Search Results - "Azgomi, M.A."
-
1
Improving Route Stability and Overhead on AODV Routing Protocol and Make it Usable for VANET
Published in 2009 29th IEEE International Conference on Distributed Computing Systems Workshops (01-06-2009)“…One of the most important routing protocols used in ad hoc networks is AODV. This protocol is a reactive protocol that searches routes only when they are…”
Get full text
Conference Proceeding -
2
Intrusion Process Modeling for Security Quantification
Published in 2009 International Conference on Availability, Reliability and Security (01-03-2009)“…The aim is to develop a suitable method for quantifying security. We use stochastic modeling techniques for this purpose. An intrusion process is considered as…”
Get full text
Conference Proceeding -
3
Prioritizing test cases for resource constraint environments using historical test case performance data
Published in 2009 2nd IEEE International Conference on Computer Science and Information Technology (01-08-2009)“…Regression testing has been widely used to assure the acquirement of appropriate quality through several versions of a software program. Regression testing,…”
Get full text
Conference Proceeding -
4
A Game Theoretic Approach for Quantitative Evaluation of Security by Considering Hackers with Diverse Behaviors
Published in 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing (01-12-2009)“…The most serious problem in the area of quantitative security evaluation is modeling of hacker's behavior. Because of the intelligent and complicated mental…”
Get full text
Conference Proceeding -
5
A high-performance software solution for packet capture and transmission
Published in 2009 2nd IEEE International Conference on Computer Science and Information Technology (01-08-2009)“…With rapidly growing the network bandwidth to multi-gigabits, the need for high-performance and wire-speed network security tools, such as network intrusion…”
Get full text
Conference Proceeding -
6
A distributed attack simulation for quantitative security evaluation using SimEvents
Published in 2009 IEEE/ACS International Conference on Computer Systems and Applications (01-05-2009)“…Any system during its lifecycle could be subject to internal or external accidental or malicious threats. Therefore attention to system security is very…”
Get full text
Conference Proceeding -
7
A privacy preserving clustering technique using Haar wavelet transform and scaling data perturbation
Published in 2008 International Conference on Innovations in Information Technology (01-12-2008)“…Despite the benefits of data mining in a wide range of applications, this technique has raised some issues related to privacy and security of individuals. Due…”
Get full text
Conference Proceeding -
8
A Game Theoretic Approach for Quantitative Evaluation of Strategic Interactions between Hacker's Motivations
Published in 2009 Third UKSim European Symposium on Computer Modeling and Simulation (01-11-2009)“…The use of game theory has introduced new insights in quantitative evaluation of security and dependability. Currently, there is a wide range of useful game…”
Get full text
Conference Proceeding -
9
SWML: A workflow modeling language based on stochastic activity networks
Published in 2009 14th International CSI Computer Conference (01-10-2009)“…The existing workflow modeling languages have some limitations and drawbacks. The aim is to introduce a new workflow modeling language based on stochastic…”
Get full text
Conference Proceeding -
10
UML Model Refactoring with Emphasis on Behavior Preservation
Published in 2008 2nd IFIP/IEEE International Symposium on Theoretical Aspects of Software Engineering (01-06-2008)“…Model refactoring is the process of transformation of model, which changes its internal structure for improving the qualitative features. Model refactoring…”
Get full text
Conference Proceeding -
11
A New Method for Modeling and Evaluation of the Probability of Attacker Success
Published in 2008 International Conference on Security Technology (01-12-2008)“…Security quantification is a topic that has gained a lot of interest in the research community during the recent years. In this paper, a new method is proposed…”
Get full text
Conference Proceeding -
12
An object-oriented modeling framework for petri nets and related models
Published in 2009 IEEE/ACS International Conference on Computer Systems and Applications (01-05-2009)“…In this paper, we introduce an object-oriented modeling framework called UMF for modeling with graph-based formalisms, such as Petri nets and related models…”
Get full text
Conference Proceeding -
13
Modeling and Analysis of a Web Service Firewall Using Coloured Petri Nets
Published in 2008 IEEE Asia-Pacific Services Computing Conference (01-12-2008)“…Web services are software components defined by WSDL, registered by UDDI and invoked by SOAP protocols. The port used by Web services and SOAP is not typically…”
Get full text
Conference Proceeding -
14
Towards a Trust-Based Model for Administration of Mailing Lists
Published in IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference (01-11-2008)“…Today, e-mail is one of the most popular communication facilities. E-mail list service (ELS) is a useful facility for scientific, commercial and social user…”
Get full text
Conference Proceeding -
15
DSMS scheduling regarding complex QoS metrics
Published in 2009 IEEE/ACS International Conference on Computer Systems and Applications (01-05-2009)“…In data stream management systems (DSMSs), data do not appear in the form of persistent relations, but rather arrives in multiple, continuous, rapid,…”
Get full text
Conference Proceeding -
16
Implementation of Coloured Stochastic Activity Networks within the PDETool Framework
Published in 2009 Third Asia International Conference on Modelling & Simulation (01-05-2009)“…The aim has been to develop a modeling tool for coloured stochastic activity networks (CSANs). CSANs are a high-level extension of stochastic activity networks…”
Get full text
Conference Proceeding -
17
An extensible model for improving the privacy of web services
Published in 2008 International Conference on Innovations in Information Technology (01-12-2008)“…Today, most Internet users are worried about protecting their personal information, which may be gathered by Web services. This concern can have a profound…”
Get full text
Conference Proceeding -
18
The Influence of Efficient Message Passing Mechanisms on High Performance Distributed Scientific Computing
Published in 2008 IEEE International Symposium on Parallel and Distributed Processing with Applications (01-12-2008)“…Parallel programming and distributed programming are two solutions for scientific applications to provide high performance and fast response time in parallel…”
Get full text
Conference Proceeding -
19
Modeling and Evaluation of Call Centers with GSPN Models
Published in 2007 IEEE/ACS International Conference on Computer Systems and Applications (01-05-2007)“…Call centers, or their contemporary successors, contact centers, are the preferred and prevalent way for many companies to communicate with their customers…”
Get full text
Conference Proceeding -
20
Modeling and evaluation with object stochastic activity networks
Published in First International Conference on the Quantitative Evaluation of Systems, 2004. QEST 2004. Proceedings (2004)“…Stochastic activity networks (SANs) are a stochastic generalization of Petri nets, SAN models have been used for performance, dependability and performability…”
Get full text
Conference Proceeding