Forough Ja'fari

Orcid: 0000-0001-7176-9456

According to our database1, Forough Ja'fari authored at least 27 papers between 2021 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Privacy-Aware and AI Techniques for Healthcare Based on K-Anonymity Model in Internet of Things.
IEEE Trans. Engineering Management, 2024

Encryption as a Service for IoT: Opportunities, Challenges, and Solutions.
IEEE Internet Things J., 2024

Enhanced Efficiency in Fog Computing: A Fuzzy Data-Driven Machine Selection Strategy.
Int. J. Fuzzy Syst., 2024

A comprehensive survey on cyber deception techniques to improve honeypot performance.
Comput. Secur., 2024

Deploying Testbed Docker-based application for Encryption as a Service in Kubernetes.
Proceedings of the International Conference on Software, 2024

Encryption as a Service: A Review of Architectures and Taxonomies.
Proceedings of the Distributed Applications and Interoperable Systems, 2024

2023
Hierarchical Clustering Based on Dendrogram in Sustainable Transportation Systems.
IEEE Trans. Intell. Transp. Syst., December, 2023

Setting up SLAs using a dynamic pricing model and behavior analytics in business and marketing strategies in cloud computing.
Pers. Ubiquitous Comput., December, 2023

Improving Resources in Internet of Vehicles Transportation Systems Using Markov Transition and TDMA Protocol.
IEEE Trans. Intell. Transp. Syst., November, 2023

Reinforcement Learning-Based Slice Isolation Against DDoS Attacks in Beyond 5G Networks.
IEEE Trans. Netw. Serv. Manag., September, 2023

Task processing optimization using cuckoo particle swarm (CPS) algorithm in cloud computing infrastructure.
Clust. Comput., February, 2023

A hybrid heuristics artificial intelligence feature selection for intrusion detection classifiers in cloud of things.
Clust. Comput., February, 2023

DMAIDPS: a distributed multi-agent intrusion detection and prevention system for cloud IoT environments.
Clust. Comput., February, 2023

Mapping and embedding infrastructure resource management in software defined networks.
Clust. Comput., February, 2023

Toward a Secure Industrial Wireless Body Area Network Focusing MAC Layer Protocols: An Analytical Review.
IEEE Trans. Ind. Informatics, 2023

SCEMA: An SDN-Oriented Cost-Effective Edge-Based MTD Approach.
IEEE Trans. Inf. Forensics Secur., 2023

An intelligent energy-efficient approach for managing IoE tasks in cloud platforms.
J. Ambient Intell. Humaniz. Comput., 2023

An Energy-optimized Embedded load balancing using DVFS computing in Cloud Data centers.
Comput. Commun., 2023

A Mathematical Model for Analyzing Honeynets and Their Cyber Deception Techniques.
Proceedings of the 27th International Conference on Engineering of Complex Computer Systems, 2023

Enhancing 5G Network Slicing: Slice Isolation Via Actor-Critic Reinforcement Learning with Optimal Graph Features.
Proceedings of the IEEE Global Communications Conference, 2023

Cybersecurity Fusion: Leveraging Mafia Game Tactics and Reinforcement Learning for Botnet Detection.
Proceedings of the IEEE Global Communications Conference, 2023

2022
CL-MLSP: The design of a detection mechanism for sinkhole attacks in smart cities.
Microprocess. Microsystems, April, 2022

Improving Quality of Service in 5G Resilient Communication with the Cellular Structure of Smartphones.
ACM Trans. Sens. Networks, 2022

GSAGA: A hybrid algorithm for task scheduling in cloud infrastructure.
J. Supercomput., 2022

Traffic flow control using multi-agent reinforcement learning.
J. Netw. Comput. Appl., 2022

A Cost-Effective MTD Approach for DDoS Attacks in Software-Defined Networks.
Proceedings of the IEEE Global Communications Conference, 2022

2021
An intelligent botnet blocking approach in software defined networks using honeypots.
J. Ambient Intell. Humaniz. Comput., 2021


  Loading...