TOPVISOR: Two‐level controller‐based approach for service advertisement and discovery in vehicular cloud network

Farhoud Jafari Kaleibar , Maghsoud Abbaspour
International Journal of Communication Systems 33 ( 3)

3
2020
On the resilience of P2P botnet footprints in the presence of legitimate P2P traffic

Fateme Faraji Daneshgar , Maghsoud Abbaspour
International Journal of Communication Systems 32 ( 13)

1
2019
Securing BitTorrent using a new reputation-based trust management system

Behrooz Shafiee Sarjaz , Maghsoud Abbaspour
Peer-to-peer Networking and Applications 6 ( 1) 86 -100

10
2013
An Energy-Efficient and High-Quality MAC Protocol for Image Transmission in Wireless Sensor Networks

Hadi S. Aghdasi , Maghsoud Abbaspour , Mohsen Ebrahimi Moghadam
ieee international conference on circuits and systems for communications 838 -842

6
2008
FoV-Clustering as a solution to a novel camera node activation problem in WVSNs

Hadi S. Aghdasi , Sara Nasseri , Maghsoud Abbaspour
ifip wireless days 1 -5

1
2010
Behavioral Entropy Towards Detection of Metamorphic Malwares

Kambiz Vahedi , Maghsoud Abbaspour , Khadijeh Afhamisisi , Mohammad Rashidnejad
international conference on computer and knowledge engineering

2019
4
2013
A reliable and timely medium access control protocol for vehicular ad hoc networks

Lida Rezazade , Hadi S. Aghdasi , Seyed Ali Ghorashi , Maghsoud Abbaspour
ubiquitous computing 12 ( 4) 216 -224

2
2013
An adaptive CSMA/TDMA hybrid MAC for energy and throughput improvement of wireless sensor networks

Mohammad Hossein Sedighi Gilani , Iman Sarrafi , Maghsoud Abbaspour
ad hoc networks 11 ( 4) 1297 -1304

115
2013
Dual-Path Peer-to-Peer Anonymous Approach

Ehsan Saboori , Maghsoud Abbaspour
international conference on parallel and distributed systems 835 -838

1
2010
Friendship preference: Scalable and robust category of features for social bot detection

Samaneh Hosseini Moghaddam , Maghsoud Abbaspour
IEEE Transactions on Dependable and Secure Computing 20 ( 2) 1516 -1528

1
2022
Optimal placement of frequently accessed IPs in mesh NoCs

Reza Moraveji , Hamid Sarbazi-Azad , Maghsoud Abbaspour
Advances in Computer Systems Architecture: 12th Asia-Pacific Conference, ACSAC 2007, Seoul, Korea, August 23-25, 2007. Proceedings 12 126 -138

6
2007
APDL: A Processor Description Language For Design Space Exploration of Embedded Processors.

Nima Honarmand , Hasan Sohofi , Maghsoud Abbaspour , Zainalabedin Navabi
FDL 50 -55

3
2007
Adaptive Anomaly-Based Intrusion Detection System Using Fuzzy Controller.

Farzaneh Geramiraz , Amir Saman Memaripour , Maghsoud Abbaspour
Int. J. Netw. Secur. 14 ( 6) 352 -361

36
2012
RAAS: a reliable analyzer and archiver for snort intrusion detection system

Mahboobeh Soleimani , Ehsan Khosrowshahi Asl , Mina Doroud , Morteza Damanafshan
259 -263

18
2007
GASANT: An ant-inspired least-cost QoS multicast routing approach based on genetic and simulated annealing algorithms

Morteza Damanafshan , Ehsan Khosrowshahi-Asl , Maghsoud Abbaspour
International Journal of Computers Communications & Control 7 ( 3) 417 -431

5
2012
Automatic Porting of Binary File Descriptor Library

Maghsoud Abbaspour , Jianwen Zhu
System-on-Chip for Real-Time Applications 193 -202

4
2003
Does homophily make socialbots more influential? Exploring infiltration strategies

Samaneh Hosseini Moghaddam , Mandana Khademi , Maghsoud Abbaspour
arXiv preprint arXiv:1903.06827

3
2019
Integrated evacuation and rescue management system in response to fire incidents

Niloofar Didar , Maghsoud Abbaspour
European Journal of Engineering and Technology Research 8 ( 1) 1 -12

2
2023