Volgen
somayeh soltani
Titel
Geciteerd door
Geciteerd door
Jaar
A survey on real world botnets and detection mechanisms
S Soltani, SAH Seno, M Nezhadkamali, R Budiarto
International Journal of Information and Network Security 3 (2), 116, 2014
502014
A survey on digital evidence collection and analysis
S Soltani, SAH Seno
2017 7th International Conference on Computer and Knowledge Engineering …, 2017
482017
A formal model for event reconstruction in digital forensic investigation
S Soltani, SAH Seno
Digital Investigation 30, 148-160, 2019
282019
Event reconstruction using temporal pattern of file system modification
S Soltani, SAH Seno, H Sadoghi Yazdi
IET Information Security 13 (3), 201-212, 2019
122019
Android malware detection based on overlapping of static features
M Nezhadkamali, S Soltani, SAH Seno
2017 7th International Conference on Computer and Knowledge Engineering …, 2017
92017
Developing software signature search engines using paragraph vector model: a triage approach for digital forensics
S Soltani, SAH Seno, R Budiarto
IEEE Access 9, 55814-55832, 2021
52021
Detecting the software usage on a compromised system: A triage solution for digital forensics
S Soltani, SAH Seno
Forensic Science International: Digital Investigation 44, 301484, 2023
12023
Robust Authentication and Session Key Agreement Protocol for Satellite Communications
S Soltani, SA Hosseini Seno, J Rejito, R Budiarto
CMC-Computers, Materials & Continua 71 (3), 5891–5910, 2022
12022
A Deep Neural Network Architecture for Intrusion Detection in Software-Defined Networks
S Jafari Horestani, S Soltani, SA Hosseini Seno
Computer and Knowledge Engineering 5 (2), 31-44, 2022
2022
Separating Indexes from Data: A Distributed Scheme for Secure Database Outsourcing
S Soltani, MA Hadavi, R Jalili
The ISC International Journal of Information Security (ISeCure) 3 (2), 121-133, 2011
2011
ISeCure
S Soltani, MA Hadavi, R Jalili
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–11