Mehdi Shajari

Orcid: 0000-0002-5447-3829

According to our database1, Mehdi Shajari authored at least 38 papers between 2003 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
UGR'16 Tensor Time-Series Dataset.
Dataset, April, 2022

Tensor-Based Online Network Anomaly Detection and Diagnosis.
IEEE Access, 2022

2021
A Fair Model of Identity Information Exchange Leveraging Zero-Knowledge.
CoRR, 2021

Analysis of incentive mechanism in Repchain.
Proceedings of the 26th International Computer Conference, Computer Society of Iran, 2021

2020
Service Integrity Assurance for Distributed Computation Outsourcing.
IEEE Trans. Serv. Comput., 2020

A language and a pattern system for temporal property specification: advanced metering infrastructure case study.
Int. J. Inf. Sec., 2020

Industrial control system security taxonomic framework with application to a comprehensive incidents survey.
Int. J. Crit. Infrastructure Prot., 2020

Computation integrity assurance for emerging distributed computation outsourcing environments, the case of block withholding attack on Bitcoin pools.
IET Inf. Secur., 2020

An aggregated statistical approach for network flood detection using Gamma-Normal mixture modeling.
Comput. Commun., 2020

2019
Word sense disambiguation application in sentiment analysis of news headlines: an applied approach to FOREX market prediction.
J. Intell. Inf. Syst., 2019

Block withholding game among bitcoin mining pools.
Future Gener. Comput. Syst., 2019

An incentive mechanism to promote honesty among seller agents in electronic marketplaces.
Electron. Commer. Res., 2019

Decentralized and secure delivery network of IoT update files based on ethereum smart contracts and blockchain technology.
Proceedings of the 29th Annual International Conference on Computer Science and Software Engineering, 2019

2018
Cost-sensitive payment card fraud detection based on dynamic random forest and <i>k</i>-nearest neighbors.
Expert Syst. Appl., 2018

Attack scenario reconstruction using intrusion semantics.
Expert Syst. Appl., 2018

A cost-sensitive move selection strategy for moving target defense.
Comput. Secur., 2018

2016
Improving recommender systems' performance on cold-start users and controversial items by a new similarity model.
Int. J. Web Inf. Syst., 2016

Intelligent Automated Intrusion Response System based on fuzzy decision making and risk assessment.
Proceedings of the 8th IEEE International Conference on Intelligent Systems, 2016

2015
A comprehensive security control selection model for inter-dependent organizational assets structure.
Inf. Comput. Secur., 2015

2014
Defending recommender systems by influence analysis.
Inf. Retr., 2014

Trust Evaluation using an Improved Context Similarity Measurement.
CoRR, 2014

2012
System Health Monitoring Using a Novel Method: Security Unified Process.
J. Comput. Networks Commun., 2012

An enhanced e-commerce trust model for community based centralized systems.
Electron. Commer. Res., 2012

An enhanced significance weighting approach for collaborative filtering.
Proceedings of the 6th International Symposium on Telecommunications, 2012

A Usage Control Based Architecture for Cloud Environments.
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012

2011
Using Genre Interest of Users to Detect Profile Injection Attacks in Movie Recommender Systems.
Proceedings of the 10th International Conference on Machine Learning and Applications and Workshops, 2011

Who are the most influential users in a recommender system?
Proceedings of the 13th International Conference on Electronic Commerce, 2011

2010
Toward Specification-Based Intrusion Detection for Web Applications.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

Mobile Partial Identity Management: The Non-repudiable Minimal Mobile Identity Model.
Proceedings of the Future Generation Information Technology, 2010

AMVPayword: Secure and Efficient Anonymous Payword-Based Micropayment Scheme.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

Self-Proxy Mobile Signature: A New Client-Based Mobile Signature Model.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

A survey on mobile digital signature models.
Proceedings of the 12th International Conference on Electronic Commerce, 2010

Path reduction in complex grid service provision.
Proceedings of the 12th International Conference on Electronic Commerce, 2010

2009
An Enhanced Infrastructure for Peer-to-Peer Intrusion Detection Systems.
Proceedings of the 2009 Second International Conference on Environmental and Computer Science, 2009

Flash payment: payment using flash disks.
Proceedings of the 11th International Conference on Electronic Commerce 2009, 2009

2005
Agent-oriented Design for Network Survivability.
Proceedings of the Fifth International Conference on Intelligent Systems Design and Applications (ISDA 2005), 2005

2004
Application of Belief-Desire-Intention Agents in Intrusion Detection & Response.
Proceedings of the Second Annual Conference on Privacy, 2004

2003
Using Fuzzy System to Manage False Alarms in Intrusion Detection.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003


  Loading...