Mehdi Shajari
Mehdi Shajari
Assistant Professor of Computer Engineering, Amirkabir University of Technology
Verified email at aut.ac.ir - Homepage
TitleCited byYear
Network intrusion detection and prevention: concepts and techniques
AA Ghorbani, W Lu, M Tavallaee
Springer Science & Business Media, 2009
1802009
An enhanced e-commerce trust model for community based centralized systems
MA Morid, M Shajari
Electronic Commerce Research 12 (4), 409-427, 2012
462012
Defending recommender systems by influence analysis
MA Morid, M Shajari, AR Hashemi
Information Retrieval 17 (2), 137-152, 2014
262014
Application of Belief-Desire-Intention Agents in Intrusion Detection & Response.
M Shajari, AA Ghorbani
PST, 181-191, 2004
262004
FEMRA: Fuzzy expert model for risk assessment
AS Sendi, M Jabbarifar, M Shajari, M Dagenais
2010 Fifth International Conference on Internet Monitoring and Protection, 48-53, 2010
242010
A usage control based architecture for cloud environments
T Tavizi, M Shajari, P Dodangeh
2012 IEEE 26th International Parallel and Distributed Processing Symposium …, 2012
202012
Fuzzy multi-criteria decision-making for information security risk assessment
A Shameli-Sendi, M Shajari, M Hassanabadi, M Jabbarifar, M Dagenais
The Open Cybernetics & Systemics Journal 6 (1), 2012
192012
Mvpayword: Secure and efficient payword-based micropayment scheme
A Esmaeeli, M Shajari
2009 Second International Conference on the Applications of Digital …, 2009
152009
AMVPayword: secure and efficient anonymous payword-based micropayment scheme
M Hosseinkhani, E Tarameshloo, M Shajari
2010 International Conference on Computational Intelligence and Security …, 2010
112010
Intelligent automated intrusion response system based on fuzzy decision making and risk assessment
S Berenjian, M Shajari, N Farshid, M Hatamian
2016 IEEE 8th International Conference on Intelligent Systems (IS), 709-714, 2016
102016
FUZZGY: A hybrid model for credit card fraud detection
MR HaratiNik, M Akrami, S Khadivi, M Shajari
6th International Symposium on Telecommunications (IST), 1088-1093, 2012
102012
Who are the most influential users in a recommender system?
MA Morid, M Shajari, AH Golpayegani
Proceedings of the 13th international conference on electronic commerce, 19, 2011
92011
Using genre interest of users to detect profile injection attacks in movie recommender systems
G Aghili, M Shajari, S Khadivi, MA Morid
2011 10th International Conference on Machine Learning and Applications and …, 2011
82011
Cost-sensitive payment card fraud detection based on dynamic random forest and k-nearest neighbors
S Nami, M Shajari
Expert Systems with Applications 110, 381-392, 2018
72018
Testing an adoption model for e-government services using structure equation modeling
M Shajari, Z Ismail
2013 International Conference on Informatics and Creative Multimedia, 298-303, 2013
72013
USING FUZZY SYSTEM TO MANAGE FALSE ALARMS IN INTRUSION DETECTION
M Shajari, AA Ghorbani
Security and Privacy in the Age of Uncertainty: IFIP TC11 18th International …, 2013
7*2013
An entice resistant automatic phishing detection
H Kordestani, M Shajari
The 5th Conference on Information and Knowledge Technology, 134-139, 2013
72013
Using Fuzzy System to Manage False Alarms in Intrusion Detection
M Shajari, AA Ghorbani
Security and Privacy in the Age of Uncertainty, IFIP TC11 18th International …, 2003
72003
A cost-sensitive move selection strategy for moving target defense
V Zangeneh, M Shajari
Computers & Security 75, 72-91, 2018
62018
Self-proxy mobile signature: A new client-based mobile signature model
MH Samadani, M Shajari, MM Ahaniha
2010 IEEE 24th International Conference on Advanced Information Networking …, 2010
62010
The system can't perform the operation now. Try again later.
Articles 1–20