Follow
Mohammadhadi Alaeiyan
Mohammadhadi Alaeiyan
Faculty of Computer engineering, K. N. Toosi University of Technology
Verified email at kntu.ac.ir - Homepage
Title
Cited by
Cited by
Year
Analysis and classification of context-based malware behavior
M Alaeiyan, S Parsa, M Conti
Computer Communications 136, 76-90, 2019
572019
A multilabel fuzzy relevance clustering system for malware attack attribution in the edge layer of cyber-physical networks
M Alaeiyan, A Dehghantanha, T Dargahi, M Conti, S Parsa
ACM Transactions on Cyber-Physical Systems 4 (3), 1-22, 2020
282020
Detection of algorithmically-generated domains: An adversarial machine learning approach
M Alaeiyan, S Parsa, P Vinod, M Conti
Computer Communications 160, 661-673, 2020
192020
Malware signature generation using locality sensitive hashing
H Naderi, P Vinod, M Conti, S Parsa, MH Alaeiyan
Security and Privacy: Second ISEA International Conference, ISEA-ISAP 2018 …, 2019
142019
Perfect 3-colorings of the Johnson graphs J (4, 2), J (5, 2), J (6, 2) and Petersen graph
MH Alaeiyan, A Abedi
Ars Combinatoria 140, 199-213, 2018
102018
Automatic loop detection in the Sequence of system calls
MH Alaeiyan, S Parsa
2nd International Conference on Knowledge-Based Engineering and Innovation …, 2015
62015
Perfect 2-colorings of the Platonic graphs
MH Alaeiyan, H Karami
International Journal of Nonlinear Analysis and Applications, 2016
52016
A combination of curve fitting algorithms to collect a few training samples for function approximation
S Parsa, M Alaeiyan
JOURNAL OF MATHEMATICS AND COMPUTER SCIENCE-JMCS 17 (3), 355-364, 2017
42017
A hierarchical layer of atomic behavior for malicious behaviors prediction
M Alaeiyan, S Parsa
Journal of Computer Virology and Hacking Techniques 18 (4), 367-382, 2022
22022
Perfect 3-colorings of the Johnson graph J(6, 3)
M Alaeiyan, A Abedi, M Alaeiyan
Bulletin of the Iranian Mathematical Society , 1-10, 2020
22020
Prediction nullity of graph using data mining
M Alaeiyan, KK Obayes, M Alaeiyan
Results in Nonlinear Analysis 6 (2), 1-8, 2023
12023
Enhancing Code Privacy: An Exploratory Implementation of Java DataFlow Obfuscation
M Alaeiyan, A Hamedi, MA SoltanBeigi, AR Parvahan, AA Ghaedi
2023
Perfect 2-Colorings of Cn× Cm
M Alaeiyan, M Kamran Jamil, MH Alaeiyan
Journal of Algebra and Related Topics 11 (1), 55-63, 2023
2023
Sober: Explores for invasive behaviour of malware
M Alaeiyan, S Parsa, P Vinod
Journal of Information Security and Applications 74, 103451, 2023
2023
Detecting smells in code using deep learning methods
T Akhlaq Pasandi, M Alaeiyan
7th International Conference on Combinatorics, Cryptography, Computer …, 2022
2022
Attack detection: an adversarial machine learning approach
T Akhlaq Pasandi, M Alaeiyan
7th International Conference on Combinatorics, Cryptography, Computer …, 2022
2022
An automated approach to analysis and classification of Crypto-ransomwares’ family
SAS jafari, M Alaeiyan, S Parsa
Biannual Journal Monadi for Cyberspace Security (AFTA) 8 (2), 75-88, 2020
2020
Analysis of disassembled executable codes by abstract interpretation
M Alaeiyan, S Parsa
International Journal of Nonlinear Analsis and Applications 10 (1), 9-13, 2019
2019
A Graph-Based Solution to University Timetabling
mohammad hadi alaeiyan
Turkish Journal of Engineering, Science and Technology, 32-35, 2013
2013
The edge-labeling and vertex-colors of Kn
MH Alaeiyan
Mathematical Sciences a springeropen journal, 2012
2012
The system can't perform the operation now. Try again later.
Articles 1–20