Menu
Cohorets
Computer Sciences
College Name:
Faculty of Basic Science
Educational Group Name:
Computer Sciences
Status:
Active
Room Number:
Email:
Phone:
51212241
Journal Articles
- Distributed consensus-based estimation of the leading eigenvalue of a non-negative irreducible matrix
- ELSEVIER SCIENCE BV
- Analyzing the research grant process in Iran's National Elites Foundation : An approach based on process mining and machine learning
- conference
- Designing and implementing of a graph planner for intelligent selection of security controls: a case study of Islamic Republic of Iran Police
- فناوري اطلاعات و ارتباطات انتظامي
- Behavior-Based Online Anomaly Detection for a Nationwide Short Message Service
- Journal of Artificial Intelligence & Data Mining=Journal of AI and Data Mining
- Secure information sharing in social agent interactions using information flow analysis
- Engineering Applications of Artificial Intelligence
- A Deterministic Multiple Key Space Scheme for Wireless Sensor Networks via Combinatorial Designs
- Journal of Communication Engineering
Conferences Articles
- A Framework for Automatic Security Verification of Android Apps
- همايش ملي امنيت سامانه هاي هوشمند همراه
- A Framework for Automatic Security Verification of Android Apps
- همايش ملي امنيت سامانه هاي هوشمند همراه
- Multi-agent Negotiation of Virtual Machine Migration Using the Lightweight Coordination Calculus
- KES International Conference, Agent and Multi-Agent Systems. Technologies and Applications
- Intrusion Detection in Open Peer-to-Peer Multi-Agent Systems
- International Conference on Autonomous Infrastructure, Management and Security
- Probing Attacks on Multi-Agent Systems Using Electronic Institutions
- Declarative Agent Languages and Technologies Workshop
- Security Verification of Interaction Models in Open Multi-agent Systems
- International Conference on Verified Software: Theories, Tools and Experiments
- Security Verification of Interaction Models in Open Multi-agent Systems
- International Conference on Verified Software: Theories, Tools and Experiments
- A Methodology for Mobile Network Security Risk Management
- International Conference on Information Technology: New Generations
- HIDMN: A Host and Network-Based Intrusion Detection for Mobile Networks
- International Conference on Computer and Electrical Engineering
Thesis
- Designing and implementing of a graph planner for intelligent selection of security controls in cybersecurity management modelsstatndars
- 1400/05/24 Shahriar Bijani (استاد راهنما 1)
- Reviewing and comparing consensus algorithms on blockchain
- 1399/06/11 Shahriar Bijani (استاد راهنما 1)
- Providing a Framework for Preserving Privacy in Distributed Machine Learning
- 1398/11/08 Shahriar Bijani (استاد راهنما 1)
- Using Smart Phone Secure Elements for Important Applications and Data Exchanges
- 1397/07/26 Shahriar Bijani ()
- Automatic Security Verification of Java-based Android Applications
- 1396/11/18 Shahriar Bijani (استاد راهنما 1)