An anomaly detection method to detect web attacks using stacked auto-encoder AM Vartouni, SS Kashi, M Teshnehlab 2018 6th Iranian Joint Congress on Fuzzy and Intelligent Systems (CFIS), 131-134, 2018 | 151 | 2018 |
Leveraging deep neural networks for anomaly‐based web application firewall A Moradi Vartouni, M Teshnehlab, S Sedighian Kashi IET Information Security 13 (4), 352-361, 2019 | 75 | 2019 |
Connectivity weakness impacts on coordination in wireless sensor and actor networks SS Kashi, M Sharifi IEEE communications surveys & tutorials 15 (1), 145-166, 2012 | 56 | 2012 |
An MDA-based modeling and design of service oriented architecture AT Rahmani, V Rafe, S Sedighian, A Abbaspour Computational Science–ICCS 2006: 6th International Conference, Reading, UK …, 2006 | 44 | 2006 |
A new approach to task allocation in wireless sensor actor networks H Momeni, M Sharifi, S Sedighian 2009 First International Conference on Computational Intelligence …, 2009 | 34 | 2009 |
Coverage rate calculation in wireless sensor networks S Sedighian Kashi, M Sharifi Computing 94, 833-856, 2012 | 32 | 2012 |
An efficient method for allocating resources in a cloud computing environment with a load balancing approach A Pourghaffari, M Barari, S Sedighian Kashi Concurrency and Computation: Practice and Experience 31 (17), e5285, 2019 | 31 | 2019 |
Energy provisioning in wireless rechargeable sensor networks with limited knowledge M Sheikhi, S Sedighian Kashi, Z Samaee Wireless Networks 25, 3531-3544, 2019 | 25 | 2019 |
Recharging sensor nodes using implicit actor coordination in wireless sensor actor networks M Sharifi, S Sedighian, M Kamali Wireless Sensor Network 2 (2), 123, 2010 | 22 | 2010 |
Area coverage of heterogeneous wireless sensor networks in support of Internet of Things demands S Sedighian Kashi Computing 101 (4), 363-385, 2019 | 21 | 2019 |
A reliable and delay-aware routing in RPL N Nobakht, SS Kashi, S Zokaei 2019 5th Conference on Knowledge Based Engineering and Innovation (KBEI …, 2019 | 18 | 2019 |
LAP: a lightweight authentication protocol for smart dust wireless sensor networks M Sharifi, SS Kashi, SP Ardakani 2009 International Symposium on Collaborative Technologies and Systems, 258-265, 2009 | 16 | 2009 |
SKEW: an efficient self key establishment protocol for wireless sensor networks M Sharifi, SP Ardakani, SS Kashi 2009 International Symposium on Collaborative Technologies and Systems, 250-257, 2009 | 14 | 2009 |
Auto-Encoder LSTM Methods for Anomaly-Based Web Application Firewall SSK Ali Moradi Vartouni, Soheil Mehralian, Mohammad Teshnehlab International Journal of Information and Communication Technology Research …, 2019 | 12* | 2019 |
A load balanced location service for location information management of multi-sink Wireless Sensor Networks S Sedighian Kashi Computing 100 (2), 93-117, 2018 | 12 | 2018 |
A distributed recovery mechanism for actor-actor connectivity in wireless sensor actor networks M Kamali, S Sedighian, M Sharifi 2008 International Conference on Intelligent Sensors, Sensor Networks and …, 2008 | 11 | 2008 |
Service requirements for actor-actor coordination through sensor nodes in wireless sensor actor networks S Sedighian, M Sharifi, SV Azhari, H Momeni 2008 International Conference on Innovations in Information Technology, 475-479, 2008 | 6 | 2008 |
A network intrusion detection approach at the edge of fog SO Azarkasb, SS Kashi, SH Khasteh 2021 26th International Computer Conference, Computer Society of Iran (CSICC …, 2021 | 5 | 2021 |
A distributed algorithm for restoring actor-actor connectivity in wireless sensor and actor networks A Zamanifar, M Sharifi, S Sedighian 2008 International Conference on Electronic Design, 1-6, 2008 | 5 | 2008 |
Saosa: Stable adaptive optimization for stacked auto-encoders A Moradi Vartouni, M Teshnehlab, S Sedighian Kashi Neural Processing Letters 52, 823-848, 2020 | 2 | 2020 |