Abbas Rasoolzadegan Barforoush

Orcid: 0000-0001-8668-5650

Affiliations:
  • Ferdowsi University of Mashhad, Mashhad, Iran


According to our database1, Abbas Rasoolzadegan Barforoush authored at least 28 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
CAPTAIN: Community-based Advanced Persistent Threat Analysis in IT Networks.
Int. J. Crit. Infrastructure Prot., September, 2023

Towards Event Aggregation for Reducing the Volume of Logged Events During IKC Stages of APT Attacks.
ISC Int. J. Inf. Secur., July, 2023

Probabilistic detection of GoF design patterns.
J. Supercomput., 2023

A Meta-Learning Approach for Software Refactoring.
CoRR, 2023

Edge computing: A systematic mapping study.
Concurr. Comput. Pract. Exp., 2023

2022
A Feature-Based Method for Detecting Design Patterns in Source Code.
Symmetry, 2022

A new method for detecting various variants of GoF design patterns using conceptual signatures.
Softw. Qual. J., 2022

A two-stage location-sensitive and user preference-aware recommendation system.
Expert Syst. Appl., 2022

A Pattern-aware Design and Implementation Guideline for Microservice-based Systems.
Proceedings of the 27th International Computer Conference, Computer Society of Iran, 2022

2021
A new machine learning-based method for android malware detection on imbalanced dataset.
Multim. Tools Appl., 2021

Cloud Broker: A Systematic Mapping Study.
CoRR, 2021

2020
Security patterns: A systematic mapping study.
J. Comput. Lang., 2020

Software defect prediction using over-sampling and feature extraction based on Mahalanobis distance.
J. Supercomput., 2020

Bad smell detection using quality metrics and refactoring opportunities.
J. Softw. Evol. Process., 2020

2019
Quality-centric security pattern mutations.
Softw. Qual. J., 2019

A new benchmark for evaluating pattern mining methods based on the automatic generation of testbeds.
Inf. Softw. Technol., 2019

2018
Delay-Aware Resource Provisioning for Cost-Efficient Cloud Gaming.
IEEE Trans. Circuits Syst. Video Technol., 2018

A systematic review on intrusion detection based on the Hidden Markov Model.
Stat. Anal. Data Min., 2018

A Systematic Mapping Study on Intrusion Alert Analysis in Intrusion Detection Systems.
ACM Comput. Surv., 2018

2017
Design pattern detection based on the graph theory.
Knowl. Based Syst., 2017

The state of the art on design patterns: A systematic mapping of the literature.
J. Syst. Softw., 2017

A secure authentication and key agreement scheme for roaming service with user anonymity.
Int. J. Commun. Syst., 2017

2016
Causal knowledge analysis for detecting and modeling multi-step attacks.
Secur. Commun. Networks, 2016

Design of a Secure Authentication and Key Agreement Scheme Preserving User Privacy Usable in Telecare Medicine Information Systems.
J. Medical Syst., 2016

2015
A new approach to active rule scheduling.
Eng. Appl. Artif. Intell., 2015

2014
Reliable yet flexible software through formal model transformation (rule definition).
Knowl. Inf. Syst., 2014

2011
A New Approach to Reliable, yet Flexible Software.
Proceedings of the CAiSE Doctoral Consortium 2011, London, United Kingdom, June 21, 2011, 2011

2008
A New Rule Scheduling Approach based on Estimation of Rule Execution Probability in Active Database.
J. Convergence Inf. Technol., 2008


  Loading...