An intrusion detection and prevention system in cloud computing: A systematic review A Patel, M Taghavi, K Bakhtiyari, JC Júnior Journal of Network and Computer Applications 36 (1), 25-41, 2013 | 574 | 2013 |
An analysis of web proxy logs with query distribution pattern approach for search engines M Taghavi, A Patel, N Schmidt, C Wills, Y Tew Computer Standards & Interfaces 34 (1), 162-170, 2012 | 56 | 2012 |
Evaluation of cheating detection methods in academic writings A Patel, K Bakhtiyari, M Taghavi Library Hi Tech 29 (4), 623-640, 2011 | 47 | 2011 |
A blockchain-based model for cloud service quality monitoring M Taghavi, J Bentahar, H Otrok, K Bakhtiyari IEEE Transactions on Services Computing 13 (2), 276-288, 2019 | 42 | 2019 |
A comparative study of agile, component-based, aspect-oriented and mashup software development methods A Patel, A Seyfi, M Taghavi, C Wills, L Na, R Latih, S Misra Tehnicki Vjesnik 19 (1), 175-189, 2012 | 39 | 2012 |
New insights towards developing recommender systems M Taghavi, J Bentahar, K Bakhtiyari, C Hanachi The computer journal 61 (3), 319-348, 2018 | 36 | 2018 |
Agent-based computational investing recommender system M Taghavi, K Bakhtiyari, E Scavino Proceedings of the 7th ACM conference on Recommender systems, 455-458, 2013 | 36 | 2013 |
Taxonomy and proposed architecture of intrusion detection and prevention systems for cloud computing A Patel, M Taghavi, K Bakhtiyari, JC Júnior Cyberspace Safety and Security, 441-458, 2012 | 35 | 2012 |
Hybrid affective computing—keyboard, mouse and touch screen: from review to experiment K Bakhtiyari, M Taghavi, H Husain Neural Computing and Applications 26 (6), 1277-1296, 2015 | 32 | 2015 |
Cloudchain: A Blockchain-Based Coopetition Differential Game Model for Cloud Computing M Taghavi, J Bentahar, H Otrok, K Bakhtiyari International Conference on Service-Oriented Computing, 146-161, 2018 | 25 | 2018 |
Planning for sustainable development in the emerging information societies M Taghavi, K Bakhtiyari, H Taghavi, V Olyaee Attar, A Hussain Journal of Science & Technology Policy Management 5 (3), 178-211, 2014 | 25 | 2014 |
A reinforcement learning model for the reliability of blockchain oracles M Taghavi, J Bentahar, H Otrok, K Bakhtiyari Expert Systems with Applications, 119160, 2022 | 24 | 2022 |
Driver assistance system towards overtaking in vehicular ad hoc networks ASS Vieira, J Celestino, A Patel, M Taghavi Advanced International Conference on Telecommunications, AICT 2013 (January …, 2013 | 23 | 2013 |
BEE-C: a bio-inspired energy efficient cluster-based algorithm for data continuous dissemination in Wireless Sensor Networks A da Silva Rego, J Celestino, A Dos Santos, EC Cerqueira, A Patel, ... 2012 18th IEEE International Conference on Networks (ICON), 405-410, 2012 | 20 | 2012 |
Two-stage game theoretical framework for IaaS market share dynamics M Taghavi, J Bentahar, H Otrok Future Generation Computer Systems 102, 173-189, 2020 | 17 | 2020 |
Two methods for active detection and prevention of sophisticated ARP-poisoning man-in-the-middle attacks on switched ethernet LANs K Kalajdzic, A Patel, M Taghavi International Journal of Digital Crime and Forensics (IJDCF) 3 (3), 50-60, 2011 | 16 | 2011 |
Implementation of emotional-aware computer systems using typical input devices K Bakhtiyari, M Taghavi, H Husain Asian Conference on Intelligent Information and Database Systems, 364-374, 2014 | 14 | 2014 |
On the effects of user ratings on the profitability of cloud services M Taghavi, J Bentahar, H Otrok, OA Wahab, A Mourad 2017 IEEE International Conference on Web Services (ICWS), 1-8, 2017 | 12 | 2017 |
Safety measures for social computing in wiki learning environment A Patel, M Taghavi, JC Júnior, R Latih, AM Zin International Journal of Information Security and Privacy (IJISP) 6 (2), 1-15, 2012 | 12 | 2012 |
Design and implementation of a zero-knowledge authentication framework for Java Card A Patel, K Kalajdzic, L Golafshan, M Taghavi Privacy Solutions and Security Frameworks in Information Protection, 131, 2012 | 8 | 2012 |