Search Results - "Azgomi, M.A."

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    Improving Route Stability and Overhead on AODV  Routing Protocol and Make it Usable for VANET by Abedi, O., Berangi, R., Azgomi, M.A.

    “…One of the most important routing protocols used in ad hoc networks is AODV. This protocol is a reactive protocol that searches routes only when they are…”
    Get full text
    Conference Proceeding
  2. 2

    Intrusion Process Modeling for Security Quantification by Almasizadeh, J., Azgomi, M.A.

    “…The aim is to develop a suitable method for quantifying security. We use stochastic modeling techniques for this purpose. An intrusion process is considered as…”
    Get full text
    Conference Proceeding
  3. 3

    Prioritizing test cases for resource constraint environments using historical test case performance data by Fazlalizadeh, Y., Khalilian, A., Azgomi, M.A., Parsa, S.

    “…Regression testing has been widely used to assure the acquirement of appropriate quality through several versions of a software program. Regression testing,…”
    Get full text
    Conference Proceeding
  4. 4

    A Game Theoretic Approach for Quantitative Evaluation of Security by Considering Hackers with Diverse Behaviors by Moayedi, B.Z., Azgomi, M.A.

    “…The most serious problem in the area of quantitative security evaluation is modeling of hacker's behavior. Because of the intelligent and complicated mental…”
    Get full text
    Conference Proceeding
  5. 5

    A high-performance software solution for packet capture and transmission by Dashtbozorgi, M., Azgomi, M.A.

    “…With rapidly growing the network bandwidth to multi-gigabits, the need for high-performance and wire-speed network security tools, such as network intrusion…”
    Get full text
    Conference Proceeding
  6. 6

    A distributed attack simulation for quantitative security evaluation using SimEvents by Khazan, G., Azgomi, M.A.

    “…Any system during its lifecycle could be subject to internal or external accidental or malicious threats. Therefore attention to system security is very…”
    Get full text
    Conference Proceeding
  7. 7

    A privacy preserving clustering technique using Haar wavelet transform and scaling data perturbation by Hajian, S., Azgomi, M.A.

    “…Despite the benefits of data mining in a wide range of applications, this technique has raised some issues related to privacy and security of individuals. Due…”
    Get full text
    Conference Proceeding
  8. 8

    A Game Theoretic Approach for Quantitative Evaluation of Strategic Interactions between Hacker's Motivations by Moayedi, B.Z., Azgomi, M.A.

    “…The use of game theory has introduced new insights in quantitative evaluation of security and dependability. Currently, there is a wide range of useful game…”
    Get full text
    Conference Proceeding
  9. 9

    SWML: A workflow modeling language based on stochastic activity networks by Mottaghi, F.J., Azgomi, M.A.

    “…The existing workflow modeling languages have some limitations and drawbacks. The aim is to introduce a new workflow modeling language based on stochastic…”
    Get full text
    Conference Proceeding
  10. 10

    UML Model Refactoring with Emphasis on Behavior Preservation by Hosseini, S., Azgomi, M.A.

    “…Model refactoring is the process of transformation of model, which changes its internal structure for improving the qualitative features. Model refactoring…”
    Get full text
    Conference Proceeding
  11. 11

    A New Method for Modeling and Evaluation of the Probability of Attacker Success by Almasizadeh, J., Azgomi, M.A.

    “…Security quantification is a topic that has gained a lot of interest in the research community during the recent years. In this paper, a new method is proposed…”
    Get full text
    Conference Proceeding
  12. 12

    An object-oriented modeling framework for petri nets and related models by Gholizadeh, H.M., Azgomi, M.A.

    “…In this paper, we introduce an object-oriented modeling framework called UMF for modeling with graph-based formalisms, such as Petri nets and related models…”
    Get full text
    Conference Proceeding
  13. 13

    Modeling and Analysis of a Web Service Firewall Using Coloured Petri Nets by Aliannezhadi, Z., Azgomi, M.A.

    “…Web services are software components defined by WSDL, registered by UDDI and invoked by SOAP protocols. The port used by Web services and SOAP is not typically…”
    Get full text
    Conference Proceeding
  14. 14

    Towards a Trust-Based Model for Administration of Mailing Lists by Khalesi, M., Azgomi, M.A.

    “…Today, e-mail is one of the most popular communication facilities. E-mail list service (ELS) is a useful facility for scientific, commercial and social user…”
    Get full text
    Conference Proceeding
  15. 15

    DSMS scheduling regarding complex QoS metrics by Ghalambor, M., Safaeei, A.A., Azgomi, M.A.

    “…In data stream management systems (DSMSs), data do not appear in the form of persistent relations, but rather arrives in multiple, continuous, rapid,…”
    Get full text
    Conference Proceeding
  16. 16

    Implementation of Coloured Stochastic Activity Networks within the PDETool Framework by Bidgoly, A.J., Khalili, A., Azgomi, M.A.

    “…The aim has been to develop a modeling tool for coloured stochastic activity networks (CSANs). CSANs are a high-level extension of stochastic activity networks…”
    Get full text
    Conference Proceeding
  17. 17

    An extensible model for improving the privacy of web services by Tavakolan, M., Zarreh, M., Azgomi, M.A.

    “…Today, most Internet users are worried about protecting their personal information, which may be gathered by Web services. This concern can have a profound…”
    Get full text
    Conference Proceeding
  18. 18

    The Influence of Efficient Message Passing Mechanisms on High Performance Distributed Scientific Computing by Mirtaheri, S.L., Khaneghah, E.M., Sharifi, M., Azgomi, M.A.

    “…Parallel programming and distributed programming are two solutions for scientific applications to provide high performance and fast response time in parallel…”
    Get full text
    Conference Proceeding
  19. 19

    Modeling and Evaluation of Call Centers with GSPN Models by Fanaeepour, M., Naghavian, L., Azgomi, M.A.

    “…Call centers, or their contemporary successors, contact centers, are the preferred and prevalent way for many companies to communicate with their customers…”
    Get full text
    Conference Proceeding
  20. 20

    Modeling and evaluation with object stochastic activity networks by Azgomi, M.A., Movaghar, A.

    “…Stochastic activity networks (SANs) are a stochastic generalization of Petri nets, SAN models have been used for performance, dependability and performability…”
    Get full text
    Conference Proceeding