Article
Granger causal analysis of electrohysterographic and tocographic recordings for classification of term vs. preterm births
Saleem S, Saeed A, Usman S, Ferzund J, Arshad J, Mirza J & Manzoor T (2020) Granger causal analysis of electrohysterographic and tocographic recordings for classification of term vs. preterm births. Biocybernetics and Biomedical Engineering, 40 (1), pp. 454-467. https://doi.org/10.1016/j.bbe.2020.01.007
Article
A Strategy for Classification of ¡°Vaginal vs. Cesarean Section¡± Delivery: Bivariate Empirical Mode Decomposition of Cardiotocographic Recordings
Saleem S, Naqvi SS, Manzoor T, Saeed A, ur Rehman N & Mirza J (2019) A Strategy for Classification of ¡°Vaginal vs. Cesarean Section¡± Delivery: Bivariate Empirical Mode Decomposition of Cardiotocographic Recordings. Frontiers in Physiology, 10. https://doi.org/10.3389/fphys.2019.00246
Book Chapter
Secure Embedded Systems: Concepts and Issues
Ahmadinia A & Saeed A (2018) Secure Embedded Systems: Concepts and Issues. In: Cyber-Physical Systems for Next-Generation Networks. Advances in Computer and Electrical Engineering. IGI Global, pp. 207-221. https://doi.org/10.4018/978-1-5225-5510-0.ch010
Article
Hardware-Assisted Secure Communication in Embedded and Multi-Core Computing Systems
Saeed A, Ahmadinia A & Just M (2018) Hardware-Assisted Secure Communication in Embedded and Multi-Core Computing Systems. Computers, 7 (2), p. 31. https://doi.org/10.3390/computers7020031
Article
Intelligent Intrusion Detection in Low-Power IoTs
Saeed A, Ahmadinia A, Javed A & Larijani H (2016) Intelligent Intrusion Detection in Low-Power IoTs. ACM Transactions on Internet Technology, 16 (4), pp. 1-25. https://doi.org/10.1145/2990499
Article
Secure On-Chip Communication Architecture for Reconfigurable Multi-Core Systems
Saeed A, Ahmadinia A & Just M (2016) Secure On-Chip Communication Architecture for Reconfigurable Multi-Core Systems. Journal of Circuits, Systems and Computers, 25 (08), p. 1650089. https://doi.org/10.1142/s0218126616500894
Article
Tag-Protector: An Effective and Dynamic Detection of Illegal Memory Accesses through Compile Time Code Instrumentation
Saeed A, Ahmadinia A & Just M (2016) Tag-Protector: An Effective and Dynamic Detection of Illegal Memory Accesses through Compile Time Code Instrumentation. Advances in Software Engineering, 2016, pp. 1-19. https://doi.org/10.1155/2016/9842936
Tag-Protector: An Effective and Dynamic Detection of Out-of-bound Memory Accesses
Saeed A, Ahmadinia A & Just M (2016) Tag-Protector: An Effective and Dynamic Detection of Out-of-bound Memory Accesses. In: CS2 '16: Third Workshop on Cryptography and Security in Computing Systems, Prague Czech Republic, 14.01.2016-15.01.2016. ACM, pp. 31-36. https://doi.org/10.1145/2858930.2858936
An ID and Address Protection Unit for NoC based Communication Architectures
Saeed A, Ahmadinia A, Just M & Bobda C (2014) An ID and Address Protection Unit for NoC based Communication Architectures. In: SIN '14: The 7th International Conference on Security of Information and Networks, Glasgow Scotland UK, 01.09.2016-01.09.2016. ACM, pp. 288-294. https://doi.org/10.1145/2659651.2659719