Mahdi Dibaei Asl
Mahdi Dibaei Asl, M. Sc.
Short Biography
Mahdi Dibaei is a research assistant and part of the “Quality-of-Service” group at the Chair of Computer Networks and Communication Systems. He received his Bachelor of Science (B.Sc.) in 2006 in Compute Engineering – Software and his Master of Science (M.Sc.) in Computer Engineering – Computer Systems Architecture in 2014 focusing on “Implementing a Trust-based method in Wireless Sensor Networks”. His previous research was related to wireless networks with trust management, deep learning, and blockchain solutions. Currently, Mahdi is researching fault tree analysis and minimal cut sets as part of his doctorate.
More Information
2024
Security Principles in Smart and Agile Cybersecurity for IoT and IIoT Environments
In: Security Principles in Smart and Agile Cybersecurity for IoT and IIoT Environments, 2024
DOI: 10.4018/979-8-3693-3451-5.ch001
BibTeX: Download
, , , :
A Novel Method for Computing Minimal Cut Sets of Variant-Rich Systems in Fault Tree Analysis
7th International Conference on System Reliability and Safety, ICSRS 2023 (Bologna, 2023-11-22 - 2023-11-24)
In: International Conference on System Reliability and Safety, ICSRS 2023 2024
DOI: 10.1109/ICSRS59833.2023.10381472
BibTeX: Download
, , , :
2021
Investigating the prospect of leveraging blockchain and machine learning to secure vehicular networks: A survey
In: IEEE Transactions on Intelligent Transportation Systems 23 (2021), p. 683--700
ISSN: 1524-9050
URL: https://ieeexplore.ieee.org/document/9519843
BibTeX: Download
, , , , , , , , :
An energy-efficient and secure data inference framework for internet of health things: a pilot study
In: Sensors 21 (2021), p. 312
ISSN: 1424-8220
URL: https://www.mdpi.com/1424-8220/21/1/312
BibTeX: Download
, , , , , :
2020
Full-duplex medium access control protocols in wireless networks: A survey
In: Wireless Networks 26 (2020), p. 2825--2843
ISSN: 1022-0038
URL: https://link.springer.com/article/10.1007/s11276-019-02242-w
BibTeX: Download
, :
Attacks and defences on intelligent connected vehicles: A survey
In: Digital Communications and Networks 6 (2020), p. 399--421
ISSN: 2468-5925
DOI: 10.1016/j.dcan.2020.04.007
URL: https://www.sciencedirect.com/science/article/pii/S235286481930197X
BibTeX: Download
, , , , , , , :
A privacy-preserving data inference framework for internet of health things networks
In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) 2020
URL: https://ieeexplore.ieee.org/abstract/document/9343037
BibTeX: Download
, , , , , :
2019
An overview of attacks and defences on intelligent connected vehicles
In: arXiv (2019)
ISSN: 2331-8442
URL: https://arxiv.org/abs/1907.07455
BibTeX: Download
, , , , , , , , , , :
Cyber vulnerability intelligence for internet of things binary
In: IEEE Transactions on Industrial Informatics 16 (2019), p. 2154--2163
ISSN: 1551-3203
URL: https://ieeexplore.ieee.org/abstract/document/8892533
BibTeX: Download
, , , , , :
2017
TSIS: a trust-based scheme for increasing security in wireless sensor networks
In: Majlesi Journal of Electrical Engineering 11 (2017), p. 45--52
ISSN: 2008-1413
URL: https://www.researchgate.net/profile/Mahdi-Dibaei/publication/322053467_A_trust-based_scheme_for_increasing_security_in_wireless_sensor_networks/links/5d4804fc4585153e593d0607/A-trust-based-scheme-for-increasing-security-in-wireless-sensor-networks.pdf
BibTeX: Download
, :
-
MBPLE4Mobility - Continuous model-based product line development for control systems in vehicle technology
(Third Party Funds Single)
Term: 2021-07-01 - 2024-06-30
Funding source: Bundesministerium für Wirtschaft und Technologie (BMWi)As part of a large consortium, the Chair of Computer Science 7 is involved in the project with the model-based system design of the vehicle communication systems under inclusion of variant diversity. For this purpose, on the one hand, an optimization for the configuration and resource design of the network architecture for different communication protocols and mechanisms is realized. On the other hand, safety analyses are performed using fault trees and extending them for product lines.
Network calculus is used for the formal verification of the required real-time properties. Therefore, suitable approaches for the scheduling methods applied in the networking technologies (e.g. TAS, priority-based, CBS, etc.) have to be formulated.
Model and code generators will be developed for automated and accelerated generation of the network optimizations. safety and real-time analyses. The results of these analyses are fed back into the modeling of the overall system.