Follow
Maghsoud Abbaspour
Maghsoud Abbaspour
Associate Professor, Shahid Beheshti University
Verified email at sbu.ac.ir - Homepage
Title
Cited by
Cited by
Year
An adaptive CSMA/TDMA hybrid MAC for energy and throughput improvement of wireless sensor networks
MHS Gilani, I Sarrafi, M Abbaspour
Ad Hoc Networks 11 (4), 1297-1304, 2013
1262013
An energy-efficient and high-quality video transmission architecture in wireless video-based sensor networks
HS Aghdasi, M Abbaspour, ME Moghadam, Y Samei
Sensors 8 (8), 4529-4559, 2008
682008
An anomaly-based botnet detection approach for identifying stealthy botnets
S Arshad, M Abbaspour, M Kharrazi, H Sanatkar
2011 IEEE International Conference on Computer Applications and Industrial …, 2011
572011
A static heuristic approach to detecting malware targets
M Zakeri, F Faraji Daneshgar, M Abbaspour
Security and Communication Networks 8 (17), 3015-3027, 2015
462015
Adaptive Anomaly-Based Intrusion Detection System Using Fuzzy Controller.
F Geramiraz, AS Memaripour, M Abbaspour
Int. J. Netw. Secur. 14 (6), 352-361, 2012
372012
Extracting fuzzy attack patterns using an online fuzzy adaptive alert correlation framework
F Faraji Daneshgar, M Abbaspour
Security and Communication Networks 9 (14), 2245-2260, 2016
322016
A density-aware probabilistic interest forwarding method for content-centric vehicular networks
R Tizvar, M Abbaspour
Vehicular Communications 23, 100216, 2020
282020
Retargetable binary utilities
M Abbaspour, J Zhu
Proceedings of the 39th annual Design Automation Conference, 331-336, 2002
262002
EMP-DSR: An enhanced multi-path dynamic source routing algorithm for MANETs based on ant colony optimization
EK Asl, M Damanafshan, M Abbaspour, M Noorhosseini, K Shekoufandeh
2009 Third Asia International Conference on Modelling & Simulation, 692-697, 2009
252009
Securing BitTorrent using a new reputation-based trust management system
B Shafiee Sarjaz, M Abbaspour
Peer-to-Peer Networking and Applications 6, 86-100, 2013
222013
Friendship preference: Scalable and robust category of features for social bot detection
SH Moghaddam, M Abbaspour
IEEE Transactions on Dependable and Secure Computing 20 (2), 1516-1528, 2022
212022
ET-MAC: An energy-efficient and high throughput MAC protocol for wireless sensor networks
HS Aghdasi, M Abbaspour
6th Annual Communication Networks and Services Research Conference (cnsr …, 2008
192008
Sensitivity analysis of static features for Android malware detection
SH Moghaddam, M Abbaspour
2014 22nd Iranian Conference on Electrical Engineering (ICEE), 920-924, 2014
182014
IFRP: an intrusion/fault tolerant routing protocol for increasing resiliency and reliability in wireless sensor networks
H Nabizadeh, M Abbaspour
International Journal of Ad Hoc and Ubiquitous Computing 14 (1), 52-69, 2013
172013
A novel STDMA MAC protocol for vehicular ad-hoc networks
L Rezazade, HS Aghdasi, SA Ghorashi, M Abbaspour
2011 International Symposium on Computer Networks and Distributed Systems …, 2011
172011
Raas: A reliable analyzer and archiver for snort intrusion detection system
M Soleimani, EK Asl, M Doroud, M Damanafshan, A Behzadi, ...
Proceedings of the 2007 ACM symposium on Applied computing, 259-263, 2007
172007
ISEFF: an ID-based scalable and efficient distributed file sharing technique in vehicular ad hoc networks
N Ahmadifard, H Nabizadeh, M Abbaspour
Wireless personal communications 75, 821-841, 2014
162014
TOPVISOR: Two‐level controller‐based approach for service advertisement and discovery in vehicular cloud network
F Jafari Kaleibar, M Abbaspour
International Journal of Communication Systems 33 (3), e4197, 2020
142020
High-resolution images with minimum energy dissipation and maximum field-of-view in camera-based wireless multimedia sensor networks
HS Aghdasi, P Bisadi, ME Moghaddam, M Abbaspour
Sensors 9 (8), 6385-6410, 2009
142009
A novel method for leader election algorithm
M Mirakhorli, AA Sharifloo, M Abbaspour
7th IEEE International Conference on Computer and Information Technology …, 2007
142007
The system can't perform the operation now. Try again later.
Articles 1–20