关注
Mona Taghavi
标题
引用次数
引用次数
年份
An intrusion detection and prevention system in cloud computing: A systematic review
A Patel, M Taghavi, K Bakhtiyari, JC Júnior
Journal of Network and Computer Applications 36 (1), 25-41, 2013
5742013
An analysis of web proxy logs with query distribution pattern approach for search engines
M Taghavi, A Patel, N Schmidt, C Wills, Y Tew
Computer Standards & Interfaces 34 (1), 162-170, 2012
562012
Evaluation of cheating detection methods in academic writings
A Patel, K Bakhtiyari, M Taghavi
Library Hi Tech 29 (4), 623-640, 2011
472011
A blockchain-based model for cloud service quality monitoring
M Taghavi, J Bentahar, H Otrok, K Bakhtiyari
IEEE Transactions on Services Computing 13 (2), 276-288, 2019
422019
A comparative study of agile, component-based, aspect-oriented and mashup software development methods
A Patel, A Seyfi, M Taghavi, C Wills, L Na, R Latih, S Misra
Tehnicki Vjesnik 19 (1), 175-189, 2012
392012
New insights towards developing recommender systems
M Taghavi, J Bentahar, K Bakhtiyari, C Hanachi
The computer journal 61 (3), 319-348, 2018
362018
Agent-based computational investing recommender system
M Taghavi, K Bakhtiyari, E Scavino
Proceedings of the 7th ACM conference on Recommender systems, 455-458, 2013
362013
Taxonomy and proposed architecture of intrusion detection and prevention systems for cloud computing
A Patel, M Taghavi, K Bakhtiyari, JC Júnior
Cyberspace Safety and Security, 441-458, 2012
352012
Hybrid affective computing—keyboard, mouse and touch screen: from review to experiment
K Bakhtiyari, M Taghavi, H Husain
Neural Computing and Applications 26 (6), 1277-1296, 2015
322015
Cloudchain: A Blockchain-Based Coopetition Differential Game Model for Cloud Computing
M Taghavi, J Bentahar, H Otrok, K Bakhtiyari
International Conference on Service-Oriented Computing, 146-161, 2018
252018
Planning for sustainable development in the emerging information societies
M Taghavi, K Bakhtiyari, H Taghavi, V Olyaee Attar, A Hussain
Journal of Science & Technology Policy Management 5 (3), 178-211, 2014
252014
A reinforcement learning model for the reliability of blockchain oracles
M Taghavi, J Bentahar, H Otrok, K Bakhtiyari
Expert Systems with Applications, 119160, 2022
242022
Driver assistance system towards overtaking in vehicular ad hoc networks
ASS Vieira, J Celestino, A Patel, M Taghavi
Advanced International Conference on Telecommunications, AICT 2013 (January …, 2013
232013
BEE-C: a bio-inspired energy efficient cluster-based algorithm for data continuous dissemination in Wireless Sensor Networks
A da Silva Rego, J Celestino, A Dos Santos, EC Cerqueira, A Patel, ...
2012 18th IEEE International Conference on Networks (ICON), 405-410, 2012
202012
Two-stage game theoretical framework for IaaS market share dynamics
M Taghavi, J Bentahar, H Otrok
Future Generation Computer Systems 102, 173-189, 2020
172020
Two methods for active detection and prevention of sophisticated ARP-poisoning man-in-the-middle attacks on switched ethernet LANs
K Kalajdzic, A Patel, M Taghavi
International Journal of Digital Crime and Forensics (IJDCF) 3 (3), 50-60, 2011
162011
Implementation of emotional-aware computer systems using typical input devices
K Bakhtiyari, M Taghavi, H Husain
Asian Conference on Intelligent Information and Database Systems, 364-374, 2014
142014
On the effects of user ratings on the profitability of cloud services
M Taghavi, J Bentahar, H Otrok, OA Wahab, A Mourad
2017 IEEE International Conference on Web Services (ICWS), 1-8, 2017
122017
Safety measures for social computing in wiki learning environment
A Patel, M Taghavi, JC Júnior, R Latih, AM Zin
International Journal of Information Security and Privacy (IJISP) 6 (2), 1-15, 2012
122012
Design and implementation of a zero-knowledge authentication framework for Java Card
A Patel, K Kalajdzic, L Golafshan, M Taghavi
Privacy Solutions and Security Frameworks in Information Protection, 131, 2012
82012
系统目前无法执行此操作,请稍后再试。
文章 1–20