default search action
Hossein Gharaee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c19]Fatemeh Imanimehr, Hossein Gharaee, Ali Reza Enayati:
An Architecture for National Information Sharing and Alerting System. IST 2020: 217-221
2010 – 2019
- 2019
- [c18]Shayan Mehranpoor, Naser Mohammadzadeh, Hossein Gharaee:
IoT-Based Anonymous Authentication Protocol Using Biometrics in Smart Homes. ISCISC 2019: 114-121 - [c17]Mahdieh Safarzadeh, Hossein Gharaee, Amir Hossein Panahi:
A Novel and Comprehensive Evaluation Methodology for SIEM. ISPEC 2019: 476-488 - 2018
- [c16]Mohammad Hossein Bazrafkan, Hossein Gharaee, Ali Reza Enayati:
National Cyber Situation Awareness Model. IST 2018: 216-220 - [c15]Fateme Shabani, Hossein Gharaee, Fariba Ghaffari:
An Intelligent RFID-Enabled Authentication Protocol in VANET. IST 2018: 587-591 - 2016
- [c14]Fariba Ghaffari, Hossein Gharaee, Mohammad Reza Forouzandehdoust:
Security considerations and requirements for Cloud computing. IST 2016: 105-110 - [c13]Mina Yadegari, Hossein Gharaee:
A novel network based privacy framework. IST 2016: 117-123 - [c12]Hossein Gharaee, Hamid Hosseinvand:
A new feature selection IDS based on genetic algorithm and SVM. IST 2016: 139-144 - [c11]Shadi Janbabaei, Hossein Gharaee, Naser Mohammadzadeh:
Lightweight, anonymous and mutual authentication in IoT infrastructure. IST 2016: 162-166 - [c10]Mahdie Kiaee, Hossein Gharaee, Naser Mohammadzadeh:
LDPC decoder implementation using FPGA. IST 2016: 167-173 - [c9]Farzaneh Abazari, Afsaneh Madani, Hossein Gharaee:
Optimal response to computer network threats. IST 2016: 729-734 - 2015
- [i2]Tala Tafazzoli, Elham Salahi, Hossein Gharaee:
A proposed architecture for network forensic system in large-scale networks. CoRR abs/1508.01890 (2015) - 2013
- [c8]M. J. Shamani, Hossein Gharaee, Sahba Sadri, Fereidoon Rezaei:
Adaptive Energy Aware Cooperation Strategy in Heterogeneous Multi-domain Sensor Networks. ANT/SEIT 2013: 1047-1052 - 2012
- [c7]Kazem Qazanfari, Minoo Sadat Mirpouryan, Hossein Gharaee:
A novel hybrid anomaly based intrusion detection method. IST 2012: 942-947 - [c6]Minoo Sadat Mirpuryan, Tina Tavizi, Hossein Gharaee:
A comprehensive network intrusion detection and prevention system architecture. IST 2012: 954-958 - [c5]Samira Lagzian, Fatemeh Amiri, Ali Reza Enayati, Hossein Gharaee:
Frequent item set mining-based alert correlation for extracting multi-stage attack scenarios. IST 2012: 1010-1014 - 2011
- [c4]Roja Fouladi, Somayeh Salimi, Hossein Gharaee:
Analysis of an adjacent 3G network corruption influence on WLAN/3G interworking access. CASoN 2011: 158-162 - [c3]Fatemeh Amiri, Hossein Gharaee, Ali Reza Enayati:
A complete operational architecture of alert correlation. CASoN 2011: 243-248 - [c2]Afsaneh Madani, Saed Rezayi, Hossein Gharaee:
Log management comprehensive architecture in Security Operation Center (SOC). CASoN 2011: 284-289 - [i1]H. A. Esmaili, Mohammad Reza Khalili Shoja, Hossein Gharaee:
Performance Analysis of AODV under Black Hole Attack through Use of OPNET Simulator. CoRR abs/1104.4544 (2011)
2000 – 2009
- 2009
- [j1]Hossein Gharaee, Abdolreza Nabavi, Jalil Etminan:
Performance and Complexity Evaluation of OTR-UWB Receiver. Int. J. Interdiscip. Telecommun. Netw. 1(3): 62-77 (2009) - 2008
- [c1]Hossein Gharaee, Abdolreza Nabavi, Jalil Etminan:
OTR-UWB system. WTS 2008: 165-168
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint