Hossein Gharaee

According to our database1, Hossein Gharaee authored at least 17 papers between 2008 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
A Novel and Comprehensive Evaluation Methodology for SIEM.
Proceedings of the Information Security Practice and Experience, 2019

2018
An Intelligent RFID-Enabled Authentication Protocol in VANET.
Proceedings of the 9th International Symposium on Telecommunications, 2018

National Cyber Situation Awareness Model.
Proceedings of the 9th International Symposium on Telecommunications, 2018

2016
A novel network based privacy framework.
Proceedings of the 8th International Symposium on Telecommunications, 2016

LDPC decoder implementation using FPGA.
Proceedings of the 8th International Symposium on Telecommunications, 2016

Lightweight, anonymous and mutual authentication in IoT infrastructure.
Proceedings of the 8th International Symposium on Telecommunications, 2016

A new feature selection IDS based on genetic algorithm and SVM.
Proceedings of the 8th International Symposium on Telecommunications, 2016

Security considerations and requirements for Cloud computing.
Proceedings of the 8th International Symposium on Telecommunications, 2016

Optimal response to computer network threats.
Proceedings of the 8th International Symposium on Telecommunications, 2016

2015
A proposed architecture for network forensic system in large-scale networks.
CoRR, 2015

2013
Adaptive Energy Aware Cooperation Strategy in Heterogeneous Multi-domain Sensor Networks.
Proceedings of the 4th International Conference on Ambient Systems, 2013

2011
Performance Analysis of AODV under Black Hole Attack through Use of OPNET Simulator
CoRR, 2011

Log management comprehensive architecture in Security Operation Center (SOC).
Proceedings of the International Conference on Computational Aspects of Social Networks, 2011

Analysis of an adjacent 3G network corruption influence on WLAN/3G interworking access.
Proceedings of the International Conference on Computational Aspects of Social Networks, 2011

A complete operational architecture of alert correlation.
Proceedings of the International Conference on Computational Aspects of Social Networks, 2011

2009
Performance and Complexity Evaluation of OTR-UWB Receiver.
Int. J. Interdiscip. Telecommun. Netw., 2009

2008
OTR-UWB system.
Proceedings of the Wireless Telecommunications Symposium, 2008


  Loading...