Improving route stability and overhead on AODV routing protocol and make it usable for VANET O Abedi, R Berangi, MA Azgomi 2009 29th ieee international conference on distributed computing systems …, 2009 | 100 | 2009 |
An improved influence maximization method for social networks based on genetic algorithm JJ Lotf, MA Azgomi, MRE Dishabi Physica A: Statistical Mechanics and its Applications 586, 126480, 2022 | 86 | 2022 |
A survey of quantum-like approaches to decision making and cognition M Ashtiani, MA Azgomi Mathematical Social Sciences 75, 49-80, 2015 | 85 | 2015 |
A taxonomy of frauds and fraud detection techniques N Laleh, M Abdollahi Azgomi Information Systems, Technology and Management: Third International …, 2009 | 75 | 2009 |
A game-theoretic approach to model and quantify the security of cyber-physical systems H Orojloo, MA Azgomi Computers in Industry 88, 44-57, 2017 | 74 | 2017 |
A method for evaluating the consequence propagation of security attacks in cyber–physical systems H Orojloo, MA Azgomi Future Generation Computer Systems 67, 57-71, 2017 | 74 | 2017 |
An improved method for test case prioritization by incorporating historical test case data A Khalilian, MA Azgomi, Y Fazlalizadeh Science of Computer Programming 78 (1), 93-116, 2012 | 73 | 2012 |
A model for malware propagation in scale-free networks based on rumor spreading process S Hosseini, MA Azgomi Computer Networks 108, 97-107, 2016 | 67 | 2016 |
A stochastic model of attack process for the evaluation of security metrics J Almasizadeh, MA Azgomi Computer Networks 57 (10), 2159-2180, 2013 | 63 | 2013 |
Trust modeling based on a combination of fuzzy analytic hierarchy process and fuzzy VIKOR M Ashtiani, M Abdollahi Azgomi Soft Computing 20, 399-421, 2016 | 55 | 2016 |
Prioritizing test cases for resource constraint environments using historical test case performance data Y Fazlalizadeh, A Khalilian, MA Azgomi, S Parsa 2009 2nd IEEE International Conference on Computer Science and Information …, 2009 | 53 | 2009 |
Malware propagation modeling considering software diversity and immunization S Hosseini, MA Azgomi, AT Rahmani Journal of computational science 13, 49-67, 2016 | 49 | 2016 |
Task scheduling modelling and reliability evaluation of grid services using coloured Petri nets MA Azgomi, R Entezari-Maleki Future Generation Computer Systems 26 (8), 1141-1150, 2010 | 49 | 2010 |
Conflict-free scheduling and routing of automated guided vehicles in mesh topologies H Ghasemzadeh, E Behrangi, MA Azgomi Robotics and Autonomous Systems 57 (6-7), 738-748, 2009 | 46 | 2009 |
The dynamics of an SEIRS-QV malware propagation model in heterogeneous networks S Hosseini, MA Azgomi Physica A: Statistical Mechanics and its Applications 512, 803-817, 2018 | 44 | 2018 |
A hesitant fuzzy model of computational trust considering hesitancy, vagueness and uncertainty M Ashtiani, MA Azgomi Applied Soft Computing 42, 18-37, 2016 | 43 | 2016 |
Modelling and evaluation of the security of cyber‐physical systems using stochastic Petri nets H Orojloo, M Abdollahi Azgomi IET Cyber‐Physical Systems: Theory & Applications 4 (1), 50-57, 2019 | 34 | 2019 |
A method for modeling and evaluation of the security of cyber-physical systems H Orojloo, MA Azgomi 2014 11th International ISC Conference on Information Security and …, 2014 | 34 | 2014 |
Incorporating historical test case performance data and resource constraints into test case prioritization Y Fazlalizadeh, A Khalilian, M Abdollahi Azgomi, S Parsa Tests and Proofs: Third International Conference, TAP 2009, Zurich …, 2009 | 33 | 2009 |
A modelling tool for hierarchical stochastic activity networks MA Azgomi, A Movaghar Simulation Modelling Practice and Theory 13 (6), 505-524, 2005 | 33 | 2005 |