Follow
Mahdi Abadi
Title
Cited by
Year
A Clustering-Based Approach for Personalized Privacy Preserving Publication of Moving Object Trajectory Data
S Mahdavifar, M Abadi, M Kahani, H Mahdikhani
Network and System Security 7645, 149–165, 2012
272012
A differentially private location generalization approach to guarantee non-uniform privacy in moving objects databases
F Deldar, M Abadi
Knowledge-Based Systems 225, 107084, 2021
72021
A dynamic clustering-based approach for anomaly detection in AODV-based MANETs
M Alikhany, M Abadi
2011 International Symposium on Computer Networks and Distributed Systems …, 2011
242011
A fully spatial personalized differentially private mechanism to provide non-uniform privacy guarantees for spatial databases
N Niknami, M Abadi, F Deldar
Information Systems 92, 101526, 2020
72020
A generalization-based approach for personalized privacy preservation in trajectory data publishing
E Ghasemi Komishani, M Abadi
2012 6th International Symposium on Telecommunications (IST), 1129–1135, 2012
192012
A hybrid model for correlating alerts of known and unknown attack scenarios and updating attack graphs
SH Ahmadinejad, S Jalili, M Abadi
Computer Networks 55 (9), 2221–2240, 2011
772011
A Memetic Particle Swarm Optimization Algorithm for Network Vulnerability Analysis
M Abadi, S Jalili
Evolutionary Algorithms, 85–108, 2011
2011
A multi-start quantum-inspired evolutionary algorithm for solving combinatorial optimization problems
P Mahdabi, S Jalili, M Abadi
10th Annual Conference on Genetic and Evolutionary Computation (GECCO), 613–614, 2008
182008
A novel quantum-inspired evolutionary algorithm for solving combinatorial optimization problems
P Mahdabi, M Abadi, S Jalili
11th Annual Conference on Genetic and Evolutionary Computation (GECCO), 1807 …, 2009
92009
A novel reputation system to detect DGA-based botnets
R Sharifnya, M Abadi
2013 3th International Conference on Computer and Knowledge Engineering …, 2013
552013
A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs
M Abadi, S Jalili
The ISC International Journal of Information Security (ISeCure) 2 (1), 13–32, 2010
42010
A PCA-based distributed approach for intrusion detection in wireless sensor networks
M Ahmadi Livani, M Abadi
2011 International Symposium on Computer Networks and Distributed Systems …, 2011
85*2011
A PSO-based weighting method for linear combination of neural networks
SH Nabavi-Kerizi, M Abadi, E Kabir
Computers & Electrical Engineering 36 (5), 886–894, 2010
682010
Akoman: Hardware-level malware detection using discrete wavelet transform
NS Alizadeh, M Abadi
2018 IEEE 4th International Conference on Smart Computing (SMARTCOMP), 476–481, 2018
32018
AMD-EC: Anomaly-based Android malware detection using ensemble classifiers
F Ghaffari, M Abadi, A Tajoddin
2017 25th Iranian Conference on Electrical Engineering (ICEE), 2247–2252, 2017
172017
An ABC-AIS hybrid approach to dynamic anomaly detection in AODV-based MANETs
F Barani, M Abadi
2011 IEEE 10th International Conference on Trust, Security and Privacy in …, 2011
142011
An ant colony optimization algorithm for network vulnerability analysis
M Abadi, S Jalili
Iranian Journal of Electrical and Electronic Engineering 2 (3), 106–120, 2006
302006
An energy-efficient anomaly detection approach for wireless sensor networks
M Ahmadi Livani, M Abadi
2010 5th International Symposium on Telecommunications (IST), 243–248, 2010
112010
Android malware detection using one-class graph neural networks
F Deldar, M Abadi, M Ebrahimifard
The ISC International Journal of Information Security (ISeCure) 14 (3), 51–60, 2022
32022
Android malware detection using supervised deep graph representation learning
F Deldar, M Abadi, M Ebrahimifard
2022 12th International Conference on Computer and Knowledge Engineering …, 2022
12022
The system can't perform the operation now. Try again later.
Articles 1–20