Mehrnoosh Zaeifi

ORCID: 0009-0007-0236-1079
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Web Application Security Vulnerabilities
  • Security and Verification in Computing
  • Advanced Malware Detection Techniques
  • Spam and Phishing Detection
  • Cybercrime and Law Enforcement Studies
  • Power System Optimization and Stability
  • Digital and Cyber Forensics
  • Piezoelectric Actuators and Control
  • Shape Memory Alloy Transformations
  • Frequency Control in Power Systems
  • Iterative Learning Control Systems
  • Adaptive Control of Nonlinear Systems
  • Internet Traffic Analysis and Secure E-voting
  • Crime, Illicit Activities, and Governance

Arizona State University
2022-2024

Shahid Bahonar University of Kerman
2016-2019

This paper considers the problem of observer-based adaptive fuzzy output feedback control for a piezo-positioning mechanism with unknown hysteresis. In this paper, logic systems (FLSs) are used to estimate nonlinear functions, and also Nussbaum function is utilized overcome direction Based on Lyapunov method, scheme constructed by using backstepping technique. order better performance in reducing tracking error, particle swarm optimization (PSO) algorithm tuning controller parameters....

10.1177/0142331218817094 article EN Transactions of the Institute of Measurement and Control 2019-01-23

Cross-site scripting (XSS) is the most common vulnerability class in web applications over last decade. Much research attention has focused on building exploit mitigation defenses for this problem, but no technique provides adequate protection face of advanced attacks. One that bypasses XSS mitigations scriptless attack: a content injection uses (among other options) CSS and HTML to infiltrate data. In studying others, we realized property among exploitation all vulnerabilities, including...

10.1145/3545948.3545992 article EN 2022-10-17

In this paper, a new hybrid approach based on hierarchical gradient control and Shuffled Frog Leaping optimization algorithm (SFLA) is presented for optimal of large-scale systems. approach, the system decomposed into smaller subsystems then solved separately at first level. Afterward second level, coordinator coordinate to achieve overall solution. For this, discrete-time linear quadratic regulators (DLQR) with prescribed degree stability are used each subsystem in level which SFL employed...

10.1109/csiec.2016.7482115 article EN 2016-03-01

Cross-site scripting (XSS) is the most common vulnerability class in web applications over last decade. Much research attention has focused on building exploit mitigation defenses for this problem, but no technique provides adequate protection face of advanced attacks. One that bypasses XSS mitigations scriptless attack: a content injection uses (among other options) CSS and HTML to infiltrate data. In studying others, we realized property among exploitation all vulnerabilities, including...

10.48550/arxiv.2204.08592 preprint EN cc-by arXiv (Cornell University) 2022-01-01
Coming Soon ...