Reza Ebrahimi Atani
AuthID: R-00K-PDW
21
TITLE: A low-cost infrared-optical head tracking solution for virtual 3D audio environment using the Nintendo Wii-remote
AUTHORS: Yashar Deldjoo; Reza Ebrahimi Atani;
PUBLISHED: 2016, SOURCE: Entertain. Comput., VOLUME: 12
AUTHORS: Yashar Deldjoo; Reza Ebrahimi Atani;
PUBLISHED: 2016, SOURCE: Entertain. Comput., VOLUME: 12
INDEXED IN:
DBLP

IN MY:
DBLP

22
TITLE: Structural-based tunneling: preserving mutual anonymity for circular P2P networks
AUTHORS: Alireza Naghizadeh; Samaneh Berenjian; Ehsan Meamari; Reza Ebrahimi Atani;
PUBLISHED: 2016, SOURCE: Int. J. Commun. Syst., VOLUME: 29, ISSUE: 3
AUTHORS: Alireza Naghizadeh; Samaneh Berenjian; Ehsan Meamari; Reza Ebrahimi Atani;
PUBLISHED: 2016, SOURCE: Int. J. Commun. Syst., VOLUME: 29, ISSUE: 3
INDEXED IN:
DBLP

IN MY:
DBLP

23
TITLE: Projective plane-based key pre-distribution by key copying and exchanging based on connected dominating set in distributed wireless sensor networks
AUTHORS: Amir Hassani Karbasi; Reza Ebrahimi Atani;
PUBLISHED: 2016, SOURCE: Int. J. Inf. Commun. Technol., VOLUME: 9, ISSUE: 4
AUTHORS: Amir Hassani Karbasi; Reza Ebrahimi Atani;
PUBLISHED: 2016, SOURCE: Int. J. Inf. Commun. Technol., VOLUME: 9, ISSUE: 4
INDEXED IN:
DBLP

IN MY:
DBLP

24
TITLE: A novel key management scheme for heterogeneous sensor networks based on the position of nodes
AUTHORS: Taha Yasin Rezapour; Reza Ebrahimi Atani; Meer Soheil Abolghasemi;
PUBLISHED: 2016, SOURCE: ISC Int. J. Inf. Secur., VOLUME: 8, ISSUE: 2
AUTHORS: Taha Yasin Rezapour; Reza Ebrahimi Atani; Meer Soheil Abolghasemi;
PUBLISHED: 2016, SOURCE: ISC Int. J. Inf. Secur., VOLUME: 8, ISSUE: 2
INDEXED IN:
DBLP

IN MY:
DBLP

25
TITLE: C-trust: A trust management system to improve fairness on circular P2P networks
AUTHORS: Alireza Naghizadeh; Behrooz Razeghi; Ehsan Meamari; Majid Hatamian; Reza Ebrahimi Atani;
PUBLISHED: 2016, SOURCE: Peer-to-Peer Netw. Appl., VOLUME: 9, ISSUE: 6
AUTHORS: Alireza Naghizadeh; Behrooz Razeghi; Ehsan Meamari; Majid Hatamian; Reza Ebrahimi Atani;
PUBLISHED: 2016, SOURCE: Peer-to-Peer Netw. Appl., VOLUME: 9, ISSUE: 6
INDEXED IN:
DBLP

IN MY:
DBLP

26
TITLE: On detecting unidentified network traffic using pattern-based random walk
AUTHORS: Mehran Alidoost Nia; Reza Ebrahimi Atani; Benjamin Fabian; Eduard Babulak;
PUBLISHED: 2016, SOURCE: Secur. Commun. Networks, VOLUME: 9, ISSUE: 16
AUTHORS: Mehran Alidoost Nia; Reza Ebrahimi Atani; Benjamin Fabian; Eduard Babulak;
PUBLISHED: 2016, SOURCE: Secur. Commun. Networks, VOLUME: 9, ISSUE: 16
INDEXED IN:
DBLP

IN MY:
DBLP

27
TITLE: A survey of IT early warning systems: architectures, challenges, and solutions
AUTHORS: Ali Ahmadian Ramaki; Reza Ebrahimi Atani;
PUBLISHED: 2016, SOURCE: Secur. Commun. Networks, VOLUME: 9, ISSUE: 17
AUTHORS: Ali Ahmadian Ramaki; Reza Ebrahimi Atani;
PUBLISHED: 2016, SOURCE: Secur. Commun. Networks, VOLUME: 9, ISSUE: 17
INDEXED IN:
DBLP

IN MY:
DBLP

28
TITLE: Structural-based tunneling: Preserving mutual anonymity for circular P2P networks
AUTHORS: Naghizadeh A.; Berenjian S.; Meamari E.; Ebrahimi E Atani;
PUBLISHED: 2016, SOURCE: International Journal of Communication Systems, VOLUME: 29, ISSUE: 3
AUTHORS: Naghizadeh A.; Berenjian S.; Meamari E.; Ebrahimi E Atani;
PUBLISHED: 2016, SOURCE: International Journal of Communication Systems, VOLUME: 29, ISSUE: 3
INDEXED IN:
Scopus

IN MY:
ORCID

29
TITLE: A software solution for realtime malware detection in distributed systems
AUTHORS: Mehran Alidoost Nia; Seyed Kamyar Kiaei; Reza Ebrahimi Atani; Benjamin Fabian;
PUBLISHED: 2016, SOURCE: 12th International ISC Conference on Information Security and Cryptology, ISCISC 2015
AUTHORS: Mehran Alidoost Nia; Seyed Kamyar Kiaei; Reza Ebrahimi Atani; Benjamin Fabian;
PUBLISHED: 2016, SOURCE: 12th International ISC Conference on Information Security and Cryptology, ISCISC 2015
INDEXED IN:
Scopus

IN MY:
ORCID

30
TITLE: Preface
AUTHORS: Reza Ebrahimi Atani;
PUBLISHED: 2016, SOURCE: 12th International ISC Conference on Information Security and Cryptology, ISCISC 2015
AUTHORS: Reza Ebrahimi Atani;
PUBLISHED: 2016, SOURCE: 12th International ISC Conference on Information Security and Cryptology, ISCISC 2015
INDEXED IN:
Scopus

IN MY:
ORCID
