http://dx.doi.org/10.48550/arxiv.2010.12134

Shah SW; Syed NF; Shaghaghi A; Anwar A; Baig Z; Doss R, 2020, Towards a Lightweight Continuous Authentication Protocol for Device-to-Device Communication, , http://dx.doi.org/10.48550/arxiv.2010.05144

Abaid Z; Shaghaghi A; Gunawardena R; Seneviratne S; Seneviratne A; Jha S, 2020, Health Access Broker: Secure, Patient-Controlled Management of Personal Health Records in the Cloud, , http://dx.doi.org/10.48550/arxiv.2005.07987

Kamenski D; Shaghaghi A; Warren M; Kanhere SS, 2020, Attacking with bitcoin: Using Bitcoin to Build Resilient Botnet Armies, , http://dx.doi.org/10.48550/arxiv.2004.01855

Shaghaghi A; Kanhere SS; Kaafar MA; Jha S, 2018, Gwardar: Towards Protecting a Software-Defined Network from Malicious Network Operating Systems, , http://dx.doi.org/10.48550/arxiv.1809.06988

Shaghaghi A; Kanhere SS; Kaafar MA; Bertino E; Jha S, 2018, Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations, , http://dx.doi.org/10.48550/arxiv.1807.02593

Shaghaghi A; Kaafar MA; Buyya R; Jha S, 2018, Software-Defined Network (SDN) Data Plane Security: Issues, Solutions and Future Directions, , http://dx.doi.org/10.48550/arxiv.1804.00262

Shaghaghi A; Kaafar MA; Jha S, 2017, WedgeTail: An Intrusion Prevention System for the Data Plane of Software Defined Networks, , http://dx.doi.org/10.48550/arxiv.1708.05477

Shaghaghi A; Ali M; Kaafar ; Scott-Hayward S; Kanhere SS; Jha S, 2016, Towards Policy Enforcement Point as a Service (PEPS), , http://dx.doi.org/10.48550/arxiv.1610.02526


Back to profile page