Hossein Gharaee

According to our database1, Hossein Gharaee authored at least 22 papers between 2008 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
An Architecture for National Information Sharing and Alerting System.
Proceedings of the 10th International Symposium on Telecommunications, 2020

2019
A Novel and Comprehensive Evaluation Methodology for SIEM.
Proceedings of the Information Security Practice and Experience, 2019

IoT-Based Anonymous Authentication Protocol Using Biometrics in Smart Homes.
Proceedings of the 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2019

2018
An Intelligent RFID-Enabled Authentication Protocol in VANET.
Proceedings of the 9th International Symposium on Telecommunications, 2018

National Cyber Situation Awareness Model.
Proceedings of the 9th International Symposium on Telecommunications, 2018

2016
A novel network based privacy framework.
Proceedings of the 8th International Symposium on Telecommunications, 2016

LDPC decoder implementation using FPGA.
Proceedings of the 8th International Symposium on Telecommunications, 2016

Lightweight, anonymous and mutual authentication in IoT infrastructure.
Proceedings of the 8th International Symposium on Telecommunications, 2016

A new feature selection IDS based on genetic algorithm and SVM.
Proceedings of the 8th International Symposium on Telecommunications, 2016

Security considerations and requirements for Cloud computing.
Proceedings of the 8th International Symposium on Telecommunications, 2016

Optimal response to computer network threats.
Proceedings of the 8th International Symposium on Telecommunications, 2016

2015
A proposed architecture for network forensic system in large-scale networks.
CoRR, 2015

2013
Adaptive Energy Aware Cooperation Strategy in Heterogeneous Multi-domain Sensor Networks.
Proceedings of the 4th International Conference on Ambient Systems, 2013

2012
A novel hybrid anomaly based intrusion detection method.
Proceedings of the 6th International Symposium on Telecommunications, 2012

A comprehensive network intrusion detection and prevention system architecture.
Proceedings of the 6th International Symposium on Telecommunications, 2012

Frequent item set mining-based alert correlation for extracting multi-stage attack scenarios.
Proceedings of the 6th International Symposium on Telecommunications, 2012

2011
Performance Analysis of AODV under Black Hole Attack through Use of OPNET Simulator
CoRR, 2011

Log management comprehensive architecture in Security Operation Center (SOC).
Proceedings of the International Conference on Computational Aspects of Social Networks, 2011

Analysis of an adjacent 3G network corruption influence on WLAN/3G interworking access.
Proceedings of the International Conference on Computational Aspects of Social Networks, 2011

A complete operational architecture of alert correlation.
Proceedings of the International Conference on Computational Aspects of Social Networks, 2011

2009
Performance and Complexity Evaluation of OTR-UWB Receiver.
Int. J. Interdiscip. Telecommun. Netw., 2009

2008
OTR-UWB system.
Proceedings of the Wireless Telecommunications Symposium, 2008


  Loading...