Alireza Shameli-Sendi

Orcid: 0000-0002-4723-5793

Affiliations:
  • Shahid Beheshti University (SBU), Faculty of Computer Science and Engineering, Tehran, Iran
  • Polytechnique Montréal, Canada (PhD)


According to our database1, Alireza Shameli-Sendi authored at least 38 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Convergence of the Harris hawks optimization algorithm and fuzzy system for cloud-based task scheduling enhancement.
Clust. Comput., July, 2024

Reducing cold start delay in serverless computing using lightweight virtual machines.
J. Netw. Comput. Appl., 2024

I-RECON: An IoT-Based Search Engine for Internet-Facing Services Vulnerability Reconnaissance.
IEEE Access, 2024

APTracker: A Comprehensive and Analytical Malware Dataset Based on Attribution to APT Groups.
IEEE Access, 2024

2023
A security vulnerability predictor based on source code metrics.
J. Comput. Virol. Hacking Tech., November, 2023

Energy and carbon-aware initial VM placement in geographically distributed cloud data centers.
Sustain. Comput. Informatics Syst., September, 2023

Detection of microservice-based software anomalies based on OpenTracing in cloud.
Softw. Pract. Exp., August, 2023

A multi-objective cloud energy optimizer algorithm for federated environments.
J. Parallel Distributed Comput., April, 2023

Intelligence in security countermeasures selection.
J. Comput. Virol. Hacking Tech., March, 2023

Anomaly detection on OpenStack logs based on an improved robust principal component analysis model and its projection onto column space.
Softw. Pract. Exp., March, 2023

Automating the Translation of Cloud Users' High-Level Security Needs to an Optimal Placement Model in the Cloud Infrastructure.
IEEE Trans. Serv. Comput., 2023

2022
A Quality of Service Aware VM Placement for User Applications in Cloud Data Center.
Proceedings of the International Conference on Communications, 2022

2021
Understanding Linux kernel vulnerabilities.
J. Comput. Virol. Hacking Tech., 2021

A Scalable Stateful Approach for Virtual Security Functions Orchestration.
IEEE Trans. Parallel Distributed Syst., 2021

2020
Dynamic Firewall Decomposition and Composition in the Cloud.
IEEE Trans. Inf. Forensics Secur., 2020

An efficient security data-driven approach for implementing risk assessment.
J. Inf. Secur. Appl., 2020

2019
Efficient Provisioning of Security Service Function Chaining Using Network Security Defense Patterns.
IEEE Trans. Serv. Comput., 2019

A scalable network-aware framework for cloud monitoring orchestration.
J. Netw. Comput. Appl., 2019

2018
Dynamic Optimal Countermeasure Selection for Intrusion Response System.
IEEE Trans. Dependable Secur. Comput., 2018

Realtime intrusion risk assessment model based on attack and service dependency graphs.
Comput. Commun., 2018

Software Project Estimation Using Improved Use Case Point.
Proceedings of the 16th IEEE International Conference on Software Engineering Research, 2018

2017
Payless Monitoring Service for Tenants in Cloud with Traffic and Energy-Aware Function Deployment.
Proceedings of the IEEE International Conference on Cloud Computing Technology and Science, 2017

2016
Taxonomy of information security risk assessment (ISRA).
Comput. Secur., 2016

2015
Online Incremental Clock Synchronization.
J. Netw. Syst. Manag., 2015

Taxonomy of Distributed Denial of Service mitigation approaches for cloud computing.
J. Netw. Comput. Appl., 2015

ORCEF: Online response cost evaluation framework for intrusion response system.
J. Netw. Comput. Appl., 2015

Optimal placement of sequentially ordered virtual security appliances in the cloud.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

A Defense-Centric Model for Multi-step Attack Damage Cost Evaluation.
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015

Multistage OCDO: Scalable Security Provisioning Optimization in SDN-Based Cloud.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

2014
ARITO: Cyber-attack response system using accurate risk impact tolerance.
Int. J. Inf. Sec., 2014

Taxonomy of intrusion risk assessment and response system.
Comput. Secur., 2014

Cloud Computing: A Risk Assessment Model.
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014

2013
A Retroactive-Burst Framework for Automated Intrusion Response System.
J. Comput. Networks Commun., 2013

Multilevel label placement for execution trace events.
Proceedings of the 26th IEEE Canadian Conference on Electrical and Computer Engineering CCECE 2013, 2013

2012
Real Time Intrusion Prediction based on Optimized Alerts with Hidden Markov Model.
J. Networks, 2012

System Health Monitoring Using a Novel Method: Security Unified Process.
J. Comput. Networks Commun., 2012

2010
A Reliable and Efficient Time Synchronization Protocol for Heterogeneous Wireless Sensor Network.
Wirel. Sens. Netw., 2010

L-SYNC: Larger Degree Clustering Based Time-Synchronisation for Wireless Sensor Network.
Proceedings of the Eighth ACIS International Conference on Software Engineering Research, 2010


  Loading...