Maghsoud Abbaspour

Orcid: 0000-0002-7126-7381

According to our database1, Maghsoud Abbaspour authored at least 52 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SIoT identity management with the ability to preserve owner privacy and built-in resistance to Sybil attacks.
Concurr. Comput. Pract. Exp., October, 2024

SybilPSIoT: Preventing Sybil attacks in signed social internet of things based on web of trust and smart contract.
IET Commun., February, 2024

2023
Friendship Preference: Scalable and Robust Category of Features for Social Bot Detection.
IEEE Trans. Dependable Secur. Comput., 2023

2021
Optimal Spectrum Allocation Based on Primary User Activity Model in Cognitive Radio Wireless Sensor Networks.
Wirel. Pers. Commun., 2021

SLA-based service provisioning approach in vehicular cloud network.
Clust. Comput., 2021

2020
CCVNet: A Modified Content-Centric Approach to Enable Multiple Types of Applications in Vehicular Networks.
Wirel. Pers. Commun., 2020

A density-aware probabilistic interest forwarding method for content-centric vehicular networks.
Veh. Commun., 2020

A two-phase sequential pattern mining framework to detect stealthy P2P botnets.
J. Inf. Secur. Appl., 2020

TOPVISOR: Two-level controller-based approach for service advertisement and discovery in vehicular cloud network.
Int. J. Commun. Syst., 2020

Economic feasibility study for stealthy socialbot network establishment.
IET Inf. Secur., 2020

2019
Optimum Temporal Coverage with Rotating Directional Sensors.
Wirel. Pers. Commun., 2019

On the resilience of P2P botnet footprints in the presence of legitimate P2P traffic.
Int. J. Commun. Syst., 2019

Does Homophily Make Socialbots More Influential? Exploring Infiltration Strategies.
CoRR, 2019

2018
An Anomaly-based Botnet Detection Approach for Identifying Stealthy Botnets.
CoRR, 2018

2016
An Energy-Efficient Hybrid Routing Method for Wireless Sensor Networks with Mobile Sink.
Wirel. Pers. Commun., 2016

Energy efficient area coverage by evolutionary camera node scheduling algorithms in visual sensor networks.
Soft Comput., 2016

Extracting fuzzy attack patterns using an online fuzzy adaptive alert correlation framework.
Secur. Commun. Networks, 2016

2015
A static heuristic approach to detecting malware targets.
Secur. Commun. Networks, 2015

2014
ISEFF: An ID-Based Scalable and EFficient Distributed File Sharing Technique in Vehicular Ad Hoc Networks.
Wirel. Pers. Commun., 2014

CR-CEA: A collision- and energy-aware routing method for cognitive radio wireless sensor networks.
Wirel. Networks, 2014

Overhead-controlled contention-based routing for VANETs.
Int. J. Commun. Networks Inf. Secur., 2014

2013
Energy efficient camera node activation control in multi-tier wireless visual sensor networks.
Wirel. Networks, 2013

Securing BitTorrent using a new reputation-based trust management system.
Peer-to-Peer Netw. Appl., 2013

A reliable and timely medium access control protocol for vehicular ad hoc networks.
Int. J. Ad Hoc Ubiquitous Comput., 2013

IFRP: an intrusion/fault tolerant routing protocol for increasing resiliency and reliability in wireless sensor networks.
Int. J. Ad Hoc Ubiquitous Comput., 2013

An adaptive CSMA/TDMA hybrid MAC for energy and throughput improvement of wireless sensor networks.
Ad Hoc Networks, 2013

2012
Adaptive Anomaly-Based Intrusion Detection System Using Fuzzy Controller.
Int. J. Netw. Secur., 2012

<i>K-Coverage</i> Persevering Routing Technique Based on Event Occurrence Patterns for Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2012

GASANT: An ant-inspired least-cost QoS multicast routing approach based on genetic and simulated annealing algorithms.
Int. J. Comput. Commun. Control, 2012

A new queuing management mechanism for congestion performance improvement in wireless multimedia sensor networks.
Proceedings of the 6th International Symposium on Telecommunications, 2012

Usefulness of multicast routing protocols for vehicular Ad-hoc networks.
Proceedings of the 6th International Symposium on Telecommunications, 2012

2011
Hardware design of a new genetic based disk scheduling method.
Real Time Syst., 2011

SEFF: A scalable and efficient distributed file sharing technique in Vehicular Ad Hoc Networks.
Proceedings of the IEEE 17th Asia-Pacific Conference on Communications, 2011

2010
FoV-Clustering as a solution to a novel camera node activation problem in WVSNs.
Proceedings of the 3rd IFIP Wireless Days Conference 2010, 2010

A Centralized Approach for Secure Location Verification in Wireless Sensor Networks.
Proceedings of the Sensor Systems and Software - Second International ICST Conference, 2010

Dual-Path Peer-to-Peer Anonymous Approach.
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010

2009
High-Resolution Images with Minimum Energy Dissipation and Maximum Field-of-View in Camera-Based Wireless Multimedia Sensor Networks.
Sensors, 2009

A Real-Time Scheduling Algorithm for Soft Periodic Tasks.
J. Digit. Content Technol. its Appl., 2009

Modified Tinyos for Energy Efficient Image Transmission in Wireless Multimedia Sensor Networks.
Proceedings of the ISCA First International Conference on Sensor Networks and Applications (SNA-2009), 2009

EMP-DSR: An Enhanced Multi-path Dynamic Source Routing Algorithm for MANETs Based on Ant Colony Optimization.
Proceedings of the Third Asia International Conference on Modelling & Simulation, 2009

2008
An automatic method for Instruction-set extension generation using the center of gravity concept.
IEICE Electron. Express, 2008

ET-MAC: An Energy-Efficient and High Throughput MAC Protocol for Wireless Sensor Networks.
Proceedings of the Sixth Annual Conference on Communication Networks and Services Research (CNSR 2008), 2008

2007
High Level Synthesis of Degradable ASICs Using Virtual Binding.
Proceedings of the 25th IEEE VLSI Test Symposium (VTS 2007), 2007

RAAS: a reliable analyzer and archiver for snort intrusion detection system.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

DACA: Dynamic Advanced Clustering Algorithm for Sensor Networks.
Proceedings of the 14th IEEE International Conference on Electronics, 2007

APDL: A Processor Description Language For Design Space Exploration of Embedded Processors.
Proceedings of the Forum on specification and Design Languages, 2007

Optimal Placement of Frequently Accessed IPs in Mesh NoCs.
Proceedings of the Advances in Computer Systems Architecture, 2007

A Novel Method for Leader Election Algorithm.
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007

Challenge in QoS Supporting via Integrating Differentiated Service and Multipath Routing on Mobile Ad Hoc Network.
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007

2006
A heuristic routing mechanism using a new addressing scheme.
Proceedings of the 1st International ICST Conference on Bio Inspired Models of Network, 2006

2003
Utilizing Various ADL Facets for Instruction Level CPU Test.
Proceedings of the Fourth International Workshop on Microprocessor Test and Verification, 2003

2002
Retargetable binary utilities.
Proceedings of the 39th Design Automation Conference, 2002


  Loading...