Online reputation measurement of companies based on user-generated content in online social networks HS Manaman, S Jamali, A AleAhmad Computers in Human Behavior 54, 94-100, 2016 | 113 | 2016 |
Performance comparison of AODV, DSDV, DSR and TORA routing protocols in MANETs MV Khiavi, S Jamali, SJ Gudakahriz International Research Journal of Applied and Basic Sciences 3 (7), 1429-1436, 2012 | 97 | 2012 |
An energy-efficient routing protocol for MANETs: a particle swarm optimization approach S Jamali, L Rezaei, SJ Gudakahriz Journal of applied research and technology 11 (6), 803-812, 2013 | 95 | 2013 |
DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system S Jamali, R Fotohi the Journal of Supercomputing 73 (12), 5173-5196, 2017 | 91 | 2017 |
Defending against wormhole attack in MANET using an artificial immune system S Jamali, R Fotohi New Review of Information Networking 21 (2), 79-100, 2016 | 80 | 2016 |
A novel keyed parallel hashing scheme based on a new chaotic system MA Chenaghlu, S Jamali, NN Khasmakhi Chaos, Solitons & Fractals 87, 216-225, 2016 | 69 | 2016 |
An anomaly-based IDS for detecting attacks in RPL-based internet of things B Farzaneh, MA Montazeri, S Jamali 2019 5th International conference on web research (ICWR), 61-66, 2019 | 60 | 2019 |
Big data-aware intrusion detection system in communication networks: a deep learning approach M Mahdavisharif, S Jamali, R Fotohi Journal of Grid Computing 19 (4), 46, 2021 | 56 | 2021 |
An Improvement over AODV routing protocol by limiting visited hop count R Fotohi, S Jamali, F Sarkohaki, S Behzad International Journal of Information Technology and Computer Science (IJITCS …, 2013 | 50 | 2013 |
Improvement over the OLSR routing protocol in mobile Ad Hoc networks by eliminating the unnecessary loops S Behzad, R Fotohi, S Jamali International Journal of Information Technology and Computer Science (IJITCS …, 2013 | 48 | 2013 |
Routing algorithm for vehicular ad hoc network based on dynamic ant colony optimization AM Oranj, RM Alguliev, F Yusifov, S Jamali Int. J. Electron. Elect. Eng 4 (1), 79-83, 2016 | 44 | 2016 |
A comprehensive study on defence against wormhole attack methods in mobile Ad hoc networks R Fotohi, S Jamali International journal of Computer Science & Network Solutions 2 (5), 37-56, 2014 | 40 | 2014 |
A Hybrid routing method for mobile ad-hoc networks R Fotohi, R Heydari, S Jamali Journal of Advances in Computer Research 7 (3), 93-103, 2016 | 39 | 2016 |
Dynamic resource provisioning in cloud computing: a heuristic markovian approach HR Qavami, S Jamali, MK Akbari, B Javadi Cloud Computing: 4th International Conference, CloudComp 2013, Wuhan, China …, 2014 | 39 | 2014 |
On the use of the genetic programming for balanced load distribution in software-defined networks S Jamali, A Badirzadeh, MS Siapoush Digital Communications and Networks 5 (4), 288-296, 2019 | 36 | 2019 |
Improving grouping genetic algorithm for virtual machine placement in cloud data centers S Jamali, S Malektaji 2014 4th international conference on computer and knowledge engineering …, 2014 | 35 | 2014 |
An artificial immune system based method for defense against wormhole attack in mobile adhoc networks S Jamali, R Fotohi, M Analoui Tabriz Journal of Electrical Engineering 47 (4), 1407-1419, 2018 | 31 | 2018 |
Performance evaluation of aodv, lhc-aodv, olsr, ul-olsr, dsdv routing protocols R Fotohi, S Jamali, F Sarkohaki International Journal of Information Technology and Computer Science (IJITCS …, 2013 | 30 | 2013 |
Extracting users’ navigational behavior from web log data: a survey M Jafari, F SoleymaniSabzchi, S Jamali Journal of Computer Sciences and Applications 1 (3), 39-45, 2013 | 29 | 2013 |
Survey on job scheduling algorithms in cloud computing F Mohammadi, S Jamali, M Bekravi International Journal of Emerging Trends & Technology in Computer Science …, 2014 | 28 | 2014 |