Follow
Hossein Shirazi
Hossein Shirazi
Faculty of Electrical and Computer Engineering, Malek Ashtar University of Technology
Verified email at mut.ac.ir - Homepage
Title
Cited by
Cited by
Year
A fuzzy VIKOR method for supplier selection based on entropy measure for objective weighting
A Shemshadi, H Shirazi, M Toreihi, MJ Tarokh
Expert systems with applications 38 (10), 12160-12167, 2011
8772011
Behavioral fingerprinting of iot devices
B Bezawada, M Bachani, J Peterson, H Shirazi, I Ray, I Ray
Proceedings of the 2018 workshop on attacks and solutions in hardware …, 2018
2642018
"Kn0w Thy Doma1n Name" Unbiased Phishing Detection Using Domain Name Based Features
H Shirazi, B Bezawada, I Ray
Proceedings of the 23nd ACM on symposium on access control models and …, 2018
1032018
Practical DoS attacks on embedded networks in commercial vehicles
S Mukherjee, H Shirazi, I Ray, J Daily, R Gamble
Information Systems Security: 12th International Conference, ICISS 2016 …, 2016
702016
A stochastic bi-objective simulation–optimization model for plasma supply chain in case of COVID-19 outbreak
H Shirazi, R Kia, P Ghasemi
Applied Soft Computing 112, 107725, 2021
582021
Combining knowledge acquisition and machine learning to control dynamic systems
GM Shiraz, C Sammut
International joint conference on artificial intelligence 15, 908-913, 1997
471997
Lightweight URL-based phishing detection using natural language processing transformers for mobile devices
K Haynes, H Shirazi, I Ray
Procedia Computer Science 191, 127-134, 2021
402021
Supplier selection based on supplier risk: An ANP and fuzzy TOPSIS approach
A Shemshadi, M Toreihi, H Shirazi
JOURNAL OF MATHEMATICS AND COMPUTER SCIENCES 2 (1), 11-121, 2011
392011
Adversarial sampling attacks against phishing detection
H Shirazi, B Bezawada, I Ray, C Anderson
Data and Applications Security and Privacy XXXIII: 33rd Annual IFIP WG 11.3 …, 2019
372019
Anomaly intrusion detection system using information theory, K-NN and KMC algorithms
HM Shirazi
Australian Journal of Basic and Applied Sciences 3 (3), 2581-2597, 2009
372009
A multi-objective model for designing a group layout of a dynamic cellular manufacturing system
R Kia, H Shirazi, N Javadian, R Tavakkoli-Moghaddam
Journal of Industrial Engineering International 9, 1-14, 2013
362013
Software security; a vulnerability activity revisit
MA Hadavi, H Shirazi, HM Sangchi, VS Hamishagi
2008 Third International Conference on Availability, Reliability and …, 2008
362008
Behavioural cloning in control of a dynamic system
N Esmaili, C Sammut, GM Shirazi
1995 IEEE International Conference on Systems, Man and Cybernetics …, 1995
361995
A new approach to malware detection by comparative analysis of data structures in a memory image
M Aghaeikheirabady, SMR Farshchi, H Shirazi
2014 International Congress on Technology, Communication and Knowledge …, 2014
332014
Presenting a framework for agile enterprise architecture
BD Rouhani, H Shirazi, AF Nezhad, S Kharazmi
2008 1st International Conference on Information Technology, 1-4, 2008
312008
Fresh-phish: A framework for auto-detection of phishing websites
H Shirazi, K Haefner, I Ray
2017 IEEE international conference on information reuse and integration (IRI …, 2017
302017
Increasing overall network security by integrating signature-based NIDS with packet filtering firewall
H Salehi, H Shirazi, RA Moghadam
2009 International Joint Conference on Artificial Intelligence, 357-362, 2009
302009
Acquiring control knowledge from examples using ripple-down rules and machine learning
H Shirazi, CA Sammut
IRANIAN JOURNAL OF SCIENCE AND TECHNOLOGY TRANSACTION B-ENGINEERING 32 (3 …, 2008
302008
Attribute based access control for healthcare resources
S Mukherjee, I Ray, I Ray, H Shirazi, T Ong, MG Kahn
Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control, 29-40, 2017
292017
Improved phishing detection algorithms using adversarial autoencoder synthesized data
H Shirazi, SR Muramudalige, I Ray, AP Jayasumana
2020 ieee 45th conference on local computer networks (lcn), 24-32, 2020
242020
The system can't perform the operation now. Try again later.
Articles 1–20