Standardization of all information security management systems A Rezakhani, AM Hajebi, N Mohammadi International Journal of Computer Applications 18 (8), 4-8, 2011 | 17 | 2011 |
A new approach to ranking attributes in attribute based access control using decision fusion AJ Rashidi, A Rezakhani Neural Computing and Applications 28 (Suppl 1), 803-812, 2017 | 14 | 2017 |
A novel multilayer AAA model for integrated applications A Rezakhani, H Shirazi, N Modiri Neural Computing and Applications 29, 887-901, 2018 | 12 | 2018 |
Secured access control in security information and event management systems L Rikhtechi, V Rafe, A Rezakhani Journal of Information Systems and Telecommunication 9 (33), 67-78, 2021 | 11 | 2021 |
A novel access control model based on the structure of applications A Rezakhani, H Shirazi, N Modiri International Journal of Communication Networks and Information Security …, 2016 | 8 | 2016 |
Creating a standard platform for all intrusion detection/prevention systems L Rikhtechi, AR Roozbahani 2010 Second International Conference on Computer Modeling and Simulation 3 …, 2010 | 7 | 2010 |
ADCAS: Adversarial deep clustering of Android streams M Katebi, A Rezakhani, S Joudaki Computers and Electrical Engineering 95, 107443, 2021 | 6 | 2021 |
A new resource allocation method in fog computing via non-cooperative game theory. HM Talvar, HHS Javadi, H Navidi, A Rezakhani J. Intell. Fuzzy Syst. 41 (2), 3921-3932, 2021 | 6 | 2021 |
Providing a hybrid cryptography algorithm for lightweight authentication protocol in RFID with urban traffic usage case V Chegeni, MRM Goudarzi, A Rezakhani arXiv preprint arXiv:2104.07714, 2021 | 5 | 2021 |
A new resource allocation method in fog computing via non-cooperative game theory H Mohammady Talvar, H Haj Seyyed Javadi, H Navidi, A Rezakhani Journal of Intelligent & Fuzzy Systems 41 (2), 3921-3932, 2021 | 4 | 2021 |
Compressive sensing based simultaneous data compression and convergent encryption for secure deduplication MT Kumar, MB Reddy International Journal of Computer Science and Information Security (IJCSIS …, 2017 | 4 | 2017 |
Premeditated initial points for K-Means Clustering PL Chithra IJCSIS 15 (9), 2017 | 4 | 2017 |
A scalable key pre-distribution scheme based on the unital design for the internet of things security V Chegeni, H Haj Seyyed Javadi, MR Moazami Goudarzi, A Rezakhani IETE Journal of Research 69 (6), 3406-3417, 2023 | 3 | 2023 |
An empirical comparative forecast accuracy of exponential smoothing and nonlinear autoregressive models on six major rates A Sihabuddin, D Rosadi, S Utami International Journal of Computer Science and Information Security (IJCSIS …, 2017 | 3 | 2017 |
Service Oriented Approach to Improve the Power of Snorts AR Roozbahani, R Nassiri, GR Latif-Shabgahi 2009 Second International Conference on Computer and Electrical Engineering …, 2009 | 3 | 2009 |
Attacks classification to improve the power of snorts AR Roozbahani, R Nassiri, GR Latif-Shabgahi 2009 International Forum on Computer Science-Technology and Applications 1, 3-6, 2009 | 3 | 2009 |
N. mohammadi," Converting Network Attacks to Standard Semantic Web Form in Cloud Computing Infrastructure AR Roozbahani, L Rikhtechi International Journal of Computer Applications, 0975-8887, 0 | 3 | |
BBAC: Behavior-based access control to detect user suspicious behavior L Rikhtechi, V Rafeh, A Rezakhani Journal of Intelligent & Fuzzy Systems 43 (6), 8207-8220, 2022 | 2 | 2022 |
FLHB-AC: Federated Learning History-Based Access Control Using Deep Neural Networks in Healthcare System N Mohammadi, A Rezakhani, H Haj Seyyed Javadi Journal of Information Systems and Telecommunication (JIST) 2 (46), 90, 2024 | 1 | 2024 |
RAPSAMS: Robust affinity propagation clustering on static android malware stream M Katebi, A RezaKhani, S Joudaki, ME Shiri Concurrency and Computation: Practice and Experience 34 (15), e6980, 2022 | 1 | 2022 |