A Clustering-Based Approach for Personalized Privacy Preserving Publication of Moving Object Trajectory Data S Mahdavifar, M Abadi, M Kahani, H Mahdikhani Network and System Security 7645, 149–165, 2012 | 27 | 2012 |
A differentially private location generalization approach to guarantee non-uniform privacy in moving objects databases F Deldar, M Abadi Knowledge-Based Systems 225, 107084, 2021 | 7 | 2021 |
A dynamic clustering-based approach for anomaly detection in AODV-based MANETs M Alikhany, M Abadi 2011 International Symposium on Computer Networks and Distributed Systems …, 2011 | 24 | 2011 |
A fully spatial personalized differentially private mechanism to provide non-uniform privacy guarantees for spatial databases N Niknami, M Abadi, F Deldar Information Systems 92, 101526, 2020 | 7 | 2020 |
A generalization-based approach for personalized privacy preservation in trajectory data publishing E Ghasemi Komishani, M Abadi 2012 6th International Symposium on Telecommunications (IST), 1129–1135, 2012 | 19 | 2012 |
A hybrid model for correlating alerts of known and unknown attack scenarios and updating attack graphs SH Ahmadinejad, S Jalili, M Abadi Computer Networks 55 (9), 2221–2240, 2011 | 77 | 2011 |
A Memetic Particle Swarm Optimization Algorithm for Network Vulnerability Analysis M Abadi, S Jalili Evolutionary Algorithms, 85–108, 2011 | | 2011 |
A multi-start quantum-inspired evolutionary algorithm for solving combinatorial optimization problems P Mahdabi, S Jalili, M Abadi 10th Annual Conference on Genetic and Evolutionary Computation (GECCO), 613–614, 2008 | 18 | 2008 |
A novel quantum-inspired evolutionary algorithm for solving combinatorial optimization problems P Mahdabi, M Abadi, S Jalili 11th Annual Conference on Genetic and Evolutionary Computation (GECCO), 1807 …, 2009 | 9 | 2009 |
A novel reputation system to detect DGA-based botnets R Sharifnya, M Abadi 2013 3th International Conference on Computer and Knowledge Engineering …, 2013 | 55 | 2013 |
A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs M Abadi, S Jalili The ISC International Journal of Information Security (ISeCure) 2 (1), 13–32, 2010 | 4 | 2010 |
A PCA-based distributed approach for intrusion detection in wireless sensor networks M Ahmadi Livani, M Abadi 2011 International Symposium on Computer Networks and Distributed Systems …, 2011 | 85* | 2011 |
A PSO-based weighting method for linear combination of neural networks SH Nabavi-Kerizi, M Abadi, E Kabir Computers & Electrical Engineering 36 (5), 886–894, 2010 | 68 | 2010 |
Akoman: Hardware-level malware detection using discrete wavelet transform NS Alizadeh, M Abadi 2018 IEEE 4th International Conference on Smart Computing (SMARTCOMP), 476–481, 2018 | 3 | 2018 |
AMD-EC: Anomaly-based Android malware detection using ensemble classifiers F Ghaffari, M Abadi, A Tajoddin 2017 25th Iranian Conference on Electrical Engineering (ICEE), 2247–2252, 2017 | 17 | 2017 |
An ABC-AIS hybrid approach to dynamic anomaly detection in AODV-based MANETs F Barani, M Abadi 2011 IEEE 10th International Conference on Trust, Security and Privacy in …, 2011 | 14 | 2011 |
An ant colony optimization algorithm for network vulnerability analysis M Abadi, S Jalili Iranian Journal of Electrical and Electronic Engineering 2 (3), 106–120, 2006 | 30 | 2006 |
An energy-efficient anomaly detection approach for wireless sensor networks M Ahmadi Livani, M Abadi 2010 5th International Symposium on Telecommunications (IST), 243–248, 2010 | 11 | 2010 |
Android malware detection using one-class graph neural networks F Deldar, M Abadi, M Ebrahimifard The ISC International Journal of Information Security (ISeCure) 14 (3), 51–60, 2022 | 3 | 2022 |
Android malware detection using supervised deep graph representation learning F Deldar, M Abadi, M Ebrahimifard 2022 12th International Conference on Computer and Knowledge Engineering …, 2022 | 1 | 2022 |