Mohammad Abdollahi Azgomi

According to our database1, Mohammad Abdollahi Azgomi authored at least 85 papers between 2002 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
A probabilistic model for anonymity analysis of anonymous communication networks.
Telecommunication Systems, 2018

An approach based on the transferrable belief model for trust evaluation in web services.
Soft Comput., 2018

A Stochastic Game Model for Evaluating the Impacts of Security Attacks Against Cyber-Physical Systems.
J. Network Syst. Manage., 2018

A Model of Trust Based on Uncertainty Theory.
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2018

Reliability evaluation of UML/DAM software architectures under parameter uncertainty.
IET Software, 2018

A method for dependability evaluation of software architectures.
Computing, 2018

2017
A method for evaluating the consequence propagation of security attacks in cyber-physical systems.
Future Generation Comp. Syst., 2017

A game-theoretic approach to model and quantify the security of cyber-physical systems.
Computers in Industry, 2017

2016
Trust modeling based on a combination of fuzzy analytic hierarchy process and fuzzy VIKOR.
Soft Comput., 2016

Agent-based simulation of the dynamics of malware propagation in scale-free networks.
Simulation, 2016

Predicting the behavior of attackers and the consequences of attacks against cyber-physical systems.
Security and Communication Networks, 2016

Malware propagation modeling considering software diversity and immunization.
J. Comput. Science, 2016

A formulation of computational trust based on quantum decision theory.
Information Systems Frontiers, 2016

DSCMC: Distributed Stateless Code Model Checker.
CoRR, 2016

A New Approach to Stateless Model Checking of LTL Properties.
CoRR, 2016

Stateless Code Model Checking of Information Flow Security.
CoRR, 2016

Anomaly Detection in XML-Structured SOAP Messages Using Tree-Based Association Rule Mining.
CoRR, 2016

A model for malware propagation in scale-free networks based on rumor spreading process.
Computer Networks, 2016

A hesitant fuzzy model of computational trust considering hesitancy, vagueness and uncertainty.
Appl. Soft Comput., 2016

2015
A method for fair propagation of user perceptions for trust management in composite services.
Service Oriented Computing and Applications, 2015

Modeling the propagation of topology-aware P2P worms considering temporal parameters.
Peer-to-Peer Networking and Applications, 2015

A stochastic epidemiological model for the propagation of active worms considering the dynamicity of network topology.
Peer-to-Peer Networking and Applications, 2015

A survey of quantum-like approaches to decision making and cognition.
Mathematical Social Sciences, 2015

Differential privacy preserving clustering using Daubechies-2 wavelet transform.
IJWMIP, 2015

Dynamics of a rumor-spreading model with diversity of configurations in scale-free networks.
Int. J. Communication Systems, 2015

Differential privacy preserving clustering in distributed datasets using Haar wavelet transform.
Intell. Data Anal., 2015

Parametric multisingular hybrid Petri nets: Formal definitions and analysis techniques.
Inf. Comput., 2015

Model checking the observational determinism security property using PROMELA and SPIN.
Formal Asp. Comput., 2015

A multi-criteria decision-making formulation of trust using fuzzy analytic hierarchy process.
Cognition, Technology & Work, 2015

Software Architecture Modeling and Evaluation Based on Stochastic Activity Networks.
Proceedings of the Fundamentals of Software Engineering - 6th International Conference, 2015

A method for intrusion detection in web services based on time series.
Proceedings of the IEEE 28th Canadian Conference on Electrical and Computer Engineering, 2015

2014
A distributed simulation framework for modeling cyber attacks and the evaluation of security measures.
Simulation, 2014

Attack modelling and security evaluation based on stochastic activity networks.
Security and Communication Networks, 2014

Differential privacy preserving clustering based on Haar wavelet transform.
Intell. Data Anal., 2014

Translation from Multisingular Hybrid Petri Nets to Multisingular Hybrid Automata.
Fundam. Inform., 2014

Mean privacy: A metric for security of computer systems.
Computer Communications, 2014

Contextuality, Incompatibility and Biased Inference in a Quantum-like formulation of Computational Trust.
Advances in Complex Systems, 2014

2013
SimGine: A simulation engine for stochastic discrete-event systems based on SDES description.
Simulation, 2013

An Improved Technique for Privacy Preserving Clustering Based on Daubechies-2 Wavelet Transform.
IJWMIP, 2013

A stochastic model of attack process for the evaluation of security metrics.
Computer Networks, 2013

An efficient control-flow checking technique for the detection of soft-errors in embedded software.
Computers & Electrical Engineering, 2013

2012
A high-performance and scalable multi-core aware software solution for network monitoring.
The Journal of Supercomputing, 2012

Modeling and verification of hybrid dynamic systems using multisingular hybrid Petri nets.
Theor. Comput. Sci., 2012

An improved method for test case prioritization by incorporating historical test case data.
Sci. Comput. Program., 2012

A game theoretic framework for evaluation of the impacts of hackers diversity on security measures.
Rel. Eng. & Sys. Safety, 2012

2011
On the Use of Haar Wavelet Transform and Scaling Data perturbation for Privacy Preserving Clustering of Large Datasets.
IJWMIP, 2011

A privacy preserving clustering technique for horizontally and vertically distributed datasets.
Intell. Data Anal., 2011

On the impacts of join and leave on the propagation ratio of topology-aware active worms.
Proceedings of the 4th International Conference on Security of Information and Networks, 2011

An SIR model for the propagation of topology-aware active worms considering the join and leave of hosts.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2010
A hybrid fraud scoring and spike detection technique in streaming data.
Intell. Data Anal., 2010

Task scheduling modelling and reliability evaluation of grid services using coloured Petri nets.
Future Generation Comp. Syst., 2010

An Extension for Combination of Duty Constraints in Role-Based Access Control
CoRR, 2010

A distributed multi-approach intrusion detection system for web services.
Proceedings of the 3rd International Conference on Security of Information and Networks, 2010

2009
A Method for Estimation of the Success Probability of an Intrusion Process by Considering the Temporal Aspects of the Attacker Behavior.
Trans. Computational Science, 2009

Conflict-free scheduling and routing of automated guided vehicles in mesh topologies.
Robotics and Autonomous Systems, 2009

Performance Evaluation of Sensor Medium Access Control Protocol Using Coloured Petri Nets.
Electr. Notes Theor. Comput. Sci., 2009

Incorporating Historical Test Case Performance Data and Resource Constraints into Test Case Prioritization.
Proceedings of the Tests and Proofs, Third International Conference, 2009

A scalable multi-core aware software architecture for high-performance network monitoring.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

Security Evaluation of an Intrusion Tolerant Web Service Architecture Using Stochastic Activity Networks.
Proceedings of the Advances in Information Security and Assurance, 2009

Workflow Modeling Using Stochastic Activity Networks.
Proceedings of the Information Systems, Technology and Management, 2009

An Overview of a Hybrid Fraud Scoring and Spike Detection Technique for Fraud Detection in Streaming Data.
Proceedings of the Information Systems, Technology and Management, 2009

A Taxonomy of Frauds and Fraud Detection Techniques.
Proceedings of the Information Systems, Technology and Management, 2009

An Overview of a New Multi-formalism Modeling Framework.
Proceedings of the Information Systems, Technology and Management, 2009

Improving Route Stability and Overhead on AODV Routing Protocol and Make it Usable for VANET.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2009 Workshops), 2009

A Game Theoretic Approach for Quantitative Evaluation of Strategic Interactions between Hacker's Motivations.
Proceedings of the EMS 2009, 2009

A Computational Trust Model for E-Commerce Systems.
Proceedings of the Digital Business - First Iternational ICST Conference, 2009

A Game Theoretic Approach for Quantitative Evaluation of Security by Considering Hackers with Diverse Behaviors.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009

Implementation of Coloured Stochastic Activity Networks within the PDETool Framework.
Proceedings of the Third Asia International Conference on Modelling & Simulation, 2009

PDETool: A Multi-formalism Modeling Tool for Discrete-Event Systems Based on SDES Description.
Proceedings of the Applications and Theory of Petri Nets, 2009

A distributed attack simulation for quantitative security evaluation using SimEvents.
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009

An object-oriented modeling framework for petri nets and related models.
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009

DSMS scheduling regarding complex QoS metrics.
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009

Intrusion Process Modeling for Security Quantification.
Proceedings of the The Forth International Conference on Availability, 2009

An automated system for search and retrieval of trademarks.
Proceedings of the 11th International Conference on Electronic Commerce 2009, 2009

2008
UML Model Refactoring with Emphasis on Behavior Preservation.
Proceedings of the Second IEEE/IFIP International Symposium on Theoretical Aspects of Software Engineering, 2008

The Influence of Efficient Message Passing Mechanisms on High Performance Distributed Scientific Computing.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2008

Towards a Trust-Based Model for Administration of Mailing Lists.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Modeling and Analysis of a Web Service Firewall Using Coloured Petri Nets.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

2007
Modeling and Evaluation of Call Centers with GSPN Models.
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007

2006
Transformation of UML Models into Analyzable OSAN Models.
Electr. Notes Theor. Comput. Sci., 2006

Modeling and Evaluation of Software Systems with Object Stochastic Activity Networks.
Proceedings of the International Conference on Software Engineering Advances (ICSEA 2006), October 28, 2006

Efficient Evaluation of CSAN Models by State Space Analysis Methods.
Proceedings of the International Conference on Software Engineering Advances (ICSEA 2006), October 28, 2006

2005
A modelling tool for hierarchical stochastic activity networks.
Simulation Modelling Practice and Theory, 2005

2004
Modeling and Evaluation with Object Stochastic Activity Networks.
Proceedings of the 1st International Conference on Quantitative Evaluation of Systems (QEST 2004), 2004

2002
An Introduction to New Extensions for Stochastic Activity Networks.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2002


  Loading...