MOWS: multi-objective workflow scheduling in cloud computing based on heuristic algorithm F Abazari, M Analoui, H Takabi, S Fu Simulation Modelling Practice and Theory 93, 119-132, 2019 | 119 | 2019 |
Security, privacy, and digital forensics in the cloud L Chen, H Takabi, NA Le-Khac John Wiley & Sons, 2019 | 39 | 2019 |
Effect of anti-malware software on infectious nodes in cloud environment F Abazari, M Analoui, H Takabi Computers & Security 58, 139-148, 2016 | 35 | 2016 |
Exploring the effects of virtual machine placement on the transmission of infections in cloud F Abazari, M Analoui 7'th International Symposium on Telecommunications (IST'2014), 278-282, 2014 | 12 | 2014 |
Multi-objective response to co-resident attacks in cloud environment F Abazari, M Analoui, H Takabi International Journal of Information and Communication Technology Research 9 …, 2017 | 7 | 2017 |
Cryptanalysis with Ternary Difference: Applied to BlockCipher PRESENT F Abazari, B Sadeghiyan International Journal of Information and Electronics Engineering 2 (3), 441, 2012 | 7 | 2012 |
Optimal response to computer network threats F Abazari, A Madani, H Gharaee 8th International Symposium on Telecommunications (IST), 729-734, 2016 | 6 | 2016 |
Origin Attribution of RSA Public Keys E Branca, F Abazari, R Rivera Carranza, N Stakhanova Security and Privacy in Communication Networks, 374--396, 2021 | 4 | 2021 |
Towards a functional and trustful web-based information sharing center SN Khajeddin, A Madani, H Gharaee, F Abazari 2019 5th International Conference on Web Research (ICWR), 252-257, 2019 | 4 | 2019 |
Dataset characteristics for reliable code authorship attribution F Abazari, E Branca, N Ridley, N Stakhanova, M Dalla Preda IEEE Transactions on Dependable and Secure Computing 20 (1), 506-521, 2021 | 3 | 2021 |
Language and platform independent attribution of heterogeneous code F Abazari, E Branca, E Novikova, N Stakhanova International Conference on Security and Privacy in Communication Systems …, 2022 | 2 | 2022 |
AndroClonium: Bytecode-level code clone detection for obfuscated Android apps A Foroughipour, N Stakhanova, F Abazari, B Sistany IFIP International Conference on ICT Systems Security and Privacy Protection …, 2022 | 2 | 2022 |
Teaching software‐defined network security through malicious tenant detection F Abazari, F Esposito, H Takabi, H Hosseinvand, T Pecorella Internet Technology Letters 2 (6), e131, 2019 | 2 | 2019 |
Atmsec: A secure protocol for atm machines Z Ghafari, F Abazari, M Analoui Second Computer Science Conference on Computer and Information Technology, 2014 | 2 | 2014 |
Security Enhancement in Open-Source Healthcare Developer Network using Graph Theory M Fasanghari, HS Cheraghchi, F Abazari, F Pouladi International Journal of Information and Communication Technology Research …, 2021 | 1 | 2021 |
Automated offense Prioritization for SIEM using Probabilistic Machine Learning Models MA Khan, A Azim, F Abazari, F Eargle, J Gardiner | | 2024 |
SIEM+: Harnessing Machine Learning for Advanced Anomaly Detection in Cybersecurity Software A Page, F Abazari, F Eargle, A Azim, J Gardiner | | 2024 |
QR-SACP: Quantitative Risk-Based Situational Awareness Calculation and Projection Through Threat Information Sharing M Safarzadehvahed, F Abazari, F Shabani Information Security Practice and Experience: 18th International Conference …, 2023 | | 2023 |
Hacking and Countermeasures in the Cloud F Abazari, H Takabi, M Analoui Security, Privacy, and Digital Forensics in the Cloud, 2019 | | 2019 |