Intelligent automated intrusion response system based on fuzzy decision making and risk assessment S Berenjian, M Shajari, N Farshid, M Hatamian 2016 IEEE 8th International Conference on Intelligent Systems (IS), 709-714, 2016 | 26 | 2016 |
Structural‐based tunneling: preserving mutual anonymity for circular P2P networks A Naghizadeh, S Berenjian, E Meamari, RE Atani International Journal of Communication Systems 29 (3), 602-619, 2016 | 26 | 2016 |
Preserving receiver's anonymity for circular structured P2P networks A Naghizadeh, S Berenjian, B Razeghi, S Shahanggar, NR Pour 2015 12th Annual IEEE Consumer Communications and Networking Conference …, 2015 | 17 | 2015 |
A centralized evolutionary clustering protocol for wireless sensor networks M Hatamian, SS Ahmadpoor, S Berenjian, B Razeghi, H Barati 2015 6th International Conference on Computing, Communication and Networking …, 2015 | 14 | 2015 |
An incentive security model to provide fairness for peer-to-peer networks S Berenjian, S Hajizadeh, RE Atani 2019 IEEE Conference on Application, Information and Network Security (AINS …, 2019 | 11 | 2019 |
GNM: GridCell navigational model A Naghizadeh, S Berenjian, DJ Margolis, DN Metaxas Expert Systems with Applications 148, 113217, 2020 | 9 | 2020 |
Error control coding in optical fiber communication systems: an overview M Hatamian, H Barati, S Berenjian, A Naghizadeh, B Razeghi, I Dezful, ... Advances in Computer Science: An International Journal 4 (14), 70-80, 2015 | 5 | 2015 |
Encryption-Based Secure Protocol Design for Networks S Berenjian Stevens Institute of Technology, 2023 | | 2023 |