71
TITLE: Game theory-based and heuristic algorithms for parking-lot search
AUTHORS: Ayub Mamandi; Saleh Yousefi; Reza Ebrahimi Atani;
PUBLISHED: 2015, SOURCE: 2015 International Symposium on Computer Science and Software Engineering (CSSE)
INDEXED IN: CrossRef: 6
IN MY: ORCID
72
TITLE: A cluster-based vehicular cloud architecture with learning-based resource management
AUTHORS: Hamid Reza Arkian; Reza Ebrahimi Atani; Abolfazl Diyanat; Atefe Pourkhalili;
PUBLISHED: 2015, SOURCE: The Journal of Supercomputing, VOLUME: 71, ISSUE: 4
INDEXED IN: CrossRef: 64
IN MY: ORCID
73
TITLE: RTECA: Real time episode correlation algorithm for multi-step attack scenarios detection
AUTHORS: Ali Ahmadian Ramaki; Morteza Amini; Reza Ebrahimi Atani;
PUBLISHED: 2015, SOURCE: Computers & Security, VOLUME: 49
INDEXED IN: CrossRef: 65
IN MY: ORCID
74
TITLE: C-trust: A trust management system to improve fairness on circular P2P networks
AUTHORS: Alireza Naghizadeh; Behrooz Razeghi; Ehsan Meamari; Majid Hatamian; Reza Ebrahimi Atani;
PUBLISHED: 2015, SOURCE: Peer-to-Peer Networking and Applications, VOLUME: 9, ISSUE: 6
INDEXED IN: CrossRef: 9
IN MY: ORCID
75
TITLE: Application of connected dominating sets in wildfire detection based on wireless sensor networks
AUTHORS: Saman Tahouri; Reza Ebrahimi Atani; Amir Hassani Karbasi; Yashar Deldjoo;
PUBLISHED: 2015, SOURCE: International Journal of Information Technology, Communications and Convergence, VOLUME: 3, ISSUE: 2
INDEXED IN: CrossRef: 1
IN MY: ORCID
76
TITLE: A software solution for realtime malware detection in distributed systems
AUTHORS: Mehran Alidoost Nia; Seyed Kamyar Kiaei; Reza Ebrahimi Atani; Benjamin Fabian;
PUBLISHED: 2015, SOURCE: 2015 12th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC)
INDEXED IN: CrossRef: 1
IN MY: ORCID
77
TITLE: Privacy enhancement in anonymous network channels using multimodality injection
AUTHORS: Mehran Alidoost Nia; Reza Ebrahimi Atani; Antonio Ruiz‐Martínez;
PUBLISHED: 2015, SOURCE: Security and Communication Networks, VOLUME: 8, ISSUE: 16
INDEXED IN: CrossRef: 6
IN MY: ORCID
78
TITLE: Structural‐based tunneling: preserving mutual anonymity for circular P2P networks
AUTHORS: Naghizadeh, A; Berenjian, S; Meamari, E; Ebrahimi E Atani;
PUBLISHED: 2015, SOURCE: International Journal of Communication Systems, VOLUME: 29, ISSUE: 3
INDEXED IN: CrossRef: 12
IN MY: ORCID
79
TITLE: Counter attack to free-riders: Filling a security hole in BitTorrent protocol
AUTHORS: Alireza Naghizadeh; Behrooz Razeghi; Iman Radmanesh; Majid Hatamian; Reza Ebrahimi Atani; Zoleikha Nadem Norudi;
PUBLISHED: 2015, SOURCE: 2015 IEEE 12th International Conference on Networking, Sensing and Control
INDEXED IN: CrossRef: 6
IN MY: ORCID
80
TITLE: A Cluster-Based Vehicular Cloud Architecture with Learning-Based Resource Management
AUTHORS: Hamid Reza Arkian; Reza Ebrahimi Atani; Atefe Pourkhalili;
PUBLISHED: 2014, SOURCE: IEEE 6th International Conference on Cloud Computing Technology and Science, CloudCom 2014, Singapore, December 15-18, 2014
INDEXED IN: DBLP
IN MY: DBLP
Page 8 of 22. Total results: 212.