مقالات در نشریات

#عنوان مقالهنویسندگاننشریهتاریخ انتشار
 
۱Early Detection of the Advanced Persistent Threat Attack Using Performance Analysis of Deep LearningMohammad GhasemiGol,mojtaba haderbadi,Amir Mashmool,SHAHAB S. BAND,AMIR MOSAVIIEEE Access2020
۲FCM-DNN: diagnosing coronary artery disease by deep accuracy Fuzzy C-Means clustering modelMohammad GhasemiGol,Hamid Saadatfar,Roohallah Alizadehsani,Zahra Alizadeh Sani,Fereshteh Hasanzadeh,Edris Hassannataj,Danial Sharifrazi,Zulkefli MansorMathematical Biosciences and Engineering2022
۳Coronary Artery Disease Diagnosis; Ranking the Significant Features Using Random Trees ModelHamid Saadatfar,Edris Hassannataj joloudari,Mohammad GhasemiGol,Amir Mosavi,Narjes Nabipour,Shahaboddin Shamshirband,Laszlo NadaiInternational Journal of Environmental Research and Public Health2020
۴Advanced damage detection technique by integration of unsupervised clustering into acoustic emissionMohammad GhasemiGol,Behnia Arash,Chai Hwa Kian,Mousa Ahmad A.,Sepehrinezhad AlirezaEngineering Fracture Mechanics2019
۵FCS-MBFLEACH: Designing an Energy-Aware Fault Detection System for Mobile Wireless Sensor NetworksMohammad GhasemiGol,Shahaboddin Shamshirband,Hamid Saadatfar,Amir Mosavi,Narjes NabipourMathematics2019
۶A New Approach to Quantify Network Security by Ranking of Security Metrics and Considering Their RelationshipsBehi Mostafa,Mohammad GhasemiGolInternational Journal of Network Security2018
۷ارائه سیستم راهنمای تور آگاه به زمینه برای گردشگران گروهیحامد وحدت نژاد,مشتاقی نرگس خاتون,محمد قاسمی گلبرنامه ریزی و توسعه گردشگری2018
۸A MOBILE AGENT-BASED METHOD TO COUNTER SINKHOLE ATTACKS IN WIRELESS SENSOR NETWORKSMohammad GhasemiGol,KhosraviJordanian Journal of Computers and Information Technology2021
۹Hierarchical tree clustering of fuzzy numberMohammad GhasemiGol,Sadoghi-Yazdi Hadi,Effati Sohrab,Jiriani Azam,Monsefi RezaJournal of Intelligent and Fuzzy Systems2014
۱۰چارچوبی آینده نگر برای سامانه های پاسخ به نفوذ در شبکه های رایانه ایمحمد قاسمی گلپدافند الکترونیکی و سایبری2018
۱۱A foresight model for intrusion response managementMohammad GhasemiGol,Takabi Hassan,Ghaemi-Bafghi AbbasComputers and Security2016
۱۲A comprehensive approach for network attack forecastingMohammad GhasemiGol,Ghaemi-Bafghi Abbas,Takabi HassanComputers and Security2016
۱۳E-correlator an entropy-based alert correlation systemMohammad GhasemiGol,Ghaemi-Bafghi AbbasSecurity and Communication Networks2015
۱۴Anomaly detection and foresight response strategy for wireless sensor networksMohammad GhasemiGol,Ghaemi-Bafghi Abbas,Yaghmaee-Moghaddam Mohammad Hossein,Sadoghi-Yazdi HadiWireless Networks2015
۱۵A New Hierarchical Clustering Algorithm on Fuzzy Data (FHCA)Mohammad GhasemiGol,Yazdi Hadi Sadoghi,Monsefi RezaInternational Journal of Computer and Electrical Engineering2010
۱۶Intrusion Detection by Ellipsoid BoundaryMohammad GhasemiGol,Monsefi Reza,Sadoghi-Yazdi HadiJournal of Network and Systems Management2010
۱۷A Linda-based Hierarchical Master-Worker ModelMohammad GhasemiGol,Sabzekar Mostafa,Deldari Hossein,Bahmani Amir-HassanInternational Journal of Computer Theory and Engineering2009
نمایش ۱ تا ۱۷ مورد از کل ۱۷ مورد.