Volgen
Mohsen Rezvani
Mohsen Rezvani
Geverifieerd e-mailadres voor cse.unsw.edu.au - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks
M Rezvani, A Ignatovic, E Bertino, S Jha
IEEE Transactions on Dependable and Secure Computing, 1-1, 2014
2172014
MalwareMonitor: An SDN-based framework for securing large networks
Z Abaid, M Rezvani, S Jha
Proceedings of the 2014 CoNEXT on Student Workshop, 40-42, 2014
292014
Interdependent security risk analysis of hosts and flows
M Rezvani, V Sekulic, A Ignjatovic, E Bertino, S Jha
IEEE Transactions on Information Forensics and Security 10 (11), 2325-2339, 2015
272015
ResBCDU-Net: a deep learning framework for lung CT image segmentation
Y Jalali, M Fateh, M Rezvani, V Abolghasemi, MH Anisi
Sensors 21 (1), 268, 2021
252021
Deep recurrent–convolutional neural network for classification of simultaneous EEG–fNIRS signals
H Ghonchi, M Fateh, V Abolghasemi, S Ferdowsi, M Rezvani
IET Signal Processing 14 (3), 142-153, 2020
202020
Routing-aware and malicious node detection in a concealed data aggregation for WSNs
W Alghamdi, M Rezvani, H Wu, SS Kanhere
ACM Transactions on Sensor Networks (TOSN) 15 (2), 1-20, 2019
182019
Analyzing XACML policies using answer set programming
M Rezvani, D Rajaratnam, A Ignjatovic, M Pagnucco, S Jha
International Journal of Information Security 18 (4), 465-479, 2019
172019
A provenance-aware multi-dimensional reputation system for online rating systems
M Rezvani, A Ignjatovic, E Bertino
ACM Transactions on Internet Technology (TOIT) 18 (4), 1-20, 2018
172018
Provenance-aware security risk analysis for hosts and network flows
M Rezvani, A Ignjatovic, E Bertino, S Jha
2014 IEEE Network Operations and Management Symposium (NOMS), 1-8, 2014
162014
A robust iterative filtering technique for wireless sensor networks in the presence of malicious attacks
M Rezvani, A Ignjatovic, E Bertino, S Jha
Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems, 1-2, 2013
162013
An email-based high capacity text steganography using repeating characters
M Fateh, M Rezvani
International Journal of Computers and Applications 43 (3), 226-232, 2021
142021
Assessment methodology for anomaly-based intrusion detection in cloud computing
M Rezvani
Journal of AI and Data Mining 6 (2), 387-397, 2018
132018
Analyzing and resolving anomalies in firewall security policies based on propositional logic
M Rezvani, R Aryan
2009 IEEE 13th International Multitopic Conference, 1-7, 2009
132009
A new method of coding for steganography based on LSB matching revisited
M Fateh, M Rezvani, Y Irani
Security and Communication Networks 2021, 2021
122021
Anomaly-free policy composition in software-defined networks
M Rezvani, A Ignjatovic, M Pagnucco, S Jha
2016 IFIP Networking Conference (IFIP Networking) and Workshops, 28-36, 2016
122016
A collaborative reputation system based on credibility propagation in WSNs
M Rezvani, A Ignjatovic, E Bertino, S Jha
2015 IEEE 21st International Conference on Parallel and Distributed Systems …, 2015
112015
Method for providing secure and private fine-grained access to outsourced data
M Jahan, M Rezvani, A Seneviratne, S Jha
2015 IEEE 40th Conference on Local Computer Networks (LCN), 406-409, 2015
92015
Specification and verification of security policies in firewalls
R Jalili, M Rezvani
Eurasian Conference on Information and Communication Technology, 154-163, 2002
92002
A randomized reputation system in the presence of unfair ratings
M Rezvani, M Rezvani
ACM Transactions on Management Information Systems (TMIS) 11 (1), 1-16, 2020
82020
Spatio-temporal deep learning for EEG-fNIRS brain computer interface
H Ghonchi, M Fateh, V Abolghasemi, S Ferdowsi, M Rezvani
2020 42nd Annual International Conference of the IEEE Engineering in …, 2020
72020
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20