| A survey of published attacks on Intel SGX A Nilsson, PN Bideh, J Brorsson arXiv preprint arXiv:2006.13598, 2020 | 220 | 2020 |
| Energy consumption for securing lightweight IoT protocols PN Bideh, J Sönnerup, M Hell Proceedings of the 10th International Conference on the Internet of Things, 1-8, 2020 | 28 | 2020 |
| Security analysis of two key based watermarking schemes based on QR decomposition S Arasteh, M Mahdavi, PN Bideh, S Hosseini, AA Chapnevis Electrical Engineering (ICEE), Iranian Conference on, 1499-1504, 2018 | 15 | 2018 |
| Targeted watermark removal of a SVD-based image watermarking scheme P Nikbakht, M Mahdavi 2015 7th Conference on Information and Knowledge Technology (IKT), 1-6, 2015 | 13 | 2015 |
| HAVOSS: A maturity model for handling vulnerabilities in third party oss components P Nikbakht Bideh, M Höst, M Hell International Conference on Product-Focused Software Process Improvement, 81-97, 2018 | 11 | 2018 |
| Software-defined networking for emergency traffic management in smart cities P Nikbakht Bideh, N Paladi, M Hell Vehicular Ad-hoc Networks for Smart Cities: Third International Workshop …, 2020 | 9 | 2020 |
| Security analysis of a key based color image watermarking vs. a non-key based technique in telemedicine applications PN Bideh, M Mahdavi, SE Borujeni, S Arasteh Multimedia Tools and Applications 77 (24), 31713-31735, 2018 | 9 | 2018 |
| Lmgroup: A lightweight multicast group key management for iot networks P Nikbakht Bideh International Conference on Information Security Practice and Experience …, 2022 | 6 | 2022 |
| A survey of published attacks on intel SGX. CoRR abs/2006.13598 (2020) A Nilsson, PN Bideh, J Brorsson | 6 | 2006 |
| Targeted dewatermarking of two non-blind SVD-based image watermarking schemes P Nikbakht, M Mahdavi 2015 5th International Conference on Computer and Knowledge Engineering …, 2015 | 5 | 2015 |
| A survey of published attacks on Intel SGX. arXiv 2020 A Nilsson, PN Bideh, J Brorsson arXiv preprint arXiv:2006.13598, 2006 | 5 | 2006 |
| Rosym: Robust symmetric key based iot software upgrade over-the-air P Nikbakht Bideh, C Gehrmann Proceedings of the 4th Workshop on CPS & IoT Security and Privacy, 35-46, 2022 | 4 | 2022 |
| On-demand key distribution for cloud networks N Paladi, M Tiloca, PN Bideh, M Hell 2021 24th Conference on Innovation in Clouds, Internet and Networks and …, 2021 | 4 | 2021 |
| A recommender system for user-specific vulnerability scoring L Karlsson, PN Bideh, M Hell International Conference on Risks and Security of Internet and Systems, 355-364, 2019 | 3 | 2019 |
| Chuchotage: In-line Software Network Protocol Translation for (D) TLS P Nikbakht Bideh, N Paladi International Conference on Information and Communications Security, 589-607, 2022 | 2 | 2022 |
| On the suitability of using SGX for secure key storage in the cloud J Brorsson, PN Bideh, A Nilsson, M Hell International Conference on Trust and Privacy in Digital Business, 32-47, 2020 | 2 | 2020 |
| Contributions to Securing Software Updates in IoT P Nikbakht Bideh Lund University, 2022 | 1 | 2022 |
| A Recommender System for User-specific Vulnerability Scoring (full version) L Karlsson, P Nikbakht Bideh, M Hell | 1 | 2019 |
| Protocol translation for encrypted data traffic N PALADI, PN Bideh US Patent 12,483,539, 2025 | | 2025 |
| Method for prioritizing among vulnerabilities in a software code and a server L Karlsson, PN Bideh, M Hell US Patent App. 18/980,871, 2025 | | 2025 |