An overview of virtual machine placement schemes in cloud computing M Masdari, SS Nabavi, V Ahmadi Journal of Network and Computer Applications 66, 106-127, 2016 | 373 | 2016 |
Towards workflow scheduling in cloud computing: a comprehensive analysis M Masdari, S ValiKardan, Z Shahi, SI Azar Journal of Network and Computer Applications 66, 64-82, 2016 | 329 | 2016 |
A survey of PSO-based scheduling algorithms in cloud computing M Masdari, F Salehi, M Jalali, M Bidaki Journal of Network and Systems Management 25 (1), 122-158, 2017 | 274 | 2017 |
A Survey and Taxonomy of the Fuzzy Signature-based Intrusion Detection Systems M Masdari, hemn Khezri Applied Soft Computing, 2020 | 191 | 2020 |
A survey and classification of the workload forecasting methods in cloud computing M Masdari, A Koshnevis Cluster Computing, 2019 | 173 | 2019 |
A survey on the computation offloading approaches in mobile edge/cloud computing environment: a stochastic-based perspective A Shakarami, M Ghobaei-Arani, M Masdari, M Hosseinzadeh Journal of Grid Computing 18 (4), 639-671, 2020 | 157 | 2020 |
A survey and taxonomy of DoS attacks in cloud computing M Masdari, M Jalali Security and Communication Networks 9 (16), 3724-3751, 2016 | 148 | 2016 |
Resource Provisioning using Workload Clustering in Cloud Computing Environment: A Hybrid Approach A Shahidinejad, M Ghobaei-Arani, M Masdari Cluster Computing, 2020 | 147 | 2020 |
Green Cloud Computing Using Proactive Virtual Machine Placement Challenges and Issues M Masdari, M Zangakani Journal of Grid Computing, 2019 | 120 | 2019 |
Towards secure intrusion detection systems using deep learning techniques: Comprehensive analysis and review SW Lee, M Mohammadi, S Rashidi, AM Rahmani, M Masdari, ... Journal of Network and Computer Applications 187, 103111, 2021 | 115 | 2021 |
Using cloud computing for e-government: challenges and benefits S Hashemi, K Monfaredi, M Masdari International Journal of Computer, Information, Systems and Control …, 2013 | 110 | 2013 |
Improving Security Using SVM-based Anomaly Detection: Issues and Challenges M Hosseinzadeh, AM Rahmani, B Vo, M Bidaki, M Masdari, M Zangakani Soft Computing, 2020 | 95 | 2020 |
A survey and taxonomy of the authentication schemes in Telecare Medicine Information Systems M Masdari, S Ahmadzadeh Journal of Network and Computer Applications 87, 1-19, 2017 | 94 | 2017 |
Fuzzy logic-based DDoS attacks and network traffic anomaly detection methods: Classification, overview, and future perspectives D Javaheri, S Gorgin, JA Lee, M Masdari Information Sciences 626, 315-338, 2023 | 93 | 2023 |
Bio-inspired virtual machine placement schemes in cloud computing environment: taxonomy, review, and future research directions M Masdari, S Gharehpasha, M Ghobaei-Arani, V Ghasemi Cluster Computing, 2019 | 85 | 2019 |
Analysis of secure LEACH-based clustering protocols in wireless sensor networks M Masdari, SM Bazarchi, M Bidaki Journal of Network and Computer Applications 36 (4), 1243-1260, 2013 | 85 | 2013 |
A new approach for decreasing energy in wireless sensor networks with hybrid LEACH protocol and fuzzy C-means algorithm A Bouyer, A Hatamlou, M Masdari International Journal of Communication Networks and Distributed Systems 14 …, 2015 | 75 | 2015 |
Multipath routing protocols in wireless sensor networks: A survey and analysis M Masdari, M Tanabi International Journal of future generation communication and networking 6 (6 …, 2013 | 73 | 2013 |
A Survey and Classification of the Security Anomaly Detection Mechanisms in Software Defined Networks tohid jafarian, M Masdari, ali ghaffari, kambiz majidzadeh Cluster Computing, 2020 | 70* | 2020 |
Anomaly-based intrusion detection system in the Internet of Things using a convolutional neural network and multi-objective enhanced Capuchin Search Algorithm H Asgharzadeh, A Ghaffari, M Masdari, FS Gharehchopogh Journal of Parallel and Distributed Computing 175, 1-21, 2023 | 68 | 2023 |