Mohammad Abdollahi Azgomi

According to our database1, Mohammad Abdollahi Azgomi authored at least 95 papers between 2002 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
Analytical evaluation of resource allocation algorithms and process migration methods in virtualized systems.
Sustain. Comput. Informatics Syst., 2020

An uncertainty-aware computational trust model considering the co-existence of trust and distrust in social networks.
Inf. Sci., 2020

2019
Evaluation of the impacts of failures and resource heterogeneity on the power consumption and performance of IaaS clouds.
J. Supercomput., 2019

SQME: a framework for modeling and evaluation of software architecture quality attributes.
Softw. Syst. Model., 2019

Modelling and evaluation of the security of cyber-physical systems using stochastic Petri nets.
IET Cyper-Phys. Syst.: Theory & Appl., 2019

A novel trust evolution algorithm based on a quantum-like model of computational trust.
Cogn. Technol. Work., 2019

Unified power and performance analysis of cloud computing infrastructure using stochastic reward nets.
Comput. Commun., 2019

2018
A probabilistic model for anonymity analysis of anonymous communication networks.
Telecommun. Syst., 2018

An approach based on the transferrable belief model for trust evaluation in web services.
Soft Comput., 2018

A Stochastic Game Model for Evaluating the Impacts of Security Attacks Against Cyber-Physical Systems.
J. Netw. Syst. Manag., 2018

A Model of Trust Based on Uncertainty Theory.
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2018

Reliability evaluation of UML/DAM software architectures under parameter uncertainty.
IET Softw., 2018

A method for dependability evaluation of software architectures.
Computing, 2018

2017
A method for evaluating the consequence propagation of security attacks in cyber-physical systems.
Future Gener. Comput. Syst., 2017

A game-theoretic approach to model and quantify the security of cyber-physical systems.
Comput. Ind., 2017

2016
Trust modeling based on a combination of fuzzy analytic hierarchy process and fuzzy VIKOR.
Soft Comput., 2016

Agent-based simulation of the dynamics of malware propagation in scale-free networks.
Simul., 2016

Predicting the behavior of attackers and the consequences of attacks against cyber-physical systems.
Secur. Commun. Networks, 2016

Malware propagation modeling considering software diversity and immunization.
J. Comput. Sci., 2016

A formulation of computational trust based on quantum decision theory.
Inf. Syst. Frontiers, 2016

Quantitative evaluation of software security: an approach based on UML/SecAM and evidence theory.
ISC Int. J. Inf. Secur., 2016

DSCMC: Distributed Stateless Code Model Checker.
CoRR, 2016

A New Approach to Stateless Model Checking of LTL Properties.
CoRR, 2016

Stateless Code Model Checking of Information Flow Security.
CoRR, 2016

Anomaly Detection in XML-Structured SOAP Messages Using Tree-Based Association Rule Mining.
CoRR, 2016

A model for malware propagation in scale-free networks based on rumor spreading process.
Comput. Networks, 2016

A hesitant fuzzy model of computational trust considering hesitancy, vagueness and uncertainty.
Appl. Soft Comput., 2016

2015
A method for fair propagation of user perceptions for trust management in composite services.
Serv. Oriented Comput. Appl., 2015

Modeling the propagation of topology-aware P2P worms considering temporal parameters.
Peer Peer Netw. Appl., 2015

A stochastic epidemiological model for the propagation of active worms considering the dynamicity of network topology.
Peer Peer Netw. Appl., 2015

A survey of quantum-like approaches to decision making and cognition.
Math. Soc. Sci., 2015

Differential privacy preserving clustering using Daubechies-2 wavelet transform.
Int. J. Wavelets Multiresolution Inf. Process., 2015

Dynamics of a rumor-spreading model with diversity of configurations in scale-free networks.
Int. J. Commun. Syst., 2015

Differential privacy preserving clustering in distributed datasets using Haar wavelet transform.
Intell. Data Anal., 2015

Parametric multisingular hybrid Petri nets: Formal definitions and analysis techniques.
Inf. Comput., 2015

Model checking the observational determinism security property using PROMELA and SPIN.
Formal Aspects Comput., 2015

A multi-criteria decision-making formulation of trust using fuzzy analytic hierarchy process.
Cogn. Technol. Work., 2015

Software Architecture Modeling and Evaluation Based on Stochastic Activity Networks.
Proceedings of the Fundamentals of Software Engineering - 6th International Conference, 2015

A method for intrusion detection in web services based on time series.
Proceedings of the IEEE 28th Canadian Conference on Electrical and Computer Engineering, 2015

2014
A distributed simulation framework for modeling cyber attacks and the evaluation of security measures.
Simul., 2014

Attack modelling and security evaluation based on stochastic activity networks.
Secur. Commun. Networks, 2014

Differential privacy preserving clustering based on Haar wavelet transform.
Intell. Data Anal., 2014

Translation from Multisingular Hybrid Petri Nets to Multisingular Hybrid Automata.
Fundam. Informaticae, 2014

Mean privacy: A metric for security of computer systems.
Comput. Commun., 2014

Contextuality, Incompatibility and Biased Inference in a Quantum-like formulation of Computational Trust.
Adv. Complex Syst., 2014

A method for modeling and evaluation of the security of cyber-physical systems.
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014

A malware propagation model considering software diversity and topology dynamics.
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014

2013
SimGine: A simulation engine for stochastic discrete-event systems based on SDES description.
Simul., 2013

An Improved Technique for Privacy Preserving Clustering Based on Daubechies-2 Wavelet Transform.
Int. J. Wavelets Multiresolution Inf. Process., 2013

A stochastic model of attack process for the evaluation of security metrics.
Comput. Networks, 2013

An efficient control-flow checking technique for the detection of soft-errors in embedded software.
Comput. Electr. Eng., 2013

2012
A high-performance and scalable multi-core aware software solution for network monitoring.
J. Supercomput., 2012

Modeling and verification of hybrid dynamic systems using multisingular hybrid Petri nets.
Theor. Comput. Sci., 2012

An improved method for test case prioritization by incorporating historical test case data.
Sci. Comput. Program., 2012

A game theoretic framework for evaluation of the impacts of hackers diversity on security measures.
Reliab. Eng. Syst. Saf., 2012

2011
On the Use of Haar Wavelet Transform and Scaling Data perturbation for Privacy Preserving Clustering of Large Datasets.
Int. J. Wavelets Multiresolution Inf. Process., 2011

A privacy preserving clustering technique for horizontally and vertically distributed datasets.
Intell. Data Anal., 2011

On the impacts of join and leave on the propagation ratio of topology-aware active worms.
Proceedings of the 4th International Conference on Security of Information and Networks, 2011

An SIR model for the propagation of topology-aware active worms considering the join and leave of hosts.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2010
A hybrid fraud scoring and spike detection technique in streaming data.
Intell. Data Anal., 2010

Task scheduling modelling and reliability evaluation of grid services using coloured Petri nets.
Future Gener. Comput. Syst., 2010

An Extension for Combination of Duty Constraints in Role-Based Access Control
CoRR, 2010

A distributed multi-approach intrusion detection system for web services.
Proceedings of the 3rd International Conference on Security of Information and Networks, 2010

2009
A Method for Estimation of the Success Probability of an Intrusion Process by Considering the Temporal Aspects of the Attacker Behavior.
Trans. Comput. Sci., 2009

Conflict-free scheduling and routing of automated guided vehicles in mesh topologies.
Robotics Auton. Syst., 2009

Performance Evaluation of Sensor Medium Access Control Protocol Using Coloured Petri Nets.
Electron. Notes Theor. Comput. Sci., 2009

Incorporating Historical Test Case Performance Data and Resource Constraints into Test Case Prioritization.
Proceedings of the Tests and Proofs - 3rd International Conference, 2009

A scalable multi-core aware software architecture for high-performance network monitoring.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

Security Evaluation of an Intrusion Tolerant Web Service Architecture Using Stochastic Activity Networks.
Proceedings of the Advances in Information Security and Assurance, 2009

Workflow Modeling Using Stochastic Activity Networks.
Proceedings of the Information Systems, Technology and Management, 2009

An Overview of a Hybrid Fraud Scoring and Spike Detection Technique for Fraud Detection in Streaming Data.
Proceedings of the Information Systems, Technology and Management, 2009

A Taxonomy of Frauds and Fraud Detection Techniques.
Proceedings of the Information Systems, Technology and Management, 2009

An Overview of a New Multi-formalism Modeling Framework.
Proceedings of the Information Systems, Technology and Management, 2009

Improving Route Stability and Overhead on AODV Routing Protocol and Make it Usable for VANET.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2009 Workshops), 2009

A Game Theoretic Approach for Quantitative Evaluation of Strategic Interactions between Hacker's Motivations.
Proceedings of the EMS 2009, 2009

A Computational Trust Model for E-Commerce Systems.
Proceedings of the Digital Business - First Iternational ICST Conference, 2009

A Game Theoretic Approach for Quantitative Evaluation of Security by Considering Hackers with Diverse Behaviors.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009

Implementation of Coloured Stochastic Activity Networks within the PDETool Framework.
Proceedings of the Third Asia International Conference on Modelling & Simulation, 2009

PDETool: A Multi-formalism Modeling Tool for Discrete-Event Systems Based on SDES Description.
Proceedings of the Applications and Theory of Petri Nets, 2009

A distributed attack simulation for quantitative security evaluation using SimEvents.
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009

An object-oriented modeling framework for petri nets and related models.
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009

DSMS scheduling regarding complex QoS metrics.
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009

Intrusion Process Modeling for Security Quantification.
Proceedings of the The Forth International Conference on Availability, 2009

An automated system for search and retrieval of trademarks.
Proceedings of the 11th International Conference on Electronic Commerce 2009, 2009

2008
UML Model Refactoring with Emphasis on Behavior Preservation.
Proceedings of the Second IEEE/IFIP International Symposium on Theoretical Aspects of Software Engineering, 2008

The Influence of Efficient Message Passing Mechanisms on High Performance Distributed Scientific Computing.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2008

Towards a Trust-Based Model for Administration of Mailing Lists.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Modeling and Analysis of a Web Service Firewall Using Coloured Petri Nets.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

2007
Modeling and Evaluation of Call Centers with GSPN Models.
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007

2006
Transformation of UML Models into Analyzable OSAN Models.
Electron. Notes Theor. Comput. Sci., 2006

Modeling and Evaluation of Software Systems with Object Stochastic Activity Networks.
Proceedings of the International Conference on Software Engineering Advances (ICSEA 2006), October 28, 2006

Efficient Evaluation of CSAN Models by State Space Analysis Methods.
Proceedings of the International Conference on Software Engineering Advances (ICSEA 2006), October 28, 2006

2005
A modelling tool for hierarchical stochastic activity networks.
Simul. Model. Pract. Theory, 2005

2004
Modeling and Evaluation with Object Stochastic Activity Networks.
Proceedings of the 1st International Conference on Quantitative Evaluation of Systems (QEST 2004), 2004

2002
An Introduction to New Extensions for Stochastic Activity Networks.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2002


  Loading...