Ali Fanian

Orcid: 0000-0003-0966-9862

According to our database1, Ali Fanian authored at least 27 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A New Approach to Orphan Blocks in the Nakamoto Consensus Blockchain.
IEEE Trans. Netw. Sci. Eng., 2024

2022
ITL-IDS: Incremental Transfer Learning for Intrusion Detection Systems.
Knowl. Based Syst., 2022

Node cooperation for workload offloading in a fog computing network via multi-objective optimization.
J. Netw. Comput. Appl., 2022

A Graph-based Online Feature Selection to Improve Detection of New Attacks.
ISC Int. J. Inf. Secur., 2022

Lagrangian Cooperation (LC): A Fog Node Cooperation Algorithm for Smart Cities.
IEEE Commun. Lett., 2022

2021
TGSM: Towards trustworthy group-based service management for social IoT.
Internet Things, 2021

A Trust and Reputation System for IoT Exploiting Distributed Ledger Technology.
CoRR, 2021

2020
A real-time alert correlation method based on code-books for intrusion detection systems.
Comput. Secur., 2020

2019
A novel online state-based anomaly detection system for process control networks.
Int. J. Crit. Infrastructure Prot., 2019

Ingredients to enhance the performance of two-stage TCAM-based packet classifiers in internet of things: greedy layering, bit auctioning and range encoding.
EURASIP J. Wirel. Commun. Netw., 2019

2018
Classification of encrypted traffic for applications based on statistical features.
ISC Int. J. Inf. Secur., 2018

2017
An analytical model for delay bound of OpenFlow based SDN using network calculus.
J. Netw. Comput. Appl., 2017

An incremental intrusion detection system using a new semi-supervised stream classification method.
Int. J. Commun. Syst., 2017

Online assignment of non-SDN virtual network nodes to a physical SDN.
Comput. Networks, 2017

2014
An efficient non-repudiation billing protocol in heterogeneous 3G-WLAN networks.
ISC Int. J. Inf. Secur., 2014

Efficient Workflow Scheduling for Grid Computing Using a Leveled Multi-objective Genetic Algorithm.
J. Grid Comput., 2014

2012
A symmetric polynomial-based mutual authentication protocol for GSM networks.
Int. J. Secur. Networks, 2012

2011
A high performance and intrinsically secure key establishment protocol for wireless sensor networks.
Comput. Networks, 2011

2010
An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks.
ISC Int. J. Inf. Secur., 2010

A Hybrid Key Establishment Protocol for Large Scale Wireless Sensor Networks.
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010

A New Key Establishment Protocol for Limited Resource Wireless Sensor Networks.
Proceedings of the 8th Annual Conference on Communication Networks and Services Research, 2010

2009
A TESLA-based mutual authentication protocol for GSM networks.
ISC Int. J. Inf. Secur., 2009

An efficient authentication and key management protocol for hierarchical ad hoc sensor networks.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009

A new mutual authentication protocol for GSM networks.
Proceedings of the 22nd Canadian Conference on Electrical and Computer Engineering, 2009

2008
Modular array structure for non-restoring square root circuit.
J. Syst. Archit., 2008

A Cluster-Based Key Establishment Protocol for Wireless Mobile Ad Hoc Networks.
Proceedings of the Advances in Computer Science and Engineering, 2008

Prevention of Tunneling Attack in endairA.
Proceedings of the Advances in Computer Science and Engineering, 2008


  Loading...