An adaptive CSMA/TDMA hybrid MAC for energy and throughput improvement of wireless sensor networks MHS Gilani, I Sarrafi, M Abbaspour Ad Hoc Networks 11 (4), 1297-1304, 2013 | 129 | 2013 |
An energy-efficient and high-quality video transmission architecture in wireless video-based sensor networks HS Aghdasi, M Abbaspour, ME Moghadam, Y Samei Sensors 8 (8), 4529-4559, 2008 | 70 | 2008 |
An anomaly-based botnet detection approach for identifying stealthy botnets S Arshad, M Abbaspour, M Kharrazi, H Sanatkar 2011 IEEE International Conference on Computer Applications and Industrial …, 2011 | 56 | 2011 |
A static heuristic approach to detecting malware targets M Zakeri, F Faraji Daneshgar, M Abbaspour Security and Communication Networks 8 (17), 3015-3027, 2015 | 48 | 2015 |
Adaptive Anomaly-Based Intrusion Detection System Using Fuzzy Controller. F Geramiraz, AS Memaripour, M Abbaspour Int. J. Netw. Secur. 14 (6), 352-361, 2012 | 37 | 2012 |
Extracting fuzzy attack patterns using an online fuzzy adaptive alert correlation framework F Faraji Daneshgar, M Abbaspour Security and Communication Networks 9 (14), 2245-2260, 2016 | 32 | 2016 |
A density-aware probabilistic interest forwarding method for content-centric vehicular networks R Tizvar, M Abbaspour Vehicular Communications 23, 100216, 2020 | 29 | 2020 |
Retargetable binary utilities M Abbaspour, J Zhu Proceedings of the 39th annual Design Automation Conference, 331-336, 2002 | 26 | 2002 |
EMP-DSR: An enhanced multi-path dynamic source routing algorithm for MANETs based on ant colony optimization EK Asl, M Damanafshan, M Abbaspour, M Noorhosseini, K Shekoufandeh 2009 Third Asia International Conference on Modelling & Simulation, 692-697, 2009 | 25 | 2009 |
Friendship preference: Scalable and robust category of features for social bot detection SH Moghaddam, M Abbaspour IEEE Transactions on Dependable and Secure Computing 20 (2), 1516-1528, 2022 | 22 | 2022 |
Securing BitTorrent using a new reputation-based trust management system B Shafiee Sarjaz, M Abbaspour Peer-to-Peer Networking and Applications 6, 86-100, 2013 | 22 | 2013 |
ET-MAC: An energy-efficient and high throughput MAC protocol for wireless sensor networks HS Aghdasi, M Abbaspour 6th Annual Communication Networks and Services Research Conference (cnsr …, 2008 | 19 | 2008 |
Sensitivity analysis of static features for Android malware detection SH Moghaddam, M Abbaspour 2014 22nd Iranian conference on electrical engineering (ICEE), 920-924, 2014 | 17 | 2014 |
IFRP: an intrusion/fault tolerant routing protocol for increasing resiliency and reliability in wireless sensor networks H Nabizadeh, M Abbaspour International Journal of Ad Hoc and Ubiquitous Computing 14 (1), 52-69, 2013 | 17 | 2013 |
A novel STDMA MAC protocol for vehicular ad-hoc networks L Rezazade, HS Aghdasi, SA Ghorashi, M Abbaspour 2011 International Symposium on Computer Networks and Distributed Systems …, 2011 | 17 | 2011 |
Raas: A reliable analyzer and archiver for snort intrusion detection system M Soleimani, EK Asl, M Doroud, M Damanafshan, A Behzadi, ... Proceedings of the 2007 ACM symposium on Applied computing, 259-263, 2007 | 17 | 2007 |
TOPVISOR: Two‐level controller‐based approach for service advertisement and discovery in vehicular cloud network F Jafari Kaleibar, M Abbaspour International Journal of Communication Systems 33 (3), e4197, 2020 | 16 | 2020 |
ISEFF: an ID-based scalable and efficient distributed file sharing technique in vehicular ad hoc networks N Ahmadifard, H Nabizadeh, M Abbaspour Wireless personal communications 75, 821-841, 2014 | 16 | 2014 |
A two-phase sequential pattern mining framework to detect stealthy P2P botnets FF Daneshgar, M Abbaspour Journal of Information Security and Applications 55, 102645, 2020 | 15 | 2020 |
Usefulness of multicast routing protocols for vehicular Ad-hoc networks HS Aghdasi, N Torabi, A Rahmanzadeh, M Aminiazar, M Abbaspour 6th International Symposium on Telecommunications (IST), 459-463, 2012 | 14 | 2012 |