Mohammad Karami

According to our database1, Mohammad Karami authored at least 14 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Integration of the Non-linear Time Series GARCH Model with Fuzzy Model Optimized with Water Cycle Algorithm for River Streamflow Forecasting.
Int. J. Comput. Intell. Syst., December, 2024

2023
Real-time simulation of viscoelastic tissue behavior with physics-guided deep learning.
Comput. Medical Imaging Graph., March, 2023

2021
Design and Implementation of an Intelligent Control System for a Lower-Limb Exoskeleton to Reduce Human Energy Consumption.
Proceedings of the 10th International Conference on Modern Circuits and Systems Technologies, 2021

2018
Attribution of Economic Denial of Sustainability Attacks in Public Clouds.
EAI Endorsed Trans. Security Safety, 2018

2017
Linking Amplification DDoS Attacks to Booter Services.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

2016
Stress Testing the Booters: Understanding and Undermining the Business of DDoS Services.
Proceedings of the 25th International Conference on World Wide Web, 2016

You've Got Vulnerability: Exploring Effective Vulnerability Notifications.
Proceedings of the 25th USENIX Security Symposium, 2016

Attribution of Economic Denial of Sustainability Attacks in Public Clouds.
Proceedings of the Security and Privacy in Communication Networks, 2016

2014
Search + Seizure: The Effectiveness of Interventions on SEO Campaigns.
Proceedings of the 2014 Internet Measurement Conference, 2014

2013
Rent to Pwn: Analyzing Commodity Booter DDoS Services.
login Usenix Mag., 2013

Behavioral Analysis of Android Applications Using Automated Instrumentation.
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013

Understanding the Emerging Threat of DDoS-as-a-Service.
Proceedings of the 6th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2013

Folex: An analysis of an herbal and counterfeit luxury goods affiliate program.
Proceedings of the 2013 APWG eCrime Researchers Summit, 2013

2009
A robust trust establishment framework using Dempster-Shafer theory for MANETs.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009


  Loading...