Papers in Journals

#Paper TitleAuthorsJournalPublished At
 
1A New Approach to Quantify Network Security by Ranking of Security Metrics and Considering Their RelationshipsBehi Mostafa,Mohammad GhasemiGolInternational Journal of Network Security2018
2Coronary Artery Disease Diagnosis; Ranking the Significant Features Using Random Trees ModelHamid Saadatfar,Edris Hassannataj joloudari,Mohammad GhasemiGol,Amir Mosavi,Narjes Nabipour,Shahaboddin Shamshirband,Laszlo NadaiInternational Journal of Environmental Research and Public Health2020
3Advanced damage detection technique by integration of unsupervised clustering into acoustic emissionMohammad GhasemiGol,Behnia Arash,Chai Hwa Kian,Mousa Ahmad A.,Sepehrinezhad AlirezaEngineering Fracture Mechanics2019
4E-correlator an entropy-based alert correlation systemMohammad GhasemiGol,Ghaemi-Bafghi AbbasSecurity and Communication Networks2015
5A comprehensive approach for network attack forecastingMohammad GhasemiGol,Ghaemi-Bafghi Abbas,Takabi HassanComputers and Security2016
6Anomaly detection and foresight response strategy for wireless sensor networksMohammad GhasemiGol,Ghaemi-Bafghi Abbas,Yaghmaee-Moghaddam Mohammad Hossein,Sadoghi-Yazdi HadiWireless Networks2015
7FCM-DNN: diagnosing coronary artery disease by deep accuracy Fuzzy C-Means clustering modelMohammad GhasemiGol,Hamid Saadatfar,Roohallah Alizadehsani,Zahra Alizadeh Sani,Fereshteh Hasanzadeh,Edris Hassannataj,Danial Sharifrazi,Zulkefli MansorMathematical Biosciences and Engineering2022
8CHAC1 as a novel biomarker for distinguishing alopecia from other dermatological diseases and determining its severityMohammad GhasemiGol,Hassan Karami,Samira Nomiri,Niloufar Mehrvarzian,Afshin Derakhshani,Mohammad Fereidouni,Masoud Mirimoghaddam,Hossein SafarpourIET systems biology2022
9A MOBILE AGENT-BASED METHOD TO COUNTER SINKHOLE ATTACKS IN WIRELESS SENSOR NETWORKSMohammad GhasemiGol,KhosraviJordanian Journal of Computers and Information Technology2021
10Early Detection of the Advanced Persistent Threat Attack Using Performance Analysis of Deep LearningMohammad GhasemiGol,mojtaba haderbadi,Amir Mashmool,SHAHAB S. BAND,AMIR MOSAVIIEEE Access2020
11Intrusion Detection by Ellipsoid BoundaryMohammad GhasemiGol,Monsefi Reza,Sadoghi-Yazdi HadiJournal of Network and Systems Management2010
12A Linda-based Hierarchical Master-Worker ModelMohammad GhasemiGol,Sabzekar Mostafa,Deldari Hossein,Bahmani Amir-HassanInternational Journal of Computer Theory and Engineering2009
13Hierarchical tree clustering of fuzzy numberMohammad GhasemiGol,Sadoghi-Yazdi Hadi,Effati Sohrab,Jiriani Azam,Monsefi RezaJournal of Intelligent and Fuzzy Systems2014
14FCS-MBFLEACH: Designing an Energy-Aware Fault Detection System for Mobile Wireless Sensor NetworksMohammad GhasemiGol,Shahaboddin Shamshirband,Hamid Saadatfar,Amir Mosavi,Narjes NabipourMathematics2019
15A foresight model for intrusion response managementMohammad GhasemiGol,Takabi Hassan,Ghaemi-Bafghi AbbasComputers and Security2016
16A New Hierarchical Clustering Algorithm on Fuzzy Data (FHCA)Mohammad GhasemiGol,Yazdi Hadi Sadoghi,Monsefi RezaInternational Journal of Computer and Electrical Engineering2010
17ارائه سیستم راهنمای تور آگاه به زمینه برای گردشگران گروهیحامد وحدت نژاد,مشتاقی نرگس خاتون,محمد قاسمی گلبرنامه ریزی و توسعه گردشگری2018
18چارچوبی آینده نگر برای سامانه های پاسخ به نفوذ در شبکه های رایانه ایمحمد قاسمی گلپدافند الکترونیکی و سایبری2018
19ارائه یک روش مسیریابی چند هدفه مبتنی بر RPL در اینترنت اشیامحمد قاسمی گل,رضا خاتونیرایانش نرم و فناوری اطلاعات-Journal of Soft Computing and Information Technology2022
Showing 1-19 of 19 items.