Soodeh Hosseini

Orcid: 0000-0003-1495-3833

According to our database1, Soodeh Hosseini authored at least 25 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A new approach for estimating the number of communities in complex networks using PGD-SNMTF and GA.
Evol. Syst., April, 2024

2023
A novel binary horse herd optimization algorithm for feature selection problem.
Multim. Tools Appl., November, 2023

Network intrusion detection based on deep learning method in internet of thing.
J. Reliab. Intell. Environ., June, 2023

Social network security using genetic algorithm.
Evol. Syst., April, 2023

2022
Machine Learning algorithms for prediction of energy consumption and IoT modeling in complex networks.
Microprocess. Microsystems, March, 2022

Information dissemination modeling based on rumor propagation in online social networks with fuzzy logic.
Soc. Netw. Anal. Min., 2022

Deep text clustering using stacked AutoEncoder.
Multim. Tools Appl., 2022

Business intelligence using machine learning algorithms.
Multim. Tools Appl., 2022

The SEIRS-C model of information diffusion based on rumour spreading with fuzzy logic in social networks.
Int. J. Comput. Math., 2022

Botnet detection using negative selection algorithm, convolution neural network and classification methods.
Evol. Syst., 2022

2021
Machine Learning Algorithms for Predicting Electricity Consumption of Buildings.
Wirel. Pers. Commun., 2021

Android malware classification using convolutional neural network and LSTM.
J. Comput. Virol. Hacking Tech., 2021

Data mining tools -a case study for network intrusion detection.
Multim. Tools Appl., 2021

Anomaly process detection using negative selection algorithm and classification techniques.
Evol. Syst., 2021

Defense against malware propagation in complex heterogeneous networks.
Clust. Comput., 2021

2020
A new machine learning method consisting of GA-LR and ANN for attack detection.
Wirel. Networks, 2020

New hybrid method for attack detection using combination of evolutionary algorithms, SVM, and ANN.
Comput. Networks, 2020

2019
Game theory approach for detecting vulnerable data centers in cloud computing network.
Int. J. Commun. Syst., 2019

The hybrid technique for DDoS detection with supervised learning algorithms.
Comput. Networks, 2019

2016
Agent-based simulation of the dynamics of malware propagation in scale-free networks.
Simul., 2016

Malware propagation modeling considering software diversity and immunization.
J. Comput. Sci., 2016

A model for malware propagation in scale-free networks based on rumor spreading process.
Comput. Networks, 2016

2015
Dynamics of a rumor-spreading model with diversity of configurations in scale-free networks.
Int. J. Commun. Syst., 2015

2014
A malware propagation model considering software diversity and topology dynamics.
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014

2008
UML Model Refactoring with Emphasis on Behavior Preservation.
Proceedings of the Second IEEE/IFIP International Symposium on Theoretical Aspects of Software Engineering, 2008


  Loading...