Saeed Jalili
Orcid: 0000-0002-4333-3097
According to our database1,
Saeed Jalili
authored at least 74 papers
between 2005 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Inf. Softw. Technol., December, 2023
Computing, December, 2023
2021
IEEE Trans. Knowl. Data Eng., 2021
ISC Int. J. Inf. Secur., 2021
Proceedings of the 26th International Computer Conference, Computer Society of Iran, 2021
2020
Effective defense against fingerprinting attack based on autocorrelation property minimization approach.
J. Intell. Inf. Syst., 2020
2019
On the computational power of the light: A plan for breaking data encryption standard.
Theor. Comput. Sci., 2019
J. Netw. Syst. Manag., 2019
Voxel selection framework based on meta-heuristic search and mutual information for brain decoding.
Int. J. Imaging Syst. Technol., 2019
2018
J. Biomed. Informatics, 2018
C-PUGP: A cluster-based positive unlabeled learning method for disease gene prediction and prioritization.
Comput. Biol. Chem., 2018
Appl. Intell., 2018
2017
Trans. Data Priv., 2017
Eng. Appl. Artif. Intell., 2017
Data Min. Knowl. Discov., 2017
2016
J. Comput. Sci., 2016
Expert Syst. Appl., 2016
Enhancing aggregation phase of microaggregation methods for interval disclosure risk minimization.
Data Min. Knowl. Discov., 2016
Comput. Commun., 2016
2015
Pattern Recognit., 2015
Automated software design using ant colony optimization with semantic network support.
J. Syst. Softw., 2015
Inf. Softw. Technol., 2015
Preference-based anonymization of numerical datasets by multi-objective microaggregation.
Inf. Fusion, 2015
Computing, 2015
Comput. Electr. Eng., 2015
CAMWI: Detecting protein complexes using weighted clustering coefficient and weighted density.
Comput. Biol. Chem., 2015
Source code and design conformance, design pattern detection from source code by classification approach.
Appl. Soft Comput., 2015
2014
Knowl. Based Syst., 2014
A clustering-based model for class responsibility assignment problem in object-oriented analysis.
J. Syst. Softw., 2014
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014
2013
IEEE ACM Trans. Comput. Biol. Bioinform., 2013
J. Object Technol., 2013
Protein fold recognition with a two-layer method based on SVM-SA, WP-NN and C4.5 (TLM-SNC).
Int. J. Data Min. Bioinform., 2013
Fusion of one-class classifiers for protocol-based anomaly detection in AODV-based mobile ad hoc networks.
Int. J. Ad Hoc Ubiquitous Comput., 2013
Future Gener. Comput. Syst., 2013
Appl. Intell., 2013
2012
J. Supercomput., 2012
WSCMon: runtime monitoring of web service orchestration based on refinement checking.
Serv. Oriented Comput. Appl., 2012
J. Syst. Softw., 2012
Neurocomputing, 2012
Proceedings of the Optical Supercomputing - 4th International Workshop, 2012
Proceedings of the 6th International Symposium on Telecommunications, 2012
Proceedings of the 6th International Symposium on Telecommunications, 2012
2011
A hybrid model for correlating alerts of known and unknown attack scenarios and updating attack graphs.
Comput. Networks, 2011
2010
J. Object Technol., 2010
A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs.
ISC Int. J. Inf. Secur., 2010
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010
Proceedings of the Optical Supercomputing - Third International Workshop, 2010
2009
Proceedings of the 6th International Workshop on Formal Aspects of Component Software, 2009
Verification of Distributed Firewalls Configuration vs. Security Policies Using <i>A</i><i>L</i><i>C</i><i>Q</i><i>I</i>(<i>d</i>).
Appl. Artif. Intell., 2009
Proceedings of the Optical SuperComputing, Second International Workshop, 2009
A novel quantum-inspired evolutionary algorithm for solving combinatorial optimization problems.
Proceedings of the Genetic and Evolutionary Computation Conference, 2009
Proceedings of the Feature Interactions in Software and Communication Systems X, 2009
Correlating Alerts into Compressed Graphs Using an Attribute-Based Method and Time Windows.
Proceedings of the Security Technology, 2009
Proceedings of the Workshops Proceedings of the 12th IEEE International Enterprise Distributed Object Computing Conference, 2009
2008
Minimization Analysis of Network Attack Graphs Using Genetic Algorithms.
Int. J. Comput. Their Appl., 2008
A multi-start quantum-inspired evolutionary algorithm for solving combinatorial optimization problems.
Proceedings of the Genetic and Evolutionary Computation Conference, 2008
2007
RVRTL: Run-Time Verification of Real-Time and Reactive Programs with Real-Time Logic Approach.
Proceedings of the 2007 International Conference on Software Engineering Research & Practice, 2007
RVERL: Run-time Verification of Real-time and Reactive Programs using Event-based Real-Time Logic Approach.
Proceedings of the 5th ACIS International Conference on Software Engineering Research, 2007
2005
Proceedings of the 12th Asia-Pacific Software Engineering Conference (APSEC 2005), 2005