Volgen
Reza Ebrahimi Atani
Reza Ebrahimi Atani
Associate Professor of Computer Engineering, University of Guilan
Geverifieerd e-mailadres voor guilan.ac.ir - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
A Survey of Credit Card Fraud Detection Techniques: Data and Technique Oriented Perspective
AHM Samaneh Sorournejad, Zahra Zojaji, Reza Ebrahimi Atani
arXiv preprint arXiv:1611.06439, 2016
1492016
A Comparison of Link Layer Attacks on Wireless Sensor Networks
Reza Ebrahimi Atani, Hossein Jadidoleslamy, Shahriar Mohammadi
Journal of Information Security 2 (2), 69-84, 2011
109*2011
A cluster-based vehicular cloud architecture with learning-based resource management
HR Arkian, RE Atani, A Diyanat, A Pourkhalili
The Journal of Supercomputing 71, 1401-1426, 2015
1022015
RTECA: Real time episode correlation algorithm for multi-step attack scenarios detection
AA Ramaki, M Amini, RE Atani
computers & security 49, 206-219, 2015
912015
A novel image encryption algorithm based on hash function
SM Seyedzade, S Mirzakuchaki, RE Atani
2010 6th Iranian Conference on Machine Vision and Image Processing, 1-6, 2010
712010
Cluster-based traffic information generalization in vehicular ad-hoc networks
HR Arkian, RE Atani, A Pourkhalili, S Kamali
Vehicular communications 1 (4), 197-207, 2014
702014
Ideal theory in commutative semirings
R EbrahimiAtani, SE Atani
Buletinul Academiei de Ştiinţe a Moldovei. Matematica 57 (2), 14-23, 2008
622008
A survey of image spamming and filtering techniques
A Attar, RM Rad, RE Atani
Artificial Intelligence Review 40, 71-105, 2013
562013
A new fast and simple image encryption algorithm using scan patterns and XOR
RM Rad, A Attar, RE Atani
International Journal of Signal Processing, Image Processing and Pattern …, 2013
512013
On subsemimodules of semimodules
R EbrahimiAtani, SE Atani
Buletinul Academiei de Ştiinţe a Moldovei. Matematica 63 (2), 20-30, 2010
482010
A Stable Clustering Scheme Based on Adaptive Multiple Metric in Vehicular Ad-hoc Networks.
HR Arkian, RE Atani, A Pourkhalili, S Kamali
J. Inf. Sci. Eng. 31 (2), 361-386, 2015
392015
A new efficient authenticated multiple-key exchange protocol from bilinear pairings
MS Farash, MA Attari, RE Atani, M Jami
Computers & Electrical Engineering 39 (2), 530-541, 2013
372013
Using location based encryption to improve the security of data access in cloud computing
MS Abolghasemi, MM Sefidab, RE Atani
2013 international conference on advances in computing, communications and …, 2013
342013
A survey of IT early warning systems: architectures, challenges, and solutions
AA Ramaki, RE Atani
Security and Communication Networks 9 (17), 4751-4776, 2016
322016
Application of dominating sets in wireless sensor networks
AH Karbasi, RE Atani
International Journal of Security and Its Applications 7 (4), 185-202, 2013
292013
A Comparison of Routing Attacks on Wireless Sensor Networks
S Mohammadi, RE Atani, H Jadidoleslamy
Journal of Information Assurance and Security 6, 195-215, 2011
292011
FcVcA: A fuzzy clustering-based vehicular cloud architecture
HR Arkian, RE Atani, S Kamali
2014 7th international workshop on communication technologies for vehicles …, 2014
272014
Structural‐based tunneling: preserving mutual anonymity for circular P2P networks
A Naghizadeh, S Berenjian, E Meamari, RE Atani
International Journal of Communication Systems 29 (3), 602-619, 2016
262016
ILTRU: An NTRU-like public key cryptosystem over ideal lattices
AH Karbasi, RE Atani
Cryptology ePrint Archive, 2015
262015
SPKT: Secure Port Knock-Tunneling, an enhanced port security authentication mechanism
P Mehran, EA Reza, B Laleh
2012 IEEE Symposium on Computers & Informatics (ISCI), 145-149, 2012
242012
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20