Using the cuckoo algorithm to optimizing the response time and energy consumption cost of fog nodes by considering collaboration in the fog layer |
March |
2021 |
Using the artificial bee colony (ABC) algorithm in collaboration with the fog nodes in the Internet of Things three-layer architecture |
October |
2021 |
Enhancing users' quality of experienced with minimum energy consumption by fog nodes cooperation in Internet of Things |
November |
2020 |
Transfer Learning Based Intrusion Detection |
April |
2018 |
Increasing the efficiency of TCAM-based packet classifiers using intelligent cut technique in geometric space |
January |
2015 |
Analytical performance model of virtualized SDNs using network calculus |
August |
2015 |
Tunneling protocols identification using light packet inspection |
February |
2015 |
Fast workflow scheduling for grid computing based on a multi-objective Genetic Algorithm |
August |
2013 |
A Non-Cooperative Game Theory Approach to Optimize Workflow Scheduling in Grid Computing |
August |
2013 |
An Energy-Efficient Clustering Algorithm for Large Scale Wireless Sensor Networks |
May |
2013 |
Internet Traffic Classification using MOEA and Online Refinement in Voting on Ensemble methods |
May |
2013 |
Optimal Supervised Feature Extraction in Internet Traffic Classification |
August |
2013 |
An Efficient Peer to Peer and Group Key Establishment Protocol for Body Sensor Networks |
February |
2012 |
An Efficient End to End Key Establishment Protocol for Wireless Sensor Networks |
September |
2012 |
A Symmetric Polynomial Based Mutual Authentication Protocol for GSM Networks |
April |
2010 |
A Hybrid Key Establishment Protocol for Large Scale Wireless Sensor Networks |
May |
2010 |
A New Key Establishment Protocol for Limited Resource Wireless Sensor Networks |
May |
2010 |
A Scalable and Efficient Key Establishment Protocol for Wireless Sensor Networks |
December |
2010 |
A new mutual authentication protocol for GSM networks |
May |
2009 |
Tunneling Attack Prevention in endairA |
February |
2009 |
An Efficient Authentication and Key Management Protocol for Hierarchical Ad hoc Sensor Networks |
April |
2009 |
A Cluster-based Key Establishment Protocol for Wireless Mobile Ad Hoc Networks |
April |
2008 |
An Efficient Authentication Protocol for Heterogonous Ad Hoc-WLAN Networks |
September |
2008 |
Resistant TIK-Based endairA against the Tunneling Attack |
February |
2008 |
The Role of Secure Token in the Development of Electronic Government |
September |
2008 |
A New Solution to Improve WTLS Protocol”, 5th International Cryptography Conference |
September |
2008 |
A Distributed Certificate Authority and Key Establishment Protocol for Mobile Ad Hoc Networks |
February |
2008 |
A Symmetric-Based Authentication and Key Management for Hierarchical Ad hoc Sensor Networks |
September |
2008 |
Reducing Delay in Decryption Block in Rijdeal Algorithm |
March |
2008 |
A New Solution to Channel Assignment in Multi-Channel Wireless Network Base on 802.11 |
April |
2008 |
A New Authentication Protocol for GSM Networks |
September |
2007 |
A TESLA-Based Authentication Protocol for Sensor Networks |
September |
2007 |
A New Security Model for Web Based Application |
September |
2006 |
Acceleration of Floating Point Addition by Pipeling |
February |
2004 |