Peyman Kabiri

Orcid: 0000-0001-5143-0498

According to our database1, Peyman Kabiri authored at least 28 papers between 2002 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Detecting forged management frames with spoofed addresses in IEEE 802.11 networks using received signal strength indicator.
Iran J. Comput. Sci., 2020

New texture-based pansharpening method using wavelet packet transform and PCA.
Int. J. Wavelets Multiresolution Inf. Process., 2020

2019
Destructive Attacks Detection and Response System for Physical Devices in Cyber-Physical Systems.
Proceedings of the 2019 International Conference on Cyber Security and Protection of Digital Services, 2019

2018
Detection of repetitive and irregular hypercall attacks from guest virtual machines to Xen hypervisor.
Iran J. Comput. Sci., 2018

2017
Collaborative filtering using non-negative matrix factorisation.
J. Inf. Sci., 2017

Modelling trust networks using resistive circuits for trust-aware recommender systems.
J. Inf. Sci., 2017

Scalable data-driven modeling of spatio-temporal systems: Weather forecasting.
Intell. Data Anal., 2017

Automobile engine condition monitoring using sound emission.
Turkish J. Electr. Eng. Comput. Sci., 2017

Workload-Aware Placement of Multi-Tier Applications in Virtualized Datacenters.
Comput. J., 2017

An Adaptive and Cost-Based Intrusion Response System.
Cybern. Syst., 2017

2016
Multispectral MRI image segmentation using Markov random field model.
Signal Image Video Process., 2016

Feature Selection for Intrusion Detection System Using Ant Colony Optimization.
Int. J. Netw. Secur., 2016

2015
Rashnu: a Wi-Fi intrusion response scheme.
Secur. Commun. Networks, 2015

Performance modeling and analysis of virtualized multi-tier applications under dynamic workloads.
J. Netw. Comput. Appl., 2015

Performance evaluation of Web server workloads in Xen-based virtualized computer system: analytical modeling and experimental validation.
Concurr. Comput. Pract. Exp., 2015

Scalable Feature Selection in High-Dimensional Data Based on GRASP.
Appl. Artif. Intell., 2015

2014
Trust-based routing method using a mobility-based clustering approach in mobile ad hoc networks.
Secur. Commun. Networks, 2014

2012
Application of nonnegative matrix factorization in recommender systems.
Proceedings of the 6th International Symposium on Telecommunications, 2012

2011
Feature Analysis for Intrusion Detection in Mobile Ad-hoc Networks.
Int. J. Netw. Secur., 2011

2010
Identification of Effective Optimal Network Feature Set for Probing Attack Detection Using PCA Method.
Int. J. Web Appl., 2010

Selection of Effective Network Parameters in Attacks for Intrusion Detection.
Proceedings of the Advances in Data Mining. Applications and Theoretical Aspects, 2010

2008
Statistical shape based multispectral image retrieval extracting Power Spectrum Vectors.
Proceedings of the Third IEEE International Conference on Digital Information Management (ICDIM), 2008

Content based multispectral image retrieval using principal component analysis.
Proceedings of the 7th ACM International Conference on Image and Video Retrieval, 2008

2007
A Rule-based Temporal Alert Correlation System.
Int. J. Netw. Secur., 2007

A new multi-objective evolutionary approach for creating ensemble of classifiers.
Proceedings of the IEEE International Conference on Systems, 2007

2005
Research on Intrusion Detection and Response: A Survey.
Int. J. Netw. Secur., 2005

2004
A Comparison Between the Proportional Keen Approximator and the Neural Networks Learning Methods.
Proceedings of the ICEIS 2004, 2004

2002
Using black box and machine learning approach in controlling a machine.
Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, Yasmine Hammamet, Tunisia, October 6-9, 2002, 2002


  Loading...