Follow
Afshin Rezakhani
Title
Cited by
Cited by
Year
Standardization of all information security management systems
A Rezakhani, AM Hajebi, N Mohammadi
International Journal of Computer Applications 18 (8), 4-8, 2011
172011
A new approach to ranking attributes in attribute based access control using decision fusion
AJ Rashidi, A Rezakhani
Neural Computing and Applications 28 (Suppl 1), 803-812, 2017
132017
A novel multilayer AAA model for integrated applications
A Rezakhani, H Shirazi, N Modiri
Neural Computing and Applications 29, 887-901, 2018
112018
Secured access control in security information and event management systems
L Rikhtechi, V Rafe, A Rezakhani
Journal of Information Systems and Telecommunication 9 (33), 67-78, 2021
102021
A novel access control model based on the structure of applications
A Rezakhani, H Shirazi, N Modiri
International Journal of Communication Networks and Information Security …, 2016
82016
Creating a standard platform for all intrusion detection/prevention systems
L Rikhtechi, AR Roozbahani
2010 Second International Conference on Computer Modeling and Simulation 3 …, 2010
62010
ADCAS: adversarial deep clustering of Android streams
M Katebi, A Rezakhani, S Joudaki
Computers and Electrical Engineering 95, 107443, 2021
52021
A new resource allocation method in fog computing via non-cooperative game theory.
HM Talvar, HHS Javadi, H Navidi, A Rezakhani
J. Intell. Fuzzy Syst. 41 (2), 3921-3932, 2021
52021
A new resource allocation method in fog computing via non-cooperative game theory
H Mohammady Talvar, H Haj Seyyed Javadi, H Navidi, A Rezakhani
Journal of Intelligent & Fuzzy Systems 41 (2), 3921-3932, 2021
42021
Premeditated initial points for K-Means Clustering
PL Chithra
IJCSIS 15 (9), 2017
42017
Providing a hybrid cryptography algorithm for lightweight authentication protocol in RFID with urban traffic usage case
V Chegeni, MRM Goudarzi, A Rezakhani
arXiv preprint arXiv:2104.07714, 2021
32021
Compressive sensing based simultaneous data compression and convergent encryption for secure deduplication
MT Kumar, MB Reddy
International Journal of Computer Science and Information Security (IJCSIS …, 2017
32017
An empirical comparative forecast accuracy of exponential smoothing and nonlinear autoregressive models on six major rates
A Sihabuddin, D Rosadi, S Utami
International Journal of Computer Science and Information Security (IJCSIS …, 2017
32017
Service Oriented Approach to Improve the Power of Snorts
AR Roozbahani, R Nassiri, GR Latif-Shabgahi
2009 Second International Conference on Computer and Electrical Engineering …, 2009
32009
Attacks classification to improve the power of snorts
AR Roozbahani, R Nassiri, GR Latif-Shabgahi
2009 International Forum on Computer Science-Technology and Applications 1, 3-6, 2009
32009
N. mohammadi," Converting Network Attacks to Standard Semantic Web Form in Cloud Computing Infrastructure
AR Roozbahani, L Rikhtechi
International Journal of Computer Applications, 0975-8887, 0
3
A scalable key pre-distribution scheme based on the unital design for the internet of things security
V Chegeni, H Haj Seyyed Javadi, MR Moazami Goudarzi, A Rezakhani
IETE Journal of Research 69 (6), 3406-3417, 2023
22023
RAPSAMS: Robust affinity propagation clustering on static android malware stream
M Katebi, A RezaKhani, S Joudaki, ME Shiri
Concurrency and Computation: Practice and Experience 34 (15), e6980, 2022
12022
BBAC: Behavior-based access control to detect user suspicious behavior
L Rikhtechi, V Rafeh, A Rezakhani
Journal of Intelligent & Fuzzy Systems 43 (6), 8207-8220, 2022
12022
Enhanced Generalized Regression Neural Net for Breast Cancer detection
SB Ghalejoughi, N Lotfivand
International Journal of Computer Science and Information Security 16 (1), 2018
12018
The system can't perform the operation now. Try again later.
Articles 1–20