A new feature selection IDS based on genetic algorithm and SVM H Gharaee, H Hosseinvand 2016 8th International Symposium on Telecommunications (IST), 139-144, 2016 | 161 | 2016 |
A Modular Architecture for Wide Scan Angle Phased Array Antenna for K/Ka Mobile SATCOM WM Abdel-Wahab, H Al-Saedi, EHM Alian, M Raeis-Zadeh, A Ehsandar, ... 2019 IEEE MTT-S International Microwave Symposium (IMS), 2019 | 60 | 2019 |
Log management comprehensive architecture in Security Operation Center (SOC) A Madani, S Rezayi, H Gharaee 2011 International Conference on Computational Aspects of Social Networks …, 2011 | 59 | 2011 |
An adaptive machine learning based approach for phishing detection using hybrid features MM Yadollahi, F Shoeleh, E Serkani, A Madani, H Gharaee 2019 5th International Conference on Web Research (ICWR), 281-286, 2019 | 56 | 2019 |
Selfish node detection based on hierarchical game theory in IoT S Nobahary, HG Garakani, A Khademzadeh, AM Rahmani EURASIP Journal on Wireless Communications and Networking 2019, 1-19, 2019 | 44 | 2019 |
Performance Analysis of AODV under Black Hole Attack through Use of OPNET Simulator HA Esmaili, MRK Shoja, H Gharaee World of Computer Science and Information Technology Journal (WCSIT) 1 (2 …, 2011 | 43 | 2011 |
Cloud security issues based on people, process and technology model: A survey F Ghaffari, H Gharaee, A Arabsorkhi 2019 5th International Conference on web research (ICWR), 196-202, 2019 | 20 | 2019 |
Lightweight, anonymous and mutual authentication in IoT infrastructure S Janbabaei, H Gharaee, N Mohammadzadeh 2016 8th International Symposium on Telecommunications (IST), 162-166, 2016 | 18 | 2016 |
Frequent item set mining-based alert correlation for extracting multi-stage attack scenarios S Lagzian, F Amiri, AR Enayati, H Gharaee 6th International Symposium on Telecommunications (IST), 1010-1014, 2012 | 18 | 2012 |
A novel hybrid anomaly based intrusion detection method K Qazanfari, MS Mirpouryan, H Gharaee 6th International Symposium on Telecommunications (IST), 942-947, 2012 | 18 | 2012 |
Anomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors NM Elham Serkani, Hossein Gharaee Garakani The ISC International Journal of Information Security (ISeCure) 11 (2), 159-171, 2019 | 15* | 2019 |
A novel and comprehensive evaluation methodology for SIEM M Safarzadeh, H Gharaee, AH Panahi Information Security Practice and Experience: 15th International Conference …, 2019 | 14 | 2019 |
A Game Theory Approach for Malicious Node Detection in MANETs, Y Taheri, H Gharaee, N Mohammadzadeh Journal of Information Science and Engineering 32 (3), 559-573, 2016 | 14 | 2016 |
Adaptive energy aware cooperation strategy in heterogeneous multi-domain sensor networks MJ Shamani, H Gharaee, S Sadri, F Rezaei Procedia Computer Science 19, 1047-1052, 2013 | 14 | 2013 |
Sensing Structure for Blind Spot Detection System in Vehicles S.Shirahmad Gale Bagi, H. Gharaee Garakani, B. Moshiri, M. Khoshnevisan 2019 International Conference on Control, Automation and Information …, 2019 | 13 | 2019 |
A survey of pattern matching algorithm in intrusion detection system H Gharaee, S Seifi, N Monsefan 7'th International Symposium on Telecommunications (IST'2014), 946-953, 2014 | 13 | 2014 |
Baseband implementation of OTR-UWB receiver using FPGA H Gharaee, A Nabavi AEU-International Journal of Electronics and Communications 64 (3), 258-266, 2010 | 13 | 2010 |
Security Framework of IoT-Based Smart Home S Sotoudeh, S Hashemi, H Gharaee Garakani International Journal of Information and Communication Technology Research …, 2020 | 12 | 2020 |
Cyber security challenges in autonomous vehicle: Their impact on RF sensor and wireless technologies HG Garakani, B Moshiri, S Safavi-Naeini 2018 18th international symposium on antenna technology and applied …, 2018 | 12 | 2018 |
Security considerations and requirements for Cloud computing F Ghaffari, H Gharaee, MR Forouzandehdoust 2016 8th International Symposium on Telecommunications (IST), 105-110, 2016 | 12 | 2016 |