Network intrusion detection and prevention: concepts and techniques AA Ghorbani, W Lu, M Tavallaee Springer Science & Business Media, 2009 | 361 | 2009 |
Cost-sensitive payment card fraud detection based on dynamic random forest and k-nearest neighbors S Nami, M Shajari Expert Systems with Applications 110, 381-392, 2018 | 140 | 2018 |
An enhanced e-commerce trust model for community based centralized systems MA Morid, M Shajari Electronic Commerce Research 12, 409-427, 2012 | 60 | 2012 |
FEMRA: Fuzzy expert model for risk assessment AS Sendi, M Jabbarifar, M Shajari, M Dagenais 2010 fifth international conference on internet monitoring and protection, 48-53, 2010 | 51 | 2010 |
Word sense disambiguation application in sentiment analysis of news headlines: an applied approach to FOREX market prediction S Seifollahi, M Shajari Journal of Intelligent Information Systems 52 (1), 57-83, 2018 | 48 | 2018 |
Block withholding game among bitcoin mining pools AT Haghighat, M Shajari Future Generation Computer Systems 97, 482-491, 2019 | 38 | 2019 |
Attack scenario reconstruction using intrusion semantics M Barzegar, M Shajari Expert Systems with Applications 108, 119-133, 2018 | 37 | 2018 |
A cost-sensitive move selection strategy for moving target defense V Zangeneh, M Shajari Computers & Security 75, 72-91, 2018 | 36 | 2018 |
Defending recommender systems by influence analysis MA Morid, M Shajari, AR Hashemi Information Retrieval 17, 137-152, 2014 | 36 | 2014 |
Fuzzy multi-criteria decision-making for information security risk assessment A Shameli-Sendi, M Shajari, M Hassanabadi, M Jabbarifar, M Dagenais The Open Cybernetics & Systemics Journal 6 (1), 2012 | 34 | 2012 |
Application of Belief-Desire-Intention Agents in Intrusion Detection & Response. M Shajari, AA Ghorbani PST, 181-191, 2004 | 32 | 2004 |
FUZZGY: A hybrid model for credit card fraud detection MR HaratiNik, M Akrami, S Khadivi, M Shajari 6th international symposium on telecommunications (IST), 1088-1093, 2012 | 28 | 2012 |
A usage control based architecture for cloud environments T Tavizi, M Shajari, P Dodangeh 2012 IEEE 26th International Parallel and Distributed Processing Symposium …, 2012 | 27 | 2012 |
Intelligent automated intrusion response system based on fuzzy decision making and risk assessment S Berenjian, M Shajari, N Farshid, M Hatamian 2016 IEEE 8th International Conference on Intelligent Systems (IS), 709-714, 2016 | 26 | 2016 |
Industrial Control System Security Taxonomic Framework with Application to a Comprehensive Incidents Survey MM Ahmadian, M Shajari International Journal of Critical Infrastructure Protection, 2020 | 24 | 2020 |
Mvpayword: Secure and efficient payword-based micropayment scheme A Esmaeeli, M Shajari 2009 Second International Conference on the Applications of Digital …, 2009 | 18 | 2009 |
A comprehensive security control selection model for inter-dependent organizational assets structure M Shahpasand, M Shajari, SA Hashemi Golpaygani, H Ghavamipoor Information & Computer Security 23 (2), 218-242, 2015 | 14 | 2015 |
AMVPayword: secure and efficient anonymous payword-based micropayment scheme M Hosseinkhani, E Tarameshloo, M Shajari 2010 International Conference on Computational Intelligence and Security …, 2010 | 14 | 2010 |
An incentive mechanism to promote honesty among seller agents in electronic marketplaces M Riazati, M Shajari, S Khorsandi Electronic Commerce Research 19 (1), 231-255, 2018 | 13 | 2018 |
Improving recommender systems’ performance on cold-start users and controversial items by a new similarity model M Mansoury, M Shajari International Journal of Web Information Systems 12 (2), 126-149, 2016 | 13 | 2016 |