Security challenges in mobile ad hoc networks: A survey A Dorri, SR Kamel, E Kheirkhah arXiv preprint arXiv:1503.03233, 2015 | 99 | 2015 |
A hybrid face detection system using combination of appearance-based and feature-based methods ZS Tabatabaie, RW Rahmat, NIB Udzir, E Kheirkhah International Journal of Computer Science and Network Security 9 (5), 181-185, 2009 | 61 | 2009 |
An approach for transforming of relational databases to OWL ontology M Dadjoo, E Kheirkhah arXiv preprint arXiv:1502.05844, 2015 | 53 | 2015 |
An experimental study of ssh attacks by using honeypot decoys E Kheirkhah, SMP Amin, HAJ Sistani, H Acharya Indian Journal of Science and Technology 6 (12), 5567-5578, 2013 | 44 | 2013 |
An optimized semantic web service composition method based on clustering and ant colony algorithm NH Rostami, E Kheirkhah, M Jalali arXiv preprint arXiv:1402.2271, 2014 | 40 | 2014 |
Web services composition methods and techniques: A review NH Rostami, E Kheirkhah, M Jalali International Journal of Computer Science, Engineering & Information …, 2013 | 34 | 2013 |
Important factors in selecting requirements engineering techniques E Kheirkhah, A Deraman 2008 International Symposium on Information Technology 4, 1-5, 2008 | 33 | 2008 |
A hybrid face detection approach in color images with complex background E Kheirkhah, ZS Tabatabaie Indian Journal of Science and Technology 8 (1), 49-60, 2015 | 30 | 2015 |
A review of recent advances in quantum-inspired metaheuristics S Hakemi, M Houshmand, E KheirKhah, SA Hosseini Evolutionary Intelligence 17 (2), 627-642, 2024 | 29 | 2024 |
Web service discovery methods and techniques: A review S Pakari, E Kheirkhah, M Jalali Int. J. Comput. Sci. Eng. Inf. Technol 4 (1), 1-14, 2014 | 24 | 2014 |
Semantic web-based software engineering by automated requirements ontology generation in soa V Rastgoo, MS Hosseini, E Kheirkhah International Journal of Web & Semantic Technology 5 (2), 1, 2014 | 10 | 2014 |
A novel approach: A hybrid semantic matchmaker for service discovery in service oriented architecture S Pakari, E Kheirkhah, M Jalali International Journal of Network Security & Its Applications 6 (1), 37, 2014 | 10 | 2014 |
Classification of Routing Protocols in Wireless Sensor Networks F Azimiyan, E Kheirkhah, M Jalali International Review on Computers and Software 7 (4), 2012 | 7 | 2012 |
A framework for requirements engineering in end-user computing E Kheirkhah, A Deraman, ZS Tabatabaie 2009 WRI World Congress on Computer Science and Information Engineering 7 …, 2009 | 6 | 2009 |
Adaptive skin color classification technique for color-based face detection systems using integral image ZS Tabatabaie, RW Rahmat, NI Udzir, E Kheirihah International Review on Computers and Software 6 (1), 32-39, 2011 | 5 | 2011 |
AN ANALYSIS OF SECURITY CHALLENGES IN MOBILE AD HOC NETWORKS A Dorri, SR Kamel, E kheyrkhah The Sixth International Conference on Wireless & Mobile Networks, 2014 | 4 | 2014 |
Diagnosing Parkinson's Disease Using Movement Signal Mapping by Neural Network and Classifier Modulation H Nikandish, E Kheirkhah ETRI Journal 39 (6), 851-858, 2017 | 3 | 2017 |
Analysis of current requirements engineering techniques in end-user computing E Kheirthah, A Deraman International Review on Computers and Software 5 (6), 724-730, 2010 | 3 | 2010 |
Screen-Based prototyping: A conceptual framework E Kheirkhah, A Deraman, ZS Tabatabaie Information Technology Journal 8 (4), 558-564, 2009 | 3 | 2009 |
Requirements Engineering in End-User Computing: A review E Kheirkhah, A Deraman 2008 International Symposium on Information Technology 4, 1-8, 2008 | 2 | 2008 |