关注
Afshin Rezakhani
Afshin Rezakhani
Ayatollah Boroujerdi University
在 abru.ac.ir 的电子邮件经过验证
标题
引用次数
引用次数
年份
Standardization of all information security management systems
A Rezakhani, AM Hajebi, N Mohammadi
International Journal of Computer Applications 18 (8), 4-8, 2011
172011
A new approach to ranking attributes in attribute based access control using decision fusion
AJ Rashidi, A Rezakhani
Neural Computing and Applications 28 (Suppl 1), 803-812, 2017
142017
A novel multilayer AAA model for integrated applications
A Rezakhani, H Shirazi, N Modiri
Neural Computing and Applications 29, 887-901, 2018
122018
Secured access control in security information and event management systems
L Rikhtechi, V Rafe, A Rezakhani
Journal of Information Systems and Telecommunication 9 (33), 67-78, 2021
112021
A novel access control model based on the structure of applications
A Rezakhani, H Shirazi, N Modiri
International Journal of Communication Networks and Information Security …, 2016
82016
Creating a standard platform for all intrusion detection/prevention systems
L Rikhtechi, AR Roozbahani
2010 Second International Conference on Computer Modeling and Simulation 3 …, 2010
72010
ADCAS: Adversarial deep clustering of Android streams
M Katebi, A Rezakhani, S Joudaki
Computers and Electrical Engineering 95, 107443, 2021
62021
A new resource allocation method in fog computing via non-cooperative game theory.
HM Talvar, HHS Javadi, H Navidi, A Rezakhani
J. Intell. Fuzzy Syst. 41 (2), 3921-3932, 2021
62021
Providing a hybrid cryptography algorithm for lightweight authentication protocol in RFID with urban traffic usage case
V Chegeni, MRM Goudarzi, A Rezakhani
arXiv preprint arXiv:2104.07714, 2021
52021
A new resource allocation method in fog computing via non-cooperative game theory
H Mohammady Talvar, H Haj Seyyed Javadi, H Navidi, A Rezakhani
Journal of Intelligent & Fuzzy Systems 41 (2), 3921-3932, 2021
42021
Compressive sensing based simultaneous data compression and convergent encryption for secure deduplication
MT Kumar, MB Reddy
International Journal of Computer Science and Information Security (IJCSIS …, 2017
42017
Premeditated initial points for K-Means Clustering
PL Chithra
IJCSIS 15 (9), 2017
42017
A scalable key pre-distribution scheme based on the unital design for the internet of things security
V Chegeni, H Haj Seyyed Javadi, MR Moazami Goudarzi, A Rezakhani
IETE Journal of Research 69 (6), 3406-3417, 2023
32023
An empirical comparative forecast accuracy of exponential smoothing and nonlinear autoregressive models on six major rates
A Sihabuddin, D Rosadi, S Utami
International Journal of Computer Science and Information Security (IJCSIS …, 2017
32017
Service Oriented Approach to Improve the Power of Snorts
AR Roozbahani, R Nassiri, GR Latif-Shabgahi
2009 Second International Conference on Computer and Electrical Engineering …, 2009
32009
Attacks classification to improve the power of snorts
AR Roozbahani, R Nassiri, GR Latif-Shabgahi
2009 International Forum on Computer Science-Technology and Applications 1, 3-6, 2009
32009
N. mohammadi," Converting Network Attacks to Standard Semantic Web Form in Cloud Computing Infrastructure
AR Roozbahani, L Rikhtechi
International Journal of Computer Applications, 0975-8887, 0
3
BBAC: Behavior-based access control to detect user suspicious behavior
L Rikhtechi, V Rafeh, A Rezakhani
Journal of Intelligent & Fuzzy Systems 43 (6), 8207-8220, 2022
22022
FLHB-AC: Federated Learning History-Based Access Control Using Deep Neural Networks in Healthcare System
N Mohammadi, A Rezakhani, H Haj Seyyed Javadi
Journal of Information Systems and Telecommunication (JIST) 2 (46), 90, 2024
12024
RAPSAMS: Robust affinity propagation clustering on static android malware stream
M Katebi, A RezaKhani, S Joudaki, ME Shiri
Concurrency and Computation: Practice and Experience 34 (15), e6980, 2022
12022
系统目前无法执行此操作,请稍后再试。
文章 1–20