The hybrid technique for DDoS detection with supervised learning algorithms S Hosseini, M Azizi Computer Networks 158, 35-45, 2019 | 124 | 2019 |
New hybrid method for attack detection using combination of evolutionary algorithms, SVM, and ANN S Hosseini, BMH Zade Computer Networks 173, 107168, 2020 | 91 | 2020 |
A model for malware propagation in scale-free networks based on rumor spreading process S Hosseini, MA Azgomi Computer Networks 108, 97-107, 2016 | 67 | 2016 |
Malware propagation modeling considering software diversity and immunization S Hosseini, MA Azgomi, AT Rahmani Journal of computational science 13, 49-67, 2016 | 49 | 2016 |
The dynamics of an SEIRS-QV malware propagation model in heterogeneous networks S Hosseini, MA Azgomi Physica A: Statistical Mechanics and its Applications 512, 803-817, 2018 | 45 | 2018 |
Anomaly process detection using negative selection algorithm and classification techniques S Hosseini, H Seilani Evolving Systems 12 (3), 769-778, 2021 | 44 | 2021 |
Botnet detection using negative selection algorithm, convolution neural network and classification methods S Hosseini, AE Nezhad, H Seilani Evolving Systems 13 (1), 101-115, 2022 | 42 | 2022 |
A new machine learning method consisting of GA-LR and ANN for attack detection S Hosseini Wireless Networks 26 (6), 4149-4162, 2020 | 32 | 2020 |
A new hybrid feature selection based on Improved Equilibrium Optimization ZA Varzaneh, S Hossein, SE Mood, MM Javidi Chemometrics and Intelligent Laboratory Systems 228, 104618, 2022 | 31 | 2022 |
Agent-based simulation of the dynamics of malware propagation in scale-free networks S Hosseini, M Abdollahi Azgomi, A Rahmani Torkaman Simulation 92 (7), 709-722, 2016 | 30 | 2016 |
Data mining tools-a case study for network intrusion detection S Hosseini, SR Sardo Multimedia Tools and Applications 80 (4), 4999-5019, 2021 | 24 | 2021 |
Game theory approach for detecting vulnerable data centers in cloud computing network S Hosseini, R Vakili International Journal of Communication Systems 32 (8), e3938, 2019 | 23 | 2019 |
UML model refactoring with emphasis on behavior preservation S Hosseini, MA Azgomi 2008 2nd IFIP/IEEE International Symposium on Theoretical Aspects of …, 2008 | 23 | 2008 |
Predict stock prices using supervised learning algorithms and particle swarm optimization algorithm MJ Bazrkar, S Hosseini Computational Economics 62 (1), 165-186, 2023 | 22 | 2023 |
The genetic spectrum of familial hypercholesterolemia (FH) in the Iranian population RH Fairoozy, M Futema, R Vakili, MR Abbaszadegan, S Hosseini, ... Scientific reports 7 (1), 17087, 2017 | 22 | 2017 |
Machine learning algorithms for predicting electricity consumption of buildings S Hosseini, RH Fard Wireless Personal Communications 121, 3329-3341, 2021 | 18 | 2021 |
Deep text clustering using stacked AutoEncoder S Hosseini, ZA Varzaneh Multimedia tools and applications 81 (8), 10861-10881, 2022 | 17 | 2022 |
Dynamics of a rumor‐spreading model with diversity of configurations in scale‐free networks S Hosseini, M Abdollahi Azgomi, A Torkaman Rahmani International Journal of Communication Systems 28 (18), 2255-2274, 2015 | 17 | 2015 |
Network intrusion detection based on deep learning method in internet of thing S Hosseini, SR Sardo Journal of Reliable Intelligent Environments 9 (2), 147-159, 2023 | 15 | 2023 |
Information dissemination modeling based on rumor propagation in online social networks with fuzzy logic S Hosseini, A Zandvakili Social Network Analysis and Mining 12 (1), 34, 2022 | 15 | 2022 |