Papers in Journals

#Paper TitleAuthorsJournalPublished At
 
1Coronary Artery Disease Diagnosis; Ranking the Significant Features Using Random Trees Modelحمید سعادت فر - جواد حسن نتاج جلوداری - ادریس حسن نتاج جلوداری - محمد قاسمی گل - سیدمحمد رضوی - امیر موسوی - نرجس نبی پور - شهاب الدین شمشیربند - Laszlo NadaiInternational Journal of Environmental Research and Public Health2020
2Early Detection of the Advanced Persistent Threat Attack Using Performance Analysis of Deep Learningمحمد قاسمی گل - جواد حسن نتاج جلوداری - مجتبی هادربادی - امیر مشمول - شهاب الدین شمشیربند - امیر موسویIEEE Access2020
3FCS-MBFLEACH: Designing an Energy-Aware Fault Detection System for Mobile Wireless Sensor Networksمحمد قاسمی گل - Shahaboddin Shamshirband - جواد حسن نتاج جلوداری - حمید سعادت فر - Amir Mosavi - Narjes NabipourMathematics2019
4Early detection of the advanced persistent threat attack using performance analysis of deep learningJavad Hassannataj Joloudari, Mojtaba Haderbadi, Amir Mashmool, Mohammad GhasemiGol, Shahab S Band, Amir MosaviIEEE Access2020
5Coronary artery disease diagnosis; ranking the significant features using a random trees modelJavad Hassannataj Joloudari, Edris Hassannataj Joloudari, Hamid Saadatfar, Mohammad GhasemiGol, Seyyed Mohammad Razavi, Amir Mosavi, Narjes Nabipour, Shahaboddin Shamshirband, Laszlo NadaiInternational journal of environmental research and public health2020
6FCS-MBFLEACH: Designing an energy-aware fault detection system for mobile wireless sensor networksShamshirband, Shahaboddin, Javad Hassannataj Joloudari, Mohammad GhasemiGol, Hamid Saadatfar, Amir Mosavi, and Narjes Nabipour.Mathematics2020
7A New Approach to Quantify Network Security by Ranking of Security Metrics and Considering Their RelationshipsMostafa Behi, Mohammad GhasemiGol, Hamed Vahdat-NejadInternational Journal of Network Security2018
8Advanced damage detection technique by integration of unsupervised clustering into acoustic emissionArash Behnia, Hwa Kian Chai, Mohammad GhasemiGol, Ahmad A. Mousa, Alireza SepehrinezhadENGINEERING FRACTURE MECHANICS2018
9A foresight model for intrusion response managementMohammad GhasemiGol, Hassan Takabi, Abbas Ghaemi-BafghiCOMPUTERS and SECURITY2016
10A comprehensive approach for network attack forecastingMohammad GhasemiGol, Abbas Ghaemi-Bafghi, Hassan TakabiCOMPUTERS and SECURITY2016
11Anomaly detection and foresight response strategy for wireless sensor networksMohammad GhasemiGol, Abbas Ghaemi-Bafghi, Mohammad Hossein Yaghmaee-Moghaddam, Hadi Sadoghi-YazdiWIRELESS NETWORKS2015
12E-correlator an entropy-based alert correlation systemMohammad GhasemiGol, Abbas Ghaemi-BafghiSecurity and Communication Networks2015
13Hierarchical tree clustering of fuzzy numberHadi Sadoghi-Yazdi, Mohammad GhasemiGol, Sohrab Effati, Azam Jiriani, Reza MonsefiJOURNAL OF INTELLIGENT and FUZZY SYSTEMS2014
14Intrusion Detection by Ellipsoid BoundaryMohammad GhasemiGol, Reza Monsefi, Hadi Sadoghi-YazdiJournal of Network and Systems Management2010
15A New Hierarchical Clustering Algorithm on Fuzzy Data (FHCA)Mohammad GhasemiGol, Hadi Sadoghi Yazdi, Reza MonsefiINTERNATIONAL JOURNAL OF COMPUTER AND ELECTRICAL ENGINEERING2010
16A Linda-based Hierarchical Master-Worker ModelMohammad GhasemiGol, Mostafa Sabzekar, Hossein Deldari, Amir-Hassan BahmaniINTERNATIONAL JOURNAL OF COMPUTER THEORY AND ENGINEERING2009
Showing 1-16 of 16 items.