Mahdi Abadi
Orcid: 0000-0002-3714-1902
According to our database1,
Mahdi Abadi
authored at least 32 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
ACM Comput. Surv., February, 2024
2022
ISC Int. J. Inf. Secur., 2022
2021
A differentially private location generalization approach to guarantee non-uniform privacy in moving objects databases.
Knowl. Based Syst., 2021
Enhancing spatial and temporal utilities in differentially private moving objects database release.
Int. J. Inf. Sec., 2021
2020
J. Supercomput., 2020
A fully spatial personalized differentially private mechanism to provide non-uniform privacy guarantees for spatial databases.
Inf. Syst., 2020
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020
2019
HLMD: a signature-based approach to hardware-level behavioral malware detection and classification.
J. Supercomput., 2019
Appl. Intell., 2019
PDP-SAG: Personalized Privacy Protection in Moving Objects Databases by Combining Differential Privacy and Sensitive Attribute Generalization.
IEEE Access, 2019
2018
PLDP-TD: Personalized-location differentially private data analysis on trajectory databases.
Pervasive Mob. Comput., 2018
Proceedings of the 2018 IEEE International Conference on Smart Computing, 2018
Proceedings of the 15th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2018
SocialBotHunter: Botnet Detection in Twitter-Like Social Networking Services Using Semi-Supervised Collective Classification.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018
2017
CAFD: Detecting Collusive Frauds in Online Auction Networks by Combining One-Class Classification and Collective Classification.
Proceedings of the 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2017
2016
PPTD: Preserving personalized privacy in trajectory data publishing by sensitive attribute generalization and trajectory local suppression.
Knowl. Based Syst., 2016
2015
BeeOWA: A novel approach based on ABC algorithm and induced OWA operators for constructing one-class classifier ensembles.
Neurocomputing, 2015
DFBotKiller: Domain-flux botnet detection based on the history of group activities and failures in DNS traffic.
Digit. Investig., 2015
Comput. Electr. Eng., 2015
2014
Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, USA, March 28, 2014
2013
Proceedings of the 10th International ISC Conference on Information Security and Cryptology, 2013
2012
ISC Int. J. Inf. Secur., 2012
BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms.
ISC Int. J. Inf. Secur., 2012
A Clustering-Based Approach for Personalized Privacy Preserving Publication of Moving Object Trajectory Data.
Proceedings of the Network and System Security - 6th International Conference, 2012
A generalization-based approach for personalized privacy preservation in trajectory data publishing.
Proceedings of the 6th International Symposium on Telecommunications, 2012
2011
A hybrid model for correlating alerts of known and unknown attack scenarios and updating attack graphs.
Comput. Networks, 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
2010
A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs.
ISC Int. J. Inf. Secur., 2010
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010
2009
A novel quantum-inspired evolutionary algorithm for solving combinatorial optimization problems.
Proceedings of the Genetic and Evolutionary Computation Conference, 2009
2008
Minimization Analysis of Network Attack Graphs Using Genetic Algorithms.
Int. J. Comput. Their Appl., 2008
A multi-start quantum-inspired evolutionary algorithm for solving combinatorial optimization problems.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008