default search action
Maghsoud Abbaspour
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j31]Aboulfazl Dayyani, Maghsoud Abbaspour:
SIoT identity management with the ability to preserve owner privacy and built-in resistance to Sybil attacks. Concurr. Comput. Pract. Exp. 36(23) (2024) - [j30]Aboulfazl Dayyani, Maghsoud Abbaspour:
SybilPSIoT: Preventing Sybil attacks in signed social internet of things based on web of trust and smart contract. IET Commun. 18(3): 258-269 (2024) - 2023
- [j29]Samaneh Hosseini Moghaddam, Maghsoud Abbaspour:
Friendship Preference: Scalable and Robust Category of Features for Social Bot Detection. IEEE Trans. Dependable Secur. Comput. 20(2): 1516-1528 (2023) - 2021
- [j28]Farhoud Jafari Kaleibar, Maghsoud Abbaspour:
SLA-based service provisioning approach in vehicular cloud network. Clust. Comput. 24(4): 3693-3708 (2021) - [j27]Hamid Mohammad-Sedighi, Maghsoud Abbaspour:
Optimal Spectrum Allocation Based on Primary User Activity Model in Cognitive Radio Wireless Sensor Networks. Wirel. Pers. Commun. 118(1): 195-216 (2021) - 2020
- [j26]Samaneh Hosseini Moghaddam, Maghsoud Abbaspour:
Economic feasibility study for stealthy socialbot network establishment. IET Inf. Secur. 14(6): 694-703 (2020) - [j25]Farhoud Jafari Kaleibar, Maghsoud Abbaspour:
TOPVISOR: Two-level controller-based approach for service advertisement and discovery in vehicular cloud network. Int. J. Commun. Syst. 33(3) (2020) - [j24]Fatemeh Faraji Daneshgar, Maghsoud Abbaspour:
A two-phase sequential pattern mining framework to detect stealthy P2P botnets. J. Inf. Secur. Appl. 55: 102645 (2020) - [j23]Rojin Tizvar, Maghsoud Abbaspour:
A density-aware probabilistic interest forwarding method for content-centric vehicular networks. Veh. Commun. 23: 100216 (2020) - [j22]Rojin Tizvar, Maghsoud Abbaspour:
CCVNet: A Modified Content-Centric Approach to Enable Multiple Types of Applications in Vehicular Networks. Wirel. Pers. Commun. 113(1): 139-166 (2020)
2010 – 2019
- 2019
- [j21]Fatemeh Faraji Daneshgar, Maghsoud Abbaspour:
On the resilience of P2P botnet footprints in the presence of legitimate P2P traffic. Int. J. Commun. Syst. 32(13) (2019) - [j20]Rasoul Esmaeilzadeh, Maghsoud Abbaspour:
Optimum Temporal Coverage with Rotating Directional Sensors. Wirel. Pers. Commun. 105(1): 369-386 (2019) - [i3]Samaneh Hosseini Moghaddam, Mandana Khademi, Maghsoud Abbaspour:
Does Homophily Make Socialbots More Influential? Exploring Infiltration Strategies. CoRR abs/1903.06827 (2019) - 2018
- [i2]Sajjad Arshad, Maghsoud Abbaspour, Mehdi Kharrazi, Hooman Sanatkar:
An Anomaly-based Botnet Detection Approach for Identifying Stealthy Botnets. CoRR abs/1811.00925 (2018) - 2016
- [j19]Fatemeh Faraji Daneshgar, Maghsoud Abbaspour:
Extracting fuzzy attack patterns using an online fuzzy adaptive alert correlation framework. Secur. Commun. Networks 9(14): 2245-2260 (2016) - [j18]Hadi S. Aghdasi, Maghsoud Abbaspour:
Energy efficient area coverage by evolutionary camera node scheduling algorithms in visual sensor networks. Soft Comput. 20(3): 1191-1202 (2016) - [j17]Farhoud Jafari Kaleibar, Maghsoud Abbaspour, Hadi S. Aghdasi:
An Energy-Efficient Hybrid Routing Method for Wireless Sensor Networks with Mobile Sink. Wirel. Pers. Commun. 90(4): 2001-2015 (2016) - 2015
- [j16]Mohaddeseh Zakeri, Fatemeh Faraji Daneshgar, Maghsoud Abbaspour:
A static heuristic approach to detecting malware targets. Secur. Commun. Networks 8(17): 3015-3027 (2015) - 2014
- [j15]Hooman Sadeghian, Ali Farahani, Maghsoud Abbaspour:
Overhead-controlled contention-based routing for VANETs. Int. J. Commun. Networks Inf. Secur. 6(2) (2014) - [j14]Rojin Tizvar, Maghsoud Abbaspour, Mahdi Dehghani:
CR-CEA: A collision- and energy-aware routing method for cognitive radio wireless sensor networks. Wirel. Networks 20(7): 2037-2052 (2014) - [j13]Nasrin Ahmadifard, Hamid Nabizadeh, Maghsoud Abbaspour:
ISEFF: An ID-Based Scalable and EFficient Distributed File Sharing Technique in Vehicular Ad Hoc Networks. Wirel. Pers. Commun. 75(2): 821-841 (2014) - 2013
- [j12]Mohammad Hossein Sedighi Gilani, Iman Sarrafi, Maghsoud Abbaspour:
An adaptive CSMA/TDMA hybrid MAC for energy and throughput improvement of wireless sensor networks. Ad Hoc Networks 11(4): 1297-1304 (2013) - [j11]Lida Rezazade, Hadi S. Aghdasi, Seyed Ali Ghorashi, Maghsoud Abbaspour:
A reliable and timely medium access control protocol for vehicular ad hoc networks. Int. J. Ad Hoc Ubiquitous Comput. 12(4): 216-224 (2013) - [j10]Hamid Nabizadeh, Maghsoud Abbaspour:
IFRP: an intrusion/fault tolerant routing protocol for increasing resiliency and reliability in wireless sensor networks. Int. J. Ad Hoc Ubiquitous Comput. 14(1): 52-69 (2013) - [j9]Behrooz Shafiee Sarjaz, Maghsoud Abbaspour:
Securing BitTorrent using a new reputation-based trust management system. Peer-to-Peer Netw. Appl. 6(1): 86-100 (2013) - [j8]Hadi S. Aghdasi, Sara Nasseri, Maghsoud Abbaspour:
Energy efficient camera node activation control in multi-tier wireless visual sensor networks. Wirel. Networks 19(5): 725-740 (2013) - 2012
- [j7]Morteza Damanafshan, Ehsan Khosrowshahi Asl, Maghsoud Abbaspour:
GASANT: An ant-inspired least-cost QoS multicast routing approach based on genetic and simulated annealing algorithms. Int. J. Comput. Commun. Control 7(3): 417-431 (2012) - [j6]Majid Rafigh, Maghsoud Abbaspour:
K-Coverage Persevering Routing Technique Based on Event Occurrence Patterns for Wireless Sensor Networks. Int. J. Distributed Sens. Networks 8 (2012) - [j5]Farzaneh Geramiraz, Amir Saman Memaripour, Maghsoud Abbaspour:
Adaptive Anomaly-Based Intrusion Detection System Using Fuzzy Controller. Int. J. Netw. Secur. 14(6): 352-361 (2012) - [c19]Hadi S. Aghdasi, Nasser Torabi, Amin Rahmanzadeh, Massoud Aminiazar, Maghsoud Abbaspour:
Usefulness of multicast routing protocols for vehicular Ad-hoc networks. IST 2012: 459-463 - [c18]Omid Boroumand, Mahmood Kalemati, Maghsoud Abbaspour:
A new queuing management mechanism for congestion performance improvement in wireless multimedia sensor networks. IST 2012: 715-720 - 2011
- [j4]Hossein Rahmani, Mohammad Reza Bonyadi, Amir Momeni, Mohsen Ebrahimi Moghaddam, Maghsoud Abbaspour:
Hardware design of a new genetic based disk scheduling method. Real Time Syst. 47(1): 41-71 (2011) - [c17]Nasrin Ahmadifard, Hamid Nabizadeh, Maghsoud Abbaspour:
SEFF: A scalable and efficient distributed file sharing technique in Vehicular Ad Hoc Networks. APCC 2011: 456-460 - 2010
- [c16]Ehsan Saboori, Maghsoud Abbaspour:
Dual-Path Peer-to-Peer Anonymous Approach. ICPADS 2010: 835-838 - [c15]Abbas Ghebleh, Maghsoud Abbaspour, Saman Homayounnejad:
A Centralized Approach for Secure Location Verification in Wireless Sensor Networks. S-CUBE 2010: 151-163 - [c14]Hadi S. Aghdasi, Sara Nasseri, Maghsoud Abbaspour:
FoV-Clustering as a solution to a novel camera node activation problem in WVSNs. Wireless Days 2010: 1-5
2000 – 2009
- 2009
- [j3]Sedigheh Asiaban, Mohsen Ebrahimi Moghaddam, Maghsoud Abbaspour:
A Real-Time Scheduling Algorithm for Soft Periodic Tasks. J. Digit. Content Technol. its Appl. 3(4): 100-111 (2009) - [j2]Hadi S. Aghdasi, Pouya Bisadi, Mohsen Ebrahimi Moghaddam, Maghsoud Abbaspour:
High-Resolution Images with Minimum Energy Dissipation and Maximum Field-of-View in Camera-Based Wireless Multimedia Sensor Networks. Sensors 9(8): 6385-6410 (2009) - [c13]Ehsan Khosrowshahi Asl, Morteza Damanafshan, Maghsoud Abbaspour, Majid Noorhosseini, Kamran Shekoufandeh:
EMP-DSR: An Enhanced Multi-path Dynamic Source Routing Algorithm for MANETs Based on Ant Colony Optimization. Asia International Conference on Modelling and Simulation 2009: 692-697 - [c12]Mohammad Mehdi Faghih, Mohsen Ebrahimi Moghaddam, Maghsoud Abbaspour:
Modified Tinyos for Energy Efficient Image Transmission in Wireless Multimedia Sensor Networks. SNA 2009: 103-108 - 2008
- [j1]Payman Loloeyan, Maghsoud Abbaspour:
An automatic method for Instruction-set extension generation using the center of gravity concept. IEICE Electron. Express 5(15): 543-549 (2008) - [c11]Hadi S. Aghdasi, Maghsoud Abbaspour:
ET-MAC: An Energy-Efficient and High Throughput MAC Protocol for Wireless Sensor Networks. CNSR 2008: 526-532 - 2007
- [c10]Mostafa Esmaeili, Maghsoud Abbaspour, Hamid R. Alipour, Hamed Mousavi:
Challenge in QoS Supporting via Integrating Differentiated Service and Multipath Routing on Mobile Ad Hoc Network. CIT 2007: 359-368 - [c9]Mehdi Mirakhorli, Amir Azim Sharifloo, Maghsoud Abbaspour:
A Novel Method for Leader Election Algorithm. CIT 2007: 452-456 - [c8]Reza Moraveji, Hamid Sarbazi-Azad, Maghsoud Abbaspour:
Optimal Placement of Frequently Accessed IPs in Mesh NoCs. Asia-Pacific Computer Systems Architecture Conference 2007: 126-138 - [c7]Nima Honarmand, Hasan Sohofi, Maghsoud Abbaspour, Zainalabedin Navabi:
APDL: A Processor Description Language For Design Space Exploration of Embedded Processors. FDL 2007: 50-55 - [c6]Hamidreza Alipour, Maghsoud Abbaspour, Mostafa Esmaeili, Hamed Mousavi, Hamed Shahhoseini:
DACA: Dynamic Advanced Clustering Algorithm for Sensor Networks. ICECS 2007: 518-525 - [c5]Mahboobeh Soleimani, Ehsan Khosrowshahi Asl, Mina Doroud, Morteza Damanafshan, Akbar Behzadi, Maghsoud Abbaspour:
RAAS: a reliable analyzer and archiver for snort intrusion detection system. SAC 2007: 259-263 - [c4]Nima Honarmand, Ali Shahabi, Hasan Sohofi, Maghsoud Abbaspour, Zainalabedin Navabi:
High Level Synthesis of Degradable ASICs Using Virtual Binding. VTS 2007: 311-317 - [i1]Mohsen Ravanbakhsh, Yasin Abbasi-Yadkori, Maghsoud Abbaspour, Hamid Sarbazi-Azad:
A Heuristic Routing Mechanism Using a New Addressing Scheme. CoRR abs/0710.1924 (2007) - 2006
- [c3]Mohsen Ravanbakhsh, Yasin Abbasi-Yadkori, Maghsoud Abbaspour, Hamid Sarbazi-Azad:
A heuristic routing mechanism using a new addressing scheme. BIONETICS 2006: 37 - 2003
- [c2]Elham Safi, Zohreh Karimi, Maghsoud Abbaspour, Zainalabedin Navabi:
Utilizing Various ADL Facets for Instruction Level CPU Test. MTV 2003: 38- - 2002
- [c1]Maghsoud Abbaspour, Jianwen Zhu:
Retargetable binary utilities. DAC 2002: 331-336
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-25 21:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint