Shohreh Hosseinzadeh
Shohreh Hosseinzadeh
Department of Information Technology, University of Turku
Vahvistettu sähköpostiosoite verkkotunnuksessa utu.fi
Nimike
Viittaukset
Viittaukset
Vuosi
A semantic security framework and context-aware role-based access control ontology for smart spaces
S Hosseinzadeh, S Virtanen, N Díaz-Rodríguez, J Lilius
Proceedings of the International Workshop on Semantic Big Data, 1-6, 2016
282016
Diversification and obfuscation techniques for software security: A systematic literature review
S Hosseinzadeh, S Rauti, S Laurén, JM Mäkelä, J Holvitie, S Hyrynsalmi, ...
Information and Software Technology 104, 72-93, 2018
212018
Security in the internet of things through obfuscation and diversification
S Hosseinzadeh, S Rauti, S Hyrynsalmi, V Leppänen
2015 International Conference on Computing, Communication and Security …, 2015
202015
Diversification of system calls in linux binaries
S Rauti, S Laurén, S Hosseinzadeh, JM Mäkelä, S Hyrynsalmi, ...
International Conference on Trusted Systems, 15-35, 2014
172014
Security in container-based virtualization through vTPM
S Hosseinzadeh, S Laurén, V Leppänen
Proceedings of the 9th International Conference on Utility and Cloud …, 2016
162016
Symbol diversification of linux binaries
S Laurén, P Mäki, S Rauti, S Hosseinzadeh, S Hyrynsalmi, V Leppänen
World Congress on Internet Security (WorldCIS-2014), 74-79, 2014
162014
Security and privacy in cloud computing via obfuscation and diversification: A survey
S Hosseinzadeh, S Hyrynsalmi, M Conti, V Leppänen
2015 IEEE 7th International Conference on Cloud Computing Technology and …, 2015
132015
Software security considerations for IoT
A Koivu, L Koivunen, S Hosseinzadeh, S Laurén, S Hyrynsalmi, S Rauti, ...
2016 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2016
112016
Interface diversification in IoT operating systems
P Mäki, S Rauti, S Hosseinzadeh, L Koivunen, V Leppänen
Proceedings of the 9th International Conference on Utility and Cloud …, 2016
82016
Mitigating Branch-Shadowing Attacks on Intel SGX using Control Flow Randomization
S Hosseinzadeh, H Liljestrand, V Leppänen, A Paverd
arXiv preprint arXiv:1808.06478, 2018
72018
A survey on aims and environments of diversification and obfuscation in software security
S Hosseinzadeh, S Rauti, S Laurén, JM Mäkelä, J Holvitie, S Hyrynsalmi, ...
Proceedings of the 17th International Conference on Computer Systems and …, 2016
62016
Obfuscation and Diversification for Securing the Internet of Things (IoT)
S Hosseinzadeh, S Hyrynsalmi, V Leppänen
Internet of Things: Principles and Paradigms, 259–274, 2016
62016
A survey on internal interfaces used by exploits and implications on interface diversification
S Rauti, S Lauren, J Uitto, S Hosseinzadeh, J Ruohonen, S Hyrynsalmi, ...
Nordic Conference on Secure IT Systems, 152-168, 2016
52016
Investigating the possibility of data leakage in time of live VM migration
R Yasmin, MR Memarian, S Hosseinzadeh, M Conti, V Leppänen
Cyber Threat Intelligence, 259-279, 2018
42018
Obfuscation and diversification for securing cloud computing
S Hosseinzadeh, S Laurén, S Rauti, S Hyrynsalmi, M Conti, V Leppänen
International Workshop on Enterprise Security, 179-202, 2015
32015
A scalable distributed M3 platform on a low-power cluster
A Berg, P Karvinen, S Grönroos, F Wickström, S Hosseinzadeh, N Dıaz, ...
Open International M3 Semantic Interoperability Workshop, ser. TUCS …, 2013
32013
M3 interoperability for remote rehabilitation with kinect
ND Rodríguez, S Grönroos, F Wickström, P Karvinen, A Berg, ...
Open International M3 Semantic Interoperability Workshop 21, 153-163, 2013
22013
Internal Interface Diversification as a Security Measure in Sensor Networks
S Rauti, L Koivunen, P Mäki, S Hosseinzadeh, S Laurén, J Holvitie, ...
Journal of Sensor and Actuator Networks 7 (1), 12, 2018
12018
Recent trends in applying TPM to cloud computing
S Hosseinzadeh, B Sequeiros, PRM Inácio, V Leppänen
Security and Privacy 3 (1), e93, 2020
2020
Measuring software security from the design of software
M Saarela, S Hosseinzadeh, S Hyrynsalmi, V Leppänen
Proceedings of the 18th International Conference on Computer Systems and …, 2017
2017
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20