Mohammad Abdollahi Azgomi
Orcid: 0000-0002-9605-8412
According to our database1,
Mohammad Abdollahi Azgomi
authored at least 105 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Soft Comput., January, 2024
Int. J. Commun. Syst., 2024
2023
Internet Things, October, 2023
2022
An intelligent parking management system using RFID technology based on user preferences.
Soft Comput., December, 2022
A privacy-preserving authentication scheme based on Elliptic Curve Cryptography and using Quotient Filter in fog-enabled VANET.
Ad Hoc Networks, 2022
2021
A Novel Clustering Protocol Based on Willow Butterfly Algorithm for Diffusing Data in Wireless Sensor Networks.
Wirel. Pers. Commun., 2021
An approach based on multiplex networks for modeling cascading trust failures in social networks.
J. Comput. Sci., 2021
Model-based evaluation of the power versus performance of network routing algorithms.
Computing, 2021
2020
Analytical evaluation of resource allocation algorithms and process migration methods in virtualized systems.
Sustain. Comput. Informatics Syst., 2020
An uncertainty-aware computational trust model considering the co-existence of trust and distrust in social networks.
Inf. Sci., 2020
2019
Evaluation of the impacts of failures and resource heterogeneity on the power consumption and performance of IaaS clouds.
J. Supercomput., 2019
SQME: a framework for modeling and evaluation of software architecture quality attributes.
Softw. Syst. Model., 2019
Modelling and evaluation of the security of cyber-physical systems using stochastic Petri nets.
IET Cyper-Phys. Syst.: Theory & Appl., 2019
A novel trust evolution algorithm based on a quantum-like model of computational trust.
Cogn. Technol. Work., 2019
Unified power and performance analysis of cloud computing infrastructure using stochastic reward nets.
Comput. Commun., 2019
2018
Telecommun. Syst., 2018
An approach based on the transferrable belief model for trust evaluation in web services.
Soft Comput., 2018
A Stochastic Game Model for Evaluating the Impacts of Security Attacks Against Cyber-Physical Systems.
J. Netw. Syst. Manag., 2018
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2018
Reliability evaluation of UML/DAM software architectures under parameter uncertainty.
IET Softw., 2018
2017
A method for evaluating the consequence propagation of security attacks in cyber-physical systems.
Future Gener. Comput. Syst., 2017
A game-theoretic approach to model and quantify the security of cyber-physical systems.
Comput. Ind., 2017
2016
Trust modeling based on a combination of fuzzy analytic hierarchy process and fuzzy VIKOR.
Soft Comput., 2016
Agent-based simulation of the dynamics of malware propagation in scale-free networks.
Simul., 2016
Predicting the behavior of attackers and the consequences of attacks against cyber-physical systems.
Secur. Commun. Networks, 2016
J. Comput. Sci., 2016
Inf. Syst. Frontiers, 2016
Quantitative evaluation of software security: an approach based on UML/SecAM and evidence theory.
ISC Int. J. Inf. Secur., 2016
Anomaly Detection in XML-Structured SOAP Messages Using Tree-Based Association Rule Mining.
CoRR, 2016
A model for malware propagation in scale-free networks based on rumor spreading process.
Comput. Networks, 2016
A hesitant fuzzy model of computational trust considering hesitancy, vagueness and uncertainty.
Appl. Soft Comput., 2016
2015
A method for fair propagation of user perceptions for trust management in composite services.
Serv. Oriented Comput. Appl., 2015
Modeling the propagation of topology-aware P2P worms considering temporal parameters.
Peer-to-Peer Netw. Appl., 2015
A stochastic epidemiological model for the propagation of active worms considering the dynamicity of network topology.
Peer-to-Peer Netw. Appl., 2015
Math. Soc. Sci., 2015
Int. J. Wavelets Multiresolution Inf. Process., 2015
Dynamics of a rumor-spreading model with diversity of configurations in scale-free networks.
Int. J. Commun. Syst., 2015
Differential privacy preserving clustering in distributed datasets using Haar wavelet transform.
Intell. Data Anal., 2015
Parametric multisingular hybrid Petri nets: Formal definitions and analysis techniques.
Inf. Comput., 2015
Model checking the observational determinism security property using PROMELA and SPIN.
Formal Aspects Comput., 2015
A multi-criteria decision-making formulation of trust using fuzzy analytic hierarchy process.
Cogn. Technol. Work., 2015
Proceedings of the Fundamentals of Software Engineering - 6th International Conference, 2015
Proceedings of the IEEE 28th Canadian Conference on Electrical and Computer Engineering, 2015
2014
A distributed simulation framework for modeling cyber attacks and the evaluation of security measures.
Simul., 2014
Secur. Commun. Networks, 2014
Intell. Data Anal., 2014
Fundam. Informaticae, 2014
Contextuality, Incompatibility and Biased Inference in a Quantum-like formulation of Computational Trust.
Adv. Complex Syst., 2014
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014
2013
SimGine: A simulation engine for stochastic discrete-event systems based on SDES description.
Simul., 2013
An Improved Technique for Privacy Preserving Clustering Based on Daubechies-2 Wavelet Transform.
Int. J. Wavelets Multiresolution Inf. Process., 2013
Comput. Networks, 2013
An efficient control-flow checking technique for the detection of soft-errors in embedded software.
Comput. Electr. Eng., 2013
2012
A high-performance and scalable multi-core aware software solution for network monitoring.
J. Supercomput., 2012
Modeling and verification of hybrid dynamic systems using multisingular hybrid Petri nets.
Theor. Comput. Sci., 2012
An improved method for test case prioritization by incorporating historical test case data.
Sci. Comput. Program., 2012
A game theoretic framework for evaluation of the impacts of hackers diversity on security measures.
Reliab. Eng. Syst. Saf., 2012
2011
On the Use of Haar Wavelet Transform and Scaling Data perturbation for Privacy Preserving Clustering of Large Datasets.
Int. J. Wavelets Multiresolution Inf. Process., 2011
A privacy preserving clustering technique for horizontally and vertically distributed datasets.
Intell. Data Anal., 2011
On the impacts of join and leave on the propagation ratio of topology-aware active worms.
Proceedings of the 4th International Conference on Security of Information and Networks, 2011
An SIR model for the propagation of topology-aware active worms considering the join and leave of hosts.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011
2010
Intell. Data Anal., 2010
Task scheduling modelling and reliability evaluation of grid services using coloured Petri nets.
Future Gener. Comput. Syst., 2010
CoRR, 2010
Proceedings of the 3rd International Conference on Security of Information and Networks, 2010
2009
A Method for Estimation of the Success Probability of an Intrusion Process by Considering the Temporal Aspects of the Attacker Behavior.
Trans. Comput. Sci., 2009
Conflict-free scheduling and routing of automated guided vehicles in mesh topologies.
Robotics Auton. Syst., 2009
Incorporating Historical Test Case Performance Data and Resource Constraints into Test Case Prioritization.
Proceedings of the Tests and Proofs - 3rd International Conference, 2009
A scalable multi-core aware software architecture for high-performance network monitoring.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009
Security Evaluation of an Intrusion Tolerant Web Service Architecture Using Stochastic Activity Networks.
Proceedings of the Advances in Information Security and Assurance, 2009
Proceedings of the Information Systems, Technology and Management, 2009
An Overview of a Hybrid Fraud Scoring and Spike Detection Technique for Fraud Detection in Streaming Data.
Proceedings of the Information Systems, Technology and Management, 2009
Proceedings of the Information Systems, Technology and Management, 2009
Proceedings of the Information Systems, Technology and Management, 2009
Improving Route Stability and Overhead on AODV Routing Protocol and Make it Usable for VANET.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2009 Workshops), 2009
A Game Theoretic Approach for Quantitative Evaluation of Strategic Interactions between Hacker's Motivations.
Proceedings of the EMS 2009, 2009
Proceedings of the Digital Business - First Iternational ICST Conference, 2009
A Game Theoretic Approach for Quantitative Evaluation of Security by Considering Hackers with Diverse Behaviors.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009
Implementation of Coloured Stochastic Activity Networks within the PDETool Framework.
Proceedings of the Third Asia International Conference on Modelling & Simulation, 2009
PDETool: A Multi-formalism Modeling Tool for Discrete-Event Systems Based on SDES Description.
Proceedings of the Applications and Theory of Petri Nets, 2009
A distributed attack simulation for quantitative security evaluation using SimEvents.
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009
Proceedings of the The Forth International Conference on Availability, 2009
Proceedings of the 11th International Conference on Electronic Commerce 2009, 2009
2008
Performance Evaluation of Sensor Medium Access Control Protocol Using Coloured Petri Nets.
Proceedings of the First Workshop on Formal Methods for Wireless Systems, 2008
Proceedings of the Second IEEE/IFIP International Symposium on Theoretical Aspects of Software Engineering, 2008
The Influence of Efficient Message Passing Mechanisms on High Performance Distributed Scientific Computing.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2008
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
Performance Modeling of a Distributed Web Crawler Using Stochastic Activity Networks.
Proceedings of the Advances in Computer Science and Engineering, 2008
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008
2007
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007
2006
Modeling and Evaluation of Software Systems with Object Stochastic Activity Networks.
Proceedings of the International Conference on Software Engineering Advances (ICSEA 2006), October 28, 2006
Proceedings of the International Conference on Software Engineering Advances (ICSEA 2006), October 28, 2006
2005
Simul. Model. Pract. Theory, 2005
Proceedings of the First IPM International Workshop on Foundations of Software Engineering, 2005
2004
Proceedings of the 1st International Conference on Quantitative Evaluation of Systems (QEST 2004), 2004
2002
An Introduction to New Extensions for Stochastic Activity Networks.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2002