A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks HH Pajouh, R Javidan, R Khayami, A Dehghantanha, KKR Choo IEEE Transactions on Emerging Topics in Computing 7 (2), 314-323, 2016 | 569 | 2016 |
A deep recurrent neural network based approach for internet of things malware threat hunting H HaddadPajouh, A Dehghantanha, R Khayami, KKR Choo Future Generation Computer Systems 85, 88-96, 2018 | 532 | 2018 |
Know abnormal, find evil: frequent pattern mining for ransomware threat hunting and intelligence S Homayoun, A Dehghantanha, M Ahmadzadeh, S Hashemi, R Khayami IEEE transactions on emerging topics in computing 8 (2), 341-351, 2017 | 237 | 2017 |
Medical image registration using deep neural networks: a comprehensive review HR Boveiri, R Khayami, R Javidan, A Mehdizadeh Computers & Electrical Engineering 87, 106767, 2020 | 184 | 2020 |
DRTHIS: Deep ransomware threat hunting and intelligence system at the fog layer S Homayoun, A Dehghantanha, M Ahmadzadeh, S Hashemi, R Khayami, ... Future Generation Computer Systems 90, 94-104, 2019 | 173 | 2019 |
An efficient Swarm-Intelligence approach for task scheduling in cloud-based internet of things applications HR Boveiri, R Khayami, M Elhoseny, M Gunasekaran Journal of Ambient Intelligence and Humanized Computing 10, 3469-3479, 2019 | 162 | 2019 |
A novel end‐to‐end deep learning scheme for classifying multi‐class motor imagery electroencephalography signals A Hassanpour, M Moradikia, H Adeli, SR Khayami, P Shamsinejadbabaki Expert Systems 36 (6), e12494, 2019 | 150 | 2019 |
BoTShark: A deep learning approach for botnet traffic detection S Homayoun, M Ahmadzadeh, S Hashemi, A Dehghantanha, R Khayami Cyber Threat Intelligence, 137-153, 2018 | 102 | 2018 |
Network traffic classification using machine learning techniques over software defined networks MR Parsaei, MJ Sobouti, R Javidan International Journal of Advanced Computer Science and Applications 8 (7), 2017 | 100 | 2017 |
AI4SAFE-IoT: An AI-powered secure architecture for edge layer of Internet of things H HaddadPajouh, R Khayami, A Dehghantanha, KKR Choo, RM Parizi Neural Computing and Applications 32 (20), 16119-16133, 2020 | 95 | 2020 |
Intelligent OS X malware threat detection with code inspection HH Pajouh, A Dehghantanha, R Khayami, KKR Choo Journal of Computer Virology and Hacking Techniques 14, 213-223, 2018 | 73 | 2018 |
Qualitative characteristics of enterprise architecture R Khayami Procedia Computer Science 3, 1277-1282, 2011 | 59 | 2011 |
Medical image registration using unsupervised deep neural network: A scoping literature review S Abbasi, M Tavakoli, HR Boveiri, MAM Shirazi, R Khayami, H Khorasani, ... Biomedical Signal Processing and Control 73, 103444, 2022 | 49 | 2022 |
Using COBIT and ITIL frameworks to establish the alignment of business and IT organizations as one of the critical success factors in ERP implementation R Parvizi, F Oghbaei, SR Khayami The 5th conference on information and knowledge technology, 274-278, 2013 | 42 | 2013 |
Preprocessing breast cancer data to improve the data quality, diagnosis procedure, and medical care services Z Sajjadnia, R Khayami, MR Moosavi Cancer Informatics 19, 1176935120917955, 2020 | 23 | 2020 |
CYRUS 2D simulation team description paper 2014 R Khayami, N Zare, M Karimi, P Mahor, A Afshar, MS Najafi, M Asadi, ... RoboCup 2014 Symposium and Competitions: Team description papers, 2014 | 22 | 2014 |
Telesurgery QoS improvement over SDN based on a Type‐2 fuzzy system and enhanced cuckoo optimization algorithm MR Parsaei, HR Boveiri, R Javidan, R Khayami International Journal of Communication Systems 33 (11), e4426, 2020 | 15 | 2020 |
An intelligent hybrid approach for task scheduling in cluster computing environments as an infrastructure for biomedical applications HR Boveiri, R Javidan, R Khayami Expert Systems 38 (1), e12536, 2021 | 10 | 2021 |
Intelligent os x malware threat detection with code inspection H HaddadPajouh, A Dehghantanha, R Khayami, RKK Choo Journal of Computer Virology and Hacking Techniques 14 (3), 2017 | 10 | 2017 |
M. karimi, p. mahor, f. tekara, e. asali, m. fatehi, cyrus soccer 2d simulation team description paper 2013 R Khayami, N Zare, H Zolanvar The 17th annual RoboCup International Symposium, The Netherlands, Eindhoven, 2013 | 10 | 2013 |