default search action
Mehdi Shajari
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j17]Mehdi Shajari, Hongxiang Geng, Kaixuan Hu, Alberto Leon-Garcia:
Tensor-Based Online Network Anomaly Detection and Diagnosis. IEEE Access 10: 85792-85817 (2022) - [d1]Mehdi Shajari, Hongxiang Geng, Kaixuan Hu, Alberto Leon-Garcia:
UGR'16 Tensor Time-Series Dataset. IEEE DataPort, 2022 - 2021
- [c18]Mojdeh Hemati, Mehdi Shajari:
Analysis of incentive mechanism in Repchain. CSICC 2021: 1-5 - [i2]Mohsen Rahnamaei, Saeid Tousi Saeidi, Siavash Khorsandi, Mehdi Shajari:
A Fair Model of Identity Information Exchange Leveraging Zero-Knowledge. CoRR abs/2106.14180 (2021) - 2020
- [j16]Sajjad Hosseinzadeh, Maryam Amirmazlaghani, Mehdi Shajari:
An aggregated statistical approach for network flood detection using Gamma-Normal mixture modeling. Comput. Commun. 152: 137-148 (2020) - [j15]Alireza Toroghi Haghighat, Mehdi Shajari:
Computation integrity assurance for emerging distributed computation outsourcing environments, the case of block withholding attack on Bitcoin pools. IET Inf. Secur. 14(5): 553-561 (2020) - [j14]Mohammad Mehdi Ahmadian, Mehdi Shajari, Mohammad Ali Shafiee:
Industrial control system security taxonomic framework with application to a comprehensive incidents survey. Int. J. Crit. Infrastructure Prot. 29: 100356 (2020) - [j13]Tina Tavizi, Mehdi Shajari:
A language and a pattern system for temporal property specification: advanced metering infrastructure case study. Int. J. Inf. Sec. 19(6): 695-710 (2020) - [j12]Alireza Toroghi Haghighat, Mehdi Shajari:
Service Integrity Assurance for Distributed Computation Outsourcing. IEEE Trans. Serv. Comput. 13(6): 1166-1179 (2020)
2010 – 2019
- 2019
- [j11]Mohammad Riazati, Mehdi Shajari, Siavash Khorsandi:
An incentive mechanism to promote honesty among seller agents in electronic marketplaces. Electron. Commer. Res. 19(1): 231-255 (2019) - [j10]Alireza Toroghi Haghighat, Mehdi Shajari:
Block withholding game among bitcoin mining pools. Future Gener. Comput. Syst. 97: 482-491 (2019) - [j9]Saeed Seifollahi, Mehdi Shajari:
Word sense disambiguation application in sentiment analysis of news headlines: an applied approach to FOREX market prediction. J. Intell. Inf. Syst. 52(1): 57-83 (2019) - [c17]Mohammad Salar Arbabi, Mehdi Shajari:
Decentralized and secure delivery network of IoT update files based on ethereum smart contracts and blockchain technology. CASCON 2019: 110-119 - 2018
- [j8]Vahid Zangeneh, Mehdi Shajari:
A cost-sensitive move selection strategy for moving target defense. Comput. Secur. 75: 72-91 (2018) - [j7]Mahdiyeh Barzegar, Mehdi Shajari:
Attack scenario reconstruction using intrusion semantics. Expert Syst. Appl. 108: 119-133 (2018) - [j6]Sanaz Nami, Mehdi Shajari:
Cost-sensitive payment card fraud detection based on dynamic random forest and k-nearest neighbors. Expert Syst. Appl. 110: 381-392 (2018) - 2016
- [j5]Masoud Mansoury, Mehdi Shajari:
Improving recommender systems' performance on cold-start users and controversial items by a new similarity model. Int. J. Web Inf. Syst. 12(2): 126-149 (2016) - [c16]Samaneh Berenjian, Mehdi Shajari, Nadieh Farshid, Majid Hatamian:
Intelligent Automated Intrusion Response System based on fuzzy decision making and risk assessment. IEEE Conf. on Intelligent Systems 2016: 709-714 - 2015
- [j4]Maryam Shahpasand, Mehdi Shajari, Seyed Alireza Hashemi Golpaygani, Hoda Ghavamipoor:
A comprehensive security control selection model for inter-dependent organizational assets structure. Inf. Comput. Secur. 23(2): 218-242 (2015) - 2014
- [j3]Mohammad Amin Morid, Mehdi Shajari, Ali Reza Hashemi:
Defending recommender systems by influence analysis. Inf. Retr. 17(2): 137-152 (2014) - [i1]Mohsen Raeesi, Mohammad Amin Morid, Mehdi Shajari:
Trust Evaluation using an Improved Context Similarity Measurement. CoRR abs/1404.4592 (2014) - 2012
- [j2]Mohammad Amin Morid, Mehdi Shajari:
An enhanced e-commerce trust model for community based centralized systems. Electron. Commer. Res. 12(4): 409-427 (2012) - [j1]Alireza Shameli-Sendi, Masoume Jabbarifar, Michel R. Dagenais, Mehdi Shajari:
System Health Monitoring Using a Novel Method: Security Unified Process. J. Comput. Networks Commun. 2012: 151205:1-151205:20 (2012) - [c15]Tina Tavizi, Mehdi Shajari, Peyman Dodangeh:
A Usage Control Based Architecture for Cloud Environments. IPDPS Workshops 2012: 1534-1539 - [c14]Mohsen Raeesi, Mehdi Shajari:
An enhanced significance weighting approach for collaborative filtering. IST 2012: 1165-1169 - 2011
- [c13]Mohammad Amin Morid, Mehdi Shajari, Alireza Hashemi Golpayegani:
Who are the most influential users in a recommender system? ICEC 2011: 19:1-19:5 - [c12]Ghazaleh Aghili, Mehdi Shajari, Shahram Khadivi, Mohammad Amin Morid:
Using Genre Interest of Users to Detect Profile Injection Attacks in Movie Recommender Systems. ICMLA (1) 2011: 49-52 - 2010
- [c11]Mohammad Hasan Samadani, Mehdi Shajari:
Path reduction in complex grid service provision. ICEC 2010: 88-93 - [c10]Mohammad Hasan Samadani, Mehdi Shajari, Mohammad Mehdi Ahaniha:
A survey on mobile digital signature models. ICEC 2010: 141-145 - [c9]Mohammad Hasan Samadani, Mehdi Shajari, Mohammad Mehdi Ahaniha:
Self-Proxy Mobile Signature: A New Client-Based Mobile Signature Model. AINA Workshops 2010: 437-442 - [c8]Mona Hosseinkhani Loorak, Ebrahim Tarameshloo, Mehdi Shajari:
AMVPayword: Secure and Efficient Anonymous Payword-Based Micropayment Scheme. CIS 2010: 551-555 - [c7]Mohammad Hasan Samadani, Mehdi Shajari:
Mobile Partial Identity Management: The Non-repudiable Minimal Mobile Identity Model. FGIT 2010: 439-449 - [c6]Salman Niksefat, Mohammad Mehdi Ahaniha, Babak Sadeghiyan, Mehdi Shajari:
Toward Specification-Based Intrusion Detection for Web Applications. RAID 2010: 510-511
2000 – 2009
- 2009
- [c5]Morteza Sargolzaei Javan, Mehdi Shajari:
Flash payment: payment using flash disks. ICEC 2009: 346-351 - [c4]Golnaz Vakili, Mehdi Shajari:
An Enhanced Infrastructure for Peer-to-Peer Intrusion Detection Systems. ICECS 2009: 364-368 - 2005
- [c3]Mehdi Shajari, Ali A. Ghorbani:
Agent-oriented Design for Network Survivability. ISDA 2005: 166-171 - 2004
- [c2]Mehdi Shajari, Ali A. Ghorbani:
Application of Belief-Desire-Intention Agents in Intrusion Detection & Response. PST 2004: 181-191 - 2003
- [c1]Mehdi Shajari, Ali A. Ghorbani:
Using Fuzzy System to Manage False Alarms in Intrusion Detection. SEC 2003: 241-252
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-19 21:55 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint