Detecting botnet by using particle swarm optimization algorithm based on voting system M Asadi, MAJ Jamali, S Parsa, V Majidnezhad Future Generation Computer Systems 107, 95-111, 2020 | 114 | 2020 |
Detecting IoT botnets based on the combination of cooperative game theory with deep and machine learning approaches M Asadi Journal of Ambient Intelligence and Humanized Computing, 1-15, 2021 | 30 | 2021 |
Improving packet delivery ratio in odmrp with route diversity SJ Begdillo, M Asadi, AT Haghighat IJCSNS 7 (12), 146, 2007 | 17* | 2007 |
A scalable lookup service for p2p file sharing in manet M Asadi, AT Haghighat, B Zarei Proceedings of the 2007 international conference on Wireless communications …, 2007 | 10 | 2007 |
WBRR: A weight based reliable routing method in mobile ad hoc network S Rahebi, M Asadi Australian Journal of Basic and Applied Sciences 3 (3), 1888-1897, 2009 | 8 | 2009 |
Botnets unveiled: A comprehensive survey on evolving threats and defense strategies M Asadi, MAJ Jamali, A Heidari, NJ Navimipour Transactions on Emerging Telecommunications Technologies 35 (11), e5056, 2024 | 7 | 2024 |
Principles of service-oriented architecture and web services application in order to implement service-oriented architecture in software engineering M Khanbabaei, M Asadi Australian Journal of Basic and Applied Science 7 (11), p2046, 2011 | 6 | 2011 |
P2P Botnet Detection Using Deep Learning Method M Asadi, S Parsa, MA Jabraeil Jamali, V Majidnezhad Electronic and Cyber Defense 8 (2), 1-14, 2020 | 4 | 2020 |
Detection of Denial of Service Attacks by Ensemble Learning Method M Asadi, B Zarei Journal of Advanced Defense Science & Technology 14 (1), 51-68, 2023 | 1 | 2023 |
Comparison of Supervised Machine Learning Algorithms in Detection of Botnets Domain Generation Algorithms M Asadi, MA Jabraeil Jamali, S Parsa, V Majidnezhad Electronic and Cyber Defense 8 (4), 17-29, 2021 | 1 | 2021 |
High Reliable Routing method for mobile ad hoc networks underlining Efficient Energy Consumption M Asadi, S Rahebi, S Nourizadeh Australian Journal of Basic and Applied Sciences, INSInet Publication 4 (10 …, 2010 | 1 | 2010 |
A Novel Security Schema for Distributed File Systems B Zarei, M Asadi, S Nourizadeh, SJ Begdillo Advances in Computer and Information Sciences and Engineering, 305-310, 2008 | 1 | 2008 |
Improving strict 2 phase locking (S2PL) in transactions concurrency control SJ Begdillo, F Mahmoudi, M Asadi 2007 International Conference on Convergence Information Technology (ICCIT …, 2007 | 1 | 2007 |
Multiplex Community Detection in Social Networks Using a Chaos‐Based Hybrid Evolutionary Approach B Zarei, B Arasteh, M Asadi, V Majidnezhad, ST Afshord, A Bouyer Complexity 2024 (1), 1016086, 2024 | | 2024 |
Detecting Botnets Malicious Domains with Deep Autoencoder Neural Network M Asadi, S Parsa, V Vousoghi Electronic and Cyber Defense 9 (1), 61-74, 2021 | | 2021 |
Developed S2PL in Transaction Concurrency with Emphasis on Deletion of Convoy Phenomenon and improvement of Starvation of Transactions M Asadi, M Khanbabaei Australian Journal of Basic and Applied Science 10 (10), 4682-4690, 2010 | | 2010 |
ایجاد مجموعه غالب متصل در شبکه های سیار موردی سرافراز شبنم, جبرئيل جمالي محمدعلي, اسدي مهدي چهارمین کنفرانس بین اللملی مدیریت فناوری اطلاعات، ارتباطات و کامپيوتر, 1393 | | 1393 |
پروتکلهای مسیریابی چند پخشی برای شبکههای سیار موردی عسگری ربابه, جبرئیل جمالی محمدعلی, اسدی مهدی اولین همایش ملی مهندسی رایانه و مدیریت فناوری اطلاعات, 1393 | | 1393 |