Multilayered database intrusion detection system for detecting malicious behaviors in big data transaction M Doroudian, N Arastouie, M Talebi, AR Ghanbarian 2015 Second International Conference on Information Security and Cyber …, 2015 | 20 | 2015 |
Backdoor detection system using artificial neural network and genetic algorithm E Salimi, N Arastouie 2011 International Conference on Computational and Information Sciences, 817-820, 2011 | 18 | 2011 |
Hunter: an anti spyware for windows operating system N Arastouie, MR Razzazi 2008 3rd International Conference on Information and Communication …, 2008 | 10 | 2008 |
A novel trade–off between communication and computation costs for data aggregation in wireless sensor networks N Arastouie, M Sabaei, V Hakami, S Soltanali International Journal of Ad Hoc and Ubiquitous Computing 12 (4), 245-253, 2013 | 7 | 2013 |
RTEA: Real-Time and Energy Aware Routing for Industrial Wireless Sensor Networks NA Omid Tavallaie, Hamid Reza Naji, Masoud Sabaei Wireless Personal Communications, 2017 | 6 | 2017 |
Providing QoS guarantee of timeliness in wireless sensor networks with a new routing methodology O Tavallaie, HR Naji, M Sabaei, N Arastouie 6th International Symposium on Telecommunications (IST), 674-679, 2012 | 4 | 2012 |
Writer identification with n‐tuple direction feature from contour A Ghanbarian, G Ghiasi, R Safabakhsh, N Arastouie IET Image Processing 14 (6), 1101-1109, 2020 | 3 | 2020 |
A novel approach for trade-off between computation and communication cost in wireless sensor networks N Arastouie, M Sabaei, HS Shahreza 2010 The 12th International Conference on Advanced Communication Technology …, 2010 | 3 | 2010 |
Self-adaptive risk-aware routing in opportunistic network N Arastouie, M Sabaei The Journal of Supercomputing 74, 2385-2411, 2018 | 2 | 2018 |
Data forwarding scheme to minimize end-to-end delay in opportunistic networks N Arastouie, M Sabaei 2016 8th International Symposium on Telecommunications (IST), 1-5, 2016 | 2 | 2016 |
Optimal stochastic model for maximizing delivered messages in opportunistic networks N Arastouie, M Sabaei 7'th International Symposium on Telecommunications (IST'2014), 1245-1249, 2014 | 2 | 2014 |
Adaptive Approach for Reducing Energy Consumption, Considering Nodes' Mission in Wireless Sensor Networks N Arastouie, M Sabaei, HS Shahreza 2010 Second International Conference on Communication Software and Networks …, 2010 | 2 | 2010 |
Near‐optimal online routing in opportunistic networks N Arastouie, M Sabaei, B Bakhshi International Journal of Communication Systems 32 (3), e3863, 2019 | 1 | 2019 |
6G Technologies: Key Features, Challenges, Security and Privacy Issues N Arastouei International Workshop on Digital Sovereignty in Cyber Security: New …, 2022 | | 2022 |
Detecting Botnets in View of an Efficient Method. N Arastouie, N Arastooie, E Salimi, S Soltanali International Journal of Advanced Research in Computer Science 4 (9), 2013 | | 2013 |
Detecting Botnets in View of an Efficient Method A Narges, A Naeemeh, S Elham, S Saeed International Journal of Advance Research and Computer Science, 8, 2013 | | 2013 |
Session 6D: Green IT technology G Koutitas, J Jung, J Lee, D Kim, N Arastouie, M Sabaei, HS Shahreza, ... | | |