- Web Application Security Vulnerabilities
- Security and Verification in Computing
- Advanced Malware Detection Techniques
- Spam and Phishing Detection
- Cybercrime and Law Enforcement Studies
- Power System Optimization and Stability
- Digital and Cyber Forensics
- Piezoelectric Actuators and Control
- Shape Memory Alloy Transformations
- Frequency Control in Power Systems
- Iterative Learning Control Systems
- Adaptive Control of Nonlinear Systems
- Internet Traffic Analysis and Secure E-voting
- Crime, Illicit Activities, and Governance
Arizona State University
2022-2024
Shahid Bahonar University of Kerman
2016-2019
This paper considers the problem of observer-based adaptive fuzzy output feedback control for a piezo-positioning mechanism with unknown hysteresis. In this paper, logic systems (FLSs) are used to estimate nonlinear functions, and also Nussbaum function is utilized overcome direction Based on Lyapunov method, scheme constructed by using backstepping technique. order better performance in reducing tracking error, particle swarm optimization (PSO) algorithm tuning controller parameters....
Cross-site scripting (XSS) is the most common vulnerability class in web applications over last decade. Much research attention has focused on building exploit mitigation defenses for this problem, but no technique provides adequate protection face of advanced attacks. One that bypasses XSS mitigations scriptless attack: a content injection uses (among other options) CSS and HTML to infiltrate data. In studying others, we realized property among exploitation all vulnerabilities, including...
In this paper, a new hybrid approach based on hierarchical gradient control and Shuffled Frog Leaping optimization algorithm (SFLA) is presented for optimal of large-scale systems. approach, the system decomposed into smaller subsystems then solved separately at first level. Afterward second level, coordinator coordinate to achieve overall solution. For this, discrete-time linear quadratic regulators (DLQR) with prescribed degree stability are used each subsystem in level which SFL employed...
Cross-site scripting (XSS) is the most common vulnerability class in web applications over last decade. Much research attention has focused on building exploit mitigation defenses for this problem, but no technique provides adequate protection face of advanced attacks. One that bypasses XSS mitigations scriptless attack: a content injection uses (among other options) CSS and HTML to infiltrate data. In studying others, we realized property among exploitation all vulnerabilities, including...