Mehdi Shajari
Orcid: 0000-0003-0974-3866
According to our database1,
Mehdi Shajari
authored at least 38 papers
between 2003 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2022
2021
Proceedings of the 26th International Computer Conference, Computer Society of Iran, 2021
2020
IEEE Trans. Serv. Comput., 2020
A language and a pattern system for temporal property specification: advanced metering infrastructure case study.
Int. J. Inf. Sec., 2020
Industrial control system security taxonomic framework with application to a comprehensive incidents survey.
Int. J. Crit. Infrastructure Prot., 2020
Computation integrity assurance for emerging distributed computation outsourcing environments, the case of block withholding attack on Bitcoin pools.
IET Inf. Secur., 2020
An aggregated statistical approach for network flood detection using Gamma-Normal mixture modeling.
Comput. Commun., 2020
2019
Word sense disambiguation application in sentiment analysis of news headlines: an applied approach to FOREX market prediction.
J. Intell. Inf. Syst., 2019
An incentive mechanism to promote honesty among seller agents in electronic marketplaces.
Electron. Commer. Res., 2019
Decentralized and secure delivery network of IoT update files based on ethereum smart contracts and blockchain technology.
Proceedings of the 29th Annual International Conference on Computer Science and Software Engineering, 2019
2018
Cost-sensitive payment card fraud detection based on dynamic random forest and <i>k</i>-nearest neighbors.
Expert Syst. Appl., 2018
Comput. Secur., 2018
2016
Improving recommender systems' performance on cold-start users and controversial items by a new similarity model.
Int. J. Web Inf. Syst., 2016
Intelligent Automated Intrusion Response System based on fuzzy decision making and risk assessment.
Proceedings of the 8th IEEE International Conference on Intelligent Systems, 2016
2015
A comprehensive security control selection model for inter-dependent organizational assets structure.
Inf. Comput. Secur., 2015
2014
2012
J. Comput. Networks Commun., 2012
Electron. Commer. Res., 2012
Proceedings of the 6th International Symposium on Telecommunications, 2012
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012
2011
Using Genre Interest of Users to Detect Profile Injection Attacks in Movie Recommender Systems.
Proceedings of the 10th International Conference on Machine Learning and Applications and Workshops, 2011
Proceedings of the 13th International Conference on Electronic Commerce, 2011
2010
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010
Mobile Partial Identity Management: The Non-repudiable Minimal Mobile Identity Model.
Proceedings of the Future Generation Information Technology, 2010
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010
Proceedings of the 12th International Conference on Electronic Commerce, 2010
Proceedings of the 12th International Conference on Electronic Commerce, 2010
2009
Proceedings of the 2009 Second International Conference on Environmental and Computer Science, 2009
Proceedings of the 11th International Conference on Electronic Commerce 2009, 2009
2005
Proceedings of the Fifth International Conference on Intelligent Systems Design and Applications (ISDA 2005), 2005
2004
Proceedings of the Second Annual Conference on Privacy, 2004
2003
Using Fuzzy System to Manage False Alarms in Intrusion Detection.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003