- Current students
School of Computing, Electrical and Applied Technology
Graduate supervision of completed theses/dissertations
Masters theses or dissertations
Masters theses or dissertations supervised by Bahman Sarrafpour as Principal Supervisor
Alomirah, Abdulaziz Abdulrahman (2019). Detecting Sybil attack in mobile wireless sensor networks using observer nodes (Master of Computing)
Alomirah, Reem Abdulrahman (2019). An edge-based steganography algorithm for hiding text into images (Master of Computing)
Kommushetty, Sushmitha (2018). A crypto-economy based distributed & asynchronous hashgraphy algorithm for a tracking system (Master of Computing)
Al-Jarrah, Zaid (2018). Analysis of L4 DoS/DDoS attacks and mitigation techniques for DNS reflection attack (Master of Computing)
Alahmadi, Alaa (2017-07). A cluster based collaborative filtering method for improving the performance of recommender systems in ecommerce (Master of Computing)
Mohammed, Alghamdi Talal (2016). Evaluation of WEP, WPA and WPA2 security protocols on 802.11ac client to server WLAN performance (Master of Computing)
Alkorbi, Mohammed (2015-11). Encryption, storage technology and security of data at rest (Master of Computing)
Masters theses or dissertations supervised by Bahman Sarrafpour as Associate Supervisor
Treseangrat, Kiattikul (2014). Performance analysis of defense mechanisms against UDP flood attacks (Master of Computing)
Sassani, B. A., Alkorbi, M., Jamil, N., Asif Naeem, M., & Mirza, F. (2020). Evaluating Encryption Algorithms for Sensitive Data Using Different Storage Devices. Journal of Scentific Programming (Vol. Volume 2020 Article ID 6132312 9 pages).
Sassani (Sarrafpour), B.A., Choque, R.D.P.S., Paul, B.M., & Mehdipour, F. (2019). Commercial Security Scanning: Point-on-Sale (POS) Vulnerability and Mitigation Techniques. Cyber Science and Technology Congress (CyberSciTech 2019).
Sassani(Sarrafpour), B. A., Alahmadi, A., & Sharifzadeh, H. (2018). A Cluster Based Collaborative Filtering Method for Improving the Performance of Recommender Systems in E-Commerce. K. Arai et al, Proceedings of the Future Technologies Conference (FTC) 2018 (Vol. 881).
Sassani (Sarrafpour), B. A., Abbaro, C., Pitton, I., Young, C., & Mehdipour, F. (2016). Analysis of NTP DRDoS Attacks' Performance Effects and Mitigation Techniques. IEEE Xplore, Privacy, Security, and Trust(PST) 14th Annual Conference, Auckland, New Zealand.
Treseangrat, K., Kolahi, S., & Sarrafpour, B. (2015). Analysis of UDP DDoS Cyber Flood Attack and Defense Mechanisms on Windows Server 2012 & Linux Ubuntu 13. In IEEE, Proceedings of the Computer, Information and Telecommunication Systems (CITS) International Conference.
S. S. Kolahi, B. A. Sarrafpour, and K. Tresengrat (2015). Analysis of UDP Flood Cyber Attack and Defense Mechanisms on Web Server with Linux Ubuntu 13. IEEE International Conference on Communications, Signal Processing and their Applications, Communications, Signal Processing, and their Applications (ICCSPA), 2015 International Conference on (Vol. IEEE).