A fuzzy VIKOR method for supplier selection based on entropy measure for objective weighting A Shemshadi, H Shirazi, M Toreihi, MJ Tarokh Expert systems with applications 38 (10), 12160-12167, 2011 | 886 | 2011 |
Behavioral fingerprinting of iot devices B Bezawada, M Bachani, J Peterson, H Shirazi, I Ray, I Ray Proceedings of the 2018 workshop on attacks and solutions in hardware …, 2018 | 274 | 2018 |
"Kn0w Thy Doma1n Name" Unbiased Phishing Detection Using Domain Name Based Features H Shirazi, B Bezawada, I Ray Proceedings of the 23nd ACM on symposium on access control models and …, 2018 | 109 | 2018 |
Practical DoS attacks on embedded networks in commercial vehicles S Mukherjee, H Shirazi, I Ray, J Daily, R Gamble Information Systems Security: 12th International Conference, ICISS 2016 …, 2016 | 72 | 2016 |
A stochastic bi-objective simulation–optimization model for plasma supply chain in case of COVID-19 outbreak H Shirazi, R Kia, P Ghasemi Applied Soft Computing 112, 107725, 2021 | 61 | 2021 |
Combining knowledge acquisition and machine learning to control dynamic systems GM Shiraz, C Sammut International joint conference on artificial intelligence 15, 908-913, 1997 | 47 | 1997 |
Lightweight URL-based phishing detection using natural language processing transformers for mobile devices K Haynes, H Shirazi, I Ray Procedia Computer Science 191, 127-134, 2021 | 43 | 2021 |
Supplier selection based on supplier risk: An ANP and fuzzy TOPSIS approach A Shemshadi, M Toreihi, H Shirazi JOURNAL OF MATHEMATICS AND COMPUTER SCIENCES 2 (1), 11-121, 2011 | 39 | 2011 |
Adversarial sampling attacks against phishing detection H Shirazi, B Bezawada, I Ray, C Anderson Data and Applications Security and Privacy XXXIII: 33rd Annual IFIP WG 11.3 …, 2019 | 38 | 2019 |
A multi-objective model for designing a group layout of a dynamic cellular manufacturing system R Kia, H Shirazi, N Javadian, R Tavakkoli-Moghaddam Journal of Industrial Engineering International 9, 1-14, 2013 | 36 | 2013 |
Anomaly intrusion detection system using information theory, K-NN and KMC algorithms HM Shirazi Australian Journal of Basic and Applied Sciences 3 (3), 2581-2597, 2009 | 36 | 2009 |
Software security; a vulnerability activity revisit MA Hadavi, H Shirazi, HM Sangchi, VS Hamishagi 2008 Third International Conference on Availability, Reliability and …, 2008 | 36 | 2008 |
Behavioural cloning in control of a dynamic system N Esmaili, C Sammut, GM Shirazi 1995 IEEE International Conference on Systems, Man and Cybernetics …, 1995 | 36 | 1995 |
A new approach to malware detection by comparative analysis of data structures in a memory image M Aghaeikheirabady, SMR Farshchi, H Shirazi 2014 International Congress on Technology, Communication and Knowledge …, 2014 | 34 | 2014 |
Fresh-phish: A framework for auto-detection of phishing websites H Shirazi, K Haefner, I Ray 2017 IEEE international conference on information reuse and integration (IRI …, 2017 | 33 | 2017 |
Increasing overall network security by integrating signature-based NIDS with packet filtering firewall H Salehi, H Shirazi, RA Moghadam 2009 International Joint Conference on Artificial Intelligence, 357-362, 2009 | 31 | 2009 |
Presenting a framework for agile enterprise architecture BD Rouhani, H Shirazi, AF Nezhad, S Kharazmi 2008 1st International Conference on Information Technology, 1-4, 2008 | 31 | 2008 |
Acquiring control knowledge from examples using ripple-down rules and machine learning H Shirazi, CA Sammut IRANIAN JOURNAL OF SCIENCE AND TECHNOLOGY TRANSACTION B-ENGINEERING 32 (3 …, 2008 | 30 | 2008 |
Attribute based access control for healthcare resources S Mukherjee, I Ray, I Ray, H Shirazi, T Ong, MG Kahn Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control, 29-40, 2017 | 29 | 2017 |
Improved phishing detection algorithms using adversarial autoencoder synthesized data H Shirazi, SR Muramudalige, I Ray, AP Jayasumana 2020 ieee 45th conference on local computer networks (lcn), 24-32, 2020 | 28 | 2020 |