1974 …2010

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2010

    A data security protocol for the Trusted Truck® system

    Bulusu, S. A., Arazi, B., Arel, I., Davis, A. & Bitar, G., 22 Nov 2010, 6th Annual Cyber Security and Information Intelligence Research Workshop: Cyber Security and Information Intelligence Challenges and Strategies, CSIIRW10. 1852707. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • DNA-based dynamic logic circuitry

    Gearheart, C. M., Rouchka, E. C. & Arazi, B., 20 Sep 2010, 2010 IEEE International 53rd Midwest Symposium on Circuits and Systems, MWSCAS 2010. p. 248-251 4 p. 5548656. (Midwest Symposium on Circuits and Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • 2009

    Design of a hierarchical principal component analysis system for field intrusion detection

    Ashikhmin, A. Y., Graham, J. H., Desoky, A. H. & Arazi, B., 1 Dec 2009, 22nd International Conference on Computer Applications in Industry and Engineering 2009, CAINE 2009. p. 125-132 8 p. (22nd International Conference on Computer Applications in Industry and Engineering 2009, CAINE 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Intrusion detection system for SCADA networks

    Ashikhmin, A., Graham, J., Desoky, A. & Arazi, B., 1 Dec 2009, 24th International Conference on Computers and Their Applications 2009, CATA 2009. p. 156-161 6 p. (24th International Conference on Computers and Their Applications 2009, CATA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • 2008

    Mapping multiplicity aspects of secure communications into efficient parallel processing

    Arazi, B., 27 Oct 2008, 2008 IEEE International 51st Midwest Symposium on Circuits and Systems, MWSCAS. p. 310-313 4 p. 4616798. (Midwest Symposium on Circuits and Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Mobile components security

    Arazi, B., 1 Dec 2008, CSIIRW'08 - 4th Annual Cyber Security and Information Intelligence Research Workshop: Developing Strategies to Meet the Cyber Security and Information Intelligence Challenges Ahead. a34. (CSIIRW'08 - 4th Annual Cyber Security and Information Intelligence Research Workshop: Developing Strategies to Meet the Cyber Security and Information Intelligence Challenges Ahead).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Toward DNA-based security circuitry: First step - random number generation

    Bogard, C. M., Arazi, B. & Rouchka, E. C., 27 Oct 2008, 2008 IEEE International 51st Midwest Symposium on Circuits and Systems, MWSCAS. p. 597-600 4 p. 4616870. (Midwest Symposium on Circuits and Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2007

    Improvements in SCADA and DCS systems security

    Graham, J. H., Mostafa, M. S., Arazi, B., Tantawy, A., Hieb, J., Ralston, P. & Patel, S. C., 1 Dec 2007, 22nd International Conference on Computers and Their Applications 2007, CATA 2007. p. 194-200 7 p. (22nd International Conference on Computers and Their Applications 2007, CATA 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • 2006

    Self-certified public key generation on the Intel Mote 2 sensor network platform

    Arazi, O., Elhanany, I., Rose, D., Qi, H. & Arazi, B., 1 Jan 2006, 2006 2nd IEEE Workshop on Wireless Mesh Networks, WiMESH 2006. Institute of Electrical and Electronics Engineers Inc., p. 118-120 3 p. 4068265. (2006 2nd IEEE Workshop on Wireless Mesh Networks, WiMESH 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • 2005

    Synthesizing hashing circuits

    Arazi, B., 1 Dec 2005, 2005 IEEE International 48th Midwest Symposium on Circuits and Systems, MWSCAS 2005. p. 67-70 4 p. 1594041. (Midwest Symposium on Circuits and Systems; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Work in progress - Cybersecurity curriculum development initiated by public interests

    Arazi, B. & Elmaghraby, A. S., 1 Dec 2005, Proceedings - Frontiers in Education, 35th Annual Conference: Pedagogies and Technologies for the Emerging Global Economy, FIE'05. p. S2D-6-S2D-7 1612219. (Proceedings - Frontiers in Education Conference, FIE; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 1992

    Position recovery on a circle based on coding theory

    Arazi, B., 1 Jan 1992, Algebraic Coding - 1st French-Soviet Workshop, Proceedings. Cohen, G., Lobstein, A., Zemor, G. & Litsyn, S. (eds.). Springer Verlag, p. 87-101 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 573 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review