- Current students
- Under 25s
School of Computing, Electrical and Applied Technology
Graduate supervision of completed theses/dissertations
Masters theses or dissertations
Masters theses or dissertations supervised by Bahman Sarrafpour as Principal Supervisor
Rouhani, Reza (2020). Analysis and evaluation of quantum key distribution protocols (Master of Computing)
Miguez, Manuel (2020). A hybrid intelligent intrusion detection system for advanced persistent threats (Master of Computing)
Alomirah, Reem Abdulrahman (2019). An edge-based steganography algorithm for hiding text into images (Master of Computing)
Alomirah, Abdulaziz Abdulrahman (2019). Detecting Sybil attack in mobile wireless sensor networks using observer nodes (Master of Computing)
Al-Jarrah, Zaid (2018). Analysis of L4 DoS/DDoS attacks and mitigation techniques for DNS reflection attack (Master of Computing)
Kommushetty, Sushmitha (2018). A crypto-economy based distributed & asynchronous hashgraphy algorithm for a tracking system (Master of Computing)
Alahmadi, Alaa (2017-07). A cluster based collaborative filtering method for improving the performance of recommender systems in ecommerce (Master of Computing)
Mohammed, Alghamdi Talal (2016). Evaluation of WEP, WPA and WPA2 security protocols on 802.11ac client to server WLAN performance (Master of Computing)
Alkorbi, Mohammed (2015-11). Encryption, storage technology and security of data at rest (Master of Computing)
Masters theses or dissertations supervised by Bahman Sarrafpour as Associate Supervisor
Treseangrat, Kiattikul (2014). Performance analysis of defense mechanisms against UDP flood attacks (Master of Computing)
Sassani, B. A., Jamil, N., Villapol, M., Malik, M. A., & Tirumala, S. S. (2020). FireNot - An IoT based Fire Alerting System: Design and Implementation. Journal of Ambient Intelligence and Smart Environments 12 (2020) 475-489 (Vol. Volume 12, Issue 6).
Sassani, B. A., Alkorbi, M., Jamil, N., Asif Naeem, M., & Mirza, F. (2020). Evaluating Encryption Algorithms for Sensitive Data Using Different Storage Devices. Journal of Scentific Programming (Vol. Volume 2020 Article ID 6132312 9 pages).
Sassani (Sarrafpour), B.A., Choque, R.D.P.S., Paul, B.M., & Mehdipour, F. (2019). Commercial Security Scanning: Point-on-Sale (POS) Vulnerability and Mitigation Techniques. Cyber Science and Technology Congress (CyberSciTech 2019).
Sassani(Sarrafpour), B. A., Alahmadi, A., & Sharifzadeh, H. (2018). A Cluster Based Collaborative Filtering Method for Improving the Performance of Recommender Systems in E-Commerce. K. Arai et al, Proceedings of the Future Technologies Conference (FTC) 2018 (Vol. 881).
Sassani (Sarrafpour), B. A., Abbaro, C., Pitton, I., Young, C., & Mehdipour, F. (2016). Analysis of NTP DRDoS Attacks' Performance Effects and Mitigation Techniques. IEEE Xplore, Privacy, Security, and Trust(PST) 14th Annual Conference, Auckland, New Zealand.
S. S. Kolahi, B. A. Sarrafpour, and K. Tresengrat (2015). Analysis of UDP Flood Cyber Attack and Defense Mechanisms on Web Server with Linux Ubuntu 13. IEEE International Conference on Communications, Signal Processing and their Applications, Communications, Signal Processing, and their Applications (ICCSPA), 2015 International Conference on (Vol. IEEE).
Treseangrat, K., Kolahi, S., & Sarrafpour, B. (2015). Analysis of UDP DDoS Cyber Flood Attack and Defense Mechanisms on Windows Server 2012 & Linux Ubuntu 13. In IEEE, Proceedings of the Computer, Information and Telecommunication Systems (CITS) International Conference.