دانشگاه آیت الله العظمی بروجردی(ره)

1517597637542 (3)

Dr. Afshin Rezakhani

educational group:Computer Engineering

Academic Rank:assistant professor

Biography
Education
Method of communication

Email

Phone

- Internal: 111

Social Networks

place

building [#808]Created with Sketch.
room: 108
Building: سازمان مرکزی -
Academic journal papers
ADCAS: Adversarial Deep Clustering of Android Streams, Computers & Electrical Engineering, Elsevier, 2021 .
Providing a hybrid cryptography algorithm for lightweight authentication protocol in RFID with urban traffic usage case, 2021.
Secured Access Control in Security Information and Event Management Systems, JOURNAL OF INFORMATION SYSTEMS, 2021.
A new resource allocation method in fog computing via non-cooperative game theory, Journal of Intelligent & Fuzzy Systems, 2021.
Anomalies detection in the application layer with new combined methods in IoT networks, , Journal of Intelligent & Fuzzy Systems, 2021.
A Scalable Key Pre-distribution Scheme based on the Unital Design for the Internet of Things Security, IETE Journal of Research, Taylor & Francis, 2021.
A Novel Multilayer AAA Model for Integrated Application, Neural Computing and Applications, Springer, 2018. (IF: 4.664 Q1)
A New Approach to Ranking Attributes in Attribute Based Access Control using Decision Fusion, Neural Computing and Applications, Springer, 2017 (IF: 4.664 Q1)
A Novel Access Control Model Based on the Structure of Applications, International Journal of Communication Networks and Information Security (IJCNIS), 2016. (Scopus)
Considering Statistical Reports of Populations Penetration in Attack to Networks, International Journal of Computer Science and Information Security (IJCSIS), 2011.
Virtualization Technology in Green IT with Cloud Computing Infrastructure, Journal of Computing, 2011.
Using Fuzzy Methodology to Mapping ITIL Security KPIs to ISMS, Journal of Computing, 2012.
Converting Network Attacks to Standard Semantic Web Form in Cloud Computing Infrastructure, International Journal of Computer Applications (0975 – 8887) Volume 3 – No.4, June 2010.
Standardization of all Information Security Management Systems, International Journal of Computer Applications (0975 – 8887) Volume 18– No.8, March 2011
Conference papers
Attacks Classification to Improve the Power of Snorts, IFCSTA, IEEE, China, 2009
Service Oriented Approach to Improve the Power of Snorts, ICCEE 2009, IEEE, Doubia, 2009
Creating a Standard Platform for All Intrusion Detection/Prevention Systems, ICCMS 2010, IEEE, China, 2010
Creating a Collaborative Architecture in Snorts to High Speed Networks, ICCAE, IEEE , Singapore, 2010
Increasing a postprocessor in Intrusion Detection Systems to use in Switches, ICCAE, IEEE, Singapore, 2010
Considering Several Scenarios in Network Attacks and Dissimilar Attacks, INC2010, IEEE, Korea, 2010
Mapping ITIL Services to Ontology-Based Model to More Use in Enterprises, 5thSASTech 2011, Khavaran Higher-education Institute, Mashhad, Iran. May 12-1

All rights of this website are reserved for Ayatollah Azami Boroujerdi University.

مرتبه علمی

Filter user by academic rank

دانشکده

filter user by college

گروه آموزشی

Filter user by educational group