Mehrdad Nojoumian
YOU?
Author Swipe
View article: A Multimodal Artificial Intelligence Framework for Intelligent Geospatial Data Validation and Correction
A Multimodal Artificial Intelligence Framework for Intelligent Geospatial Data Validation and Correction Open
Accurate geospatial data are essential for intelligent transportation systems and automated reporting applications, as location precision directly impacts safety analysis and decision-making. GPS devices are now routinely employed by law e…
View article: Enhancing Secure Software Development with AZTRM-D: An AI-Integrated Approach Combining DevSecOps, Risk Management, and Zero Trust
Enhancing Secure Software Development with AZTRM-D: An AI-Integrated Approach Combining DevSecOps, Risk Management, and Zero Trust Open
This paper introduces the Automated Zero Trust Risk Management with DevSecOps Integration (AZTRM-D) framework, a novel approach that embeds security throughout the entire Secure Software and System Development Life Cycle (S-SDLC). AZTRM-D …
View article: Road Crash Analysis and Modeling: A Systematic Review of Methods, Data, and Emerging Technologies
Road Crash Analysis and Modeling: A Systematic Review of Methods, Data, and Emerging Technologies Open
Traffic crashes are a leading cause of death and injury worldwide, with far-reaching societal and economic consequences. To effectively address this global health crisis, researchers and practitioners rely on the analysis of crash data to …
View article: Enhancing Secure Software Development with AZTRM-D: An AI-Integrated Approach Combining DevSecOps, Risk Management, and Zero Trust
Enhancing Secure Software Development with AZTRM-D: An AI-Integrated Approach Combining DevSecOps, Risk Management, and Zero Trust Open
This paper introduces the Automated Zero Trust Risk Management with DevSecOps Integration (AZTRM-D) framework, a novel and comprehensive approach designed to intrinsically embed security throughout the entire Secure Software and System Dev…
View article: Comprehensive Study of IoT Vulnerabilities and Countermeasures
Comprehensive Study of IoT Vulnerabilities and Countermeasures Open
This comprehensive study provides an in-depth examination of the Internet of Things (IoT), which refers to the interconnection of multiple devices through various wireless protocols that facilitate data transfer and improve operational int…
View article: Comprehensive Study of IoT Vulnerabilities and Countermeasures
Comprehensive Study of IoT Vulnerabilities and Countermeasures Open
This comprehensive study provides an in-depth examination of the ‘Internet of’ technologies, focusing specifically on the Internet of Things (IoT), which is defined as the networked interconnection of multiple devices through various wirel…
View article: Comprehensive study of driver behavior monitoring systems using computer vision and machine learning techniques
Comprehensive study of driver behavior monitoring systems using computer vision and machine learning techniques Open
The flourishing realm of advanced driver-assistance systems (ADAS) as well as autonomous vehicles (AVs) presents exceptional opportunities to enhance safe driving. An essential aspect of this transformation involves monitoring driver behav…
View article: Cross-Cultural Expectations from Self-Driving Cars
Cross-Cultural Expectations from Self-Driving Cars Open
International adoption of autonomous vehicles has been in the center of attention in academia and industry. This paper therefore proposes to shed light on cross-cultural expectations of autonomous vehicles. We utilized a survey with 57 que…
View article: Localized State-Change Consensus in Immense and Highly Dynamic Environments
Localized State-Change Consensus in Immense and Highly Dynamic Environments Open
Consensus algorithms are the building block of any decentralized network where the risk of malicious users is high. These algorithms are required to be robust, scalable, and secure in order to operate properly. Localized state-change conse…
View article: Simulated robotic device malfunctions resembling malicious cyberattacks impact human perception of trust, satisfaction, and frustration
Simulated robotic device malfunctions resembling malicious cyberattacks impact human perception of trust, satisfaction, and frustration Open
Robot assistants and wearable devices are highly useful; however, these artificial systems are susceptible to hackers. In this article, two sets of experiments were conducted. The first part of this study simulated a malicious attack on a …
View article: Secure Error Correction using Multi-Party Computation
Secure Error Correction using Multi-Party Computation Open
During recent years with the increase of data and data analysis needs, privacy preserving data analysis methods have become of great importance. Researchers have proposed different methods for this purpose. Secure multi-party computation i…
View article: Robotic Finger Force Sensor Fabrication and Evaluation Through a Glove.
Robotic Finger Force Sensor Fabrication and Evaluation Through a Glove. Open
This force-feedback approach compares the effect on the sensing ability through a worn glove of the force application of an i-Limb Ultra robotic hand for several experimental scenarios. A Takktile sensor was integrated into a fabricated fi…
View article: <i>Sphinx</i>: a Colluder-Resistant Trust Mechanism for Collaborative Intrusion Detection
<i>Sphinx</i>: a Colluder-Resistant Trust Mechanism for Collaborative Intrusion Detection Open
The destructive effects of cyber-attacks demand more proactive security approaches. One such promising approach is the idea of Collaborative Intrusion Detection Systems (CIDSs). These systems combine the knowledge of multiple sensors (e.g.…
View article: Rational Trust Modeling
Rational Trust Modeling Open
Trust models are widely used in various computer science disciplines. The main purpose of a trust model is to continuously measure trustworthiness of a set of entities based on their behaviors. In this article, the novel notion of "rationa…