Reza Ebrahimi Atani
AuthID: R-00K-PDW
61
TITLE: A Software Solution for Realtime Malware Detection in Distributed Systems
AUTHORS: Nia, MA; Kiaei, SK; Atani, RE; Fabian, B;
PUBLISHED: 2015, SOURCE: 2015 12TH INTERNATIONAL IRANIAN SOCIETY OF CRYPTOLOGY CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC)
AUTHORS: Nia, MA; Kiaei, SK; Atani, RE; Fabian, B;
PUBLISHED: 2015, SOURCE: 2015 12TH INTERNATIONAL IRANIAN SOCIETY OF CRYPTOLOGY CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC)
INDEXED IN: WOS
IN MY: ORCID
62
TITLE: Game Theory-based and Heuristic Algorithms for Parking-lot Search
AUTHORS: Mamandi, A; Yousefi, S; Atani, RE;
PUBLISHED: 2015, SOURCE: CSSE 2015 20th International Symposium on Computer Science and Software Engineering
AUTHORS: Mamandi, A; Yousefi, S; Atani, RE;
PUBLISHED: 2015, SOURCE: CSSE 2015 20th International Symposium on Computer Science and Software Engineering
INDEXED IN: WOS
IN MY: ORCID
63
TITLE: Counter Attack to Free-Riders: Filling A Security Hole in BitTorrent Protocol
AUTHORS: Naghizadeh, A; Razeghi, B; Radmanesh, I; Hatamian, M; Atani, RE; Norudi, ZN;
PUBLISHED: 2015, SOURCE: 2015 IEEE 12th International Conference on Networking, Sensing and Control (ICNSC)
AUTHORS: Naghizadeh, A; Razeghi, B; Radmanesh, I; Hatamian, M; Atani, RE; Norudi, ZN;
PUBLISHED: 2015, SOURCE: 2015 IEEE 12th International Conference on Networking, Sensing and Control (ICNSC)
INDEXED IN: WOS
IN MY: ORCID
64
TITLE: Game theory-based and heuristic algorithms for parking-lot search
AUTHORS: Ayub Mamandi; Saleh Yousefi; Reza Ebrahimi Atani;
PUBLISHED: 2015, SOURCE: 2015 International Symposium on Computer Science and Software Engineering (CSSE)
AUTHORS: Ayub Mamandi; Saleh Yousefi; Reza Ebrahimi Atani;
PUBLISHED: 2015, SOURCE: 2015 International Symposium on Computer Science and Software Engineering (CSSE)
65
TITLE: A cluster-based vehicular cloud architecture with learning-based resource management
AUTHORS: Hamid Reza Arkian; Reza Ebrahimi Atani; Abolfazl Diyanat; Atefe Pourkhalili;
PUBLISHED: 2015, SOURCE: The Journal of Supercomputing, VOLUME: 71, ISSUE: 4
AUTHORS: Hamid Reza Arkian; Reza Ebrahimi Atani; Abolfazl Diyanat; Atefe Pourkhalili;
PUBLISHED: 2015, SOURCE: The Journal of Supercomputing, VOLUME: 71, ISSUE: 4
66
TITLE: RTECA: Real time episode correlation algorithm for multi-step attack scenarios detection
AUTHORS: Ali Ahmadian Ramaki; Morteza Amini; Reza Ebrahimi Atani;
PUBLISHED: 2015, SOURCE: Computers & Security, VOLUME: 49
AUTHORS: Ali Ahmadian Ramaki; Morteza Amini; Reza Ebrahimi Atani;
PUBLISHED: 2015, SOURCE: Computers & Security, VOLUME: 49
67
TITLE: C-trust: A trust management system to improve fairness on circular P2P networks
AUTHORS: Alireza Naghizadeh; Behrooz Razeghi; Ehsan Meamari; Majid Hatamian; Reza Ebrahimi Atani;
PUBLISHED: 2015, SOURCE: Peer-to-Peer Networking and Applications, VOLUME: 9, ISSUE: 6
AUTHORS: Alireza Naghizadeh; Behrooz Razeghi; Ehsan Meamari; Majid Hatamian; Reza Ebrahimi Atani;
PUBLISHED: 2015, SOURCE: Peer-to-Peer Networking and Applications, VOLUME: 9, ISSUE: 6
68
TITLE: Application of connected dominating sets in wildfire detection based on wireless sensor networks
AUTHORS: Saman Tahouri; Reza Ebrahimi Atani; Amir Hassani Karbasi; Yashar Deldjoo;
PUBLISHED: 2015, SOURCE: International Journal of Information Technology, Communications and Convergence, VOLUME: 3, ISSUE: 2
AUTHORS: Saman Tahouri; Reza Ebrahimi Atani; Amir Hassani Karbasi; Yashar Deldjoo;
PUBLISHED: 2015, SOURCE: International Journal of Information Technology, Communications and Convergence, VOLUME: 3, ISSUE: 2
69
TITLE: A software solution for realtime malware detection in distributed systems
AUTHORS: Mehran Alidoost Nia; Seyed Kamyar Kiaei; Reza Ebrahimi Atani; Benjamin Fabian;
PUBLISHED: 2015, SOURCE: 2015 12th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC)
AUTHORS: Mehran Alidoost Nia; Seyed Kamyar Kiaei; Reza Ebrahimi Atani; Benjamin Fabian;
PUBLISHED: 2015, SOURCE: 2015 12th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC)
70
TITLE: Privacy enhancement in anonymous network channels using multimodality injection
AUTHORS: Mehran Alidoost Nia; Reza Ebrahimi Atani; Antonio Ruiz‐Martínez;
PUBLISHED: 2015, SOURCE: Security and Communication Networks, VOLUME: 8, ISSUE: 16
AUTHORS: Mehran Alidoost Nia; Reza Ebrahimi Atani; Antonio Ruiz‐Martínez;
PUBLISHED: 2015, SOURCE: Security and Communication Networks, VOLUME: 8, ISSUE: 16