A Density Based Clustering Approach to Distinguish Between Web Robot and Human Requests to a Web Server M. Zabihi, M. Vafaei Jahan, J. Hamidzadeh The ISC International Journal of Information Security 6 (1), 1-13, 2014 | 35* | 2014 |
Adaptive and non-adaptive data hiding methods for grayscale images based on modulus function N Maleki, M Jalali, MV Jahan Egyptian Informatics Journal 15 (2), 115-127, 2014 | 29 | 2014 |
From local search to global conclusions: migrating spin glass-based distributed portfolio selection MV Jahan, MR Akbarzadeh-Totonchi IEEE transactions on evolutionary computation 14 (4), 591-601, 2010 | 24 | 2010 |
Generating pseudo-random numbers by combining two systems with complex behaviors SM Hosseini, H Karimi, MV Jahan Journal of information security and applications 19 (2), 149-162, 2014 | 18 | 2014 |
Collaborative filtering-based recommender systems by effective trust V Faridani, M Jalali, MV Jahan International Journal of Data Science and Analytics 3, 297-307, 2017 | 17 | 2017 |
Malware detection using Markov Blanket based on opcode sequences H Divandari, B Pechaz, MV Jahan 2015 International Congress on Technology, Communication and Knowledge …, 2015 | 17 | 2015 |
On the combination of self-organized systems to generate pseudo-random numbers H Karimi, SM Hosseini, MV Jahan Information Sciences 221, 371-388, 2013 | 16 | 2013 |
A RGB image encryption algorithm based on DNA sequence operation and hyper-chaotic system AY Niyat, RMH Hei, MV Jahan International Congress on Technology, Communication and Knowledge (ICTCK), 2015 | 14 | 2015 |
Extremal optimization vs. learning automata: Strategies for spin selection in portfolio selection problems MV Jahan, MR Akbarzadeh-T Applied Soft Computing 12 (10), 3276-3284, 2012 | 14 | 2012 |
Anomalous behavior detection of marine vessels based on Hidden Markov Model KF Toloue, MV Jahan 2018 6th Iranian Joint Congress on Fuzzy and Intelligent Systems (CFIS), 10-12, 2018 | 12 | 2018 |
Metamorphic malware detection using linear discriminant analysis and graph similarity R Mirzazadeh, MH Moattar, MV Jahan 2015 5th International Conference on Computer and Knowledge Engineering …, 2015 | 12 | 2015 |
An HMM for online signature verification based on velocity and hand movement directions MVJ Farimani, Saeede Anbaee Fuzzy and Intelligent Systems (CFIS), 2018 6th Iranian Joint Congress, 2018 | 11* | 2018 |
Investigating the informativeness of technical indicators and news sentiment in financial market price prediction SA Farimani, MV Jahan, AM Fard, SRK Tabbakh Knowledge-Based Systems 247, 108742, 2022 | 10 | 2022 |
Analyzing new features of infected web content in detection of malicious web pages JH Nezhad, MV Jahan, M Tayarani-N, Z Sadrnezhad The ISC International Journal of Information Security 9 (2), 161-181, 2017 | 10 | 2017 |
Chaos-based image encryption using a hybrid cellular automata and a DNA sequence AY Niyat, RMH Hei, MV Jahan 2015 International Congress on Technology, Communication and Knowledge …, 2015 | 10 | 2015 |
Fuzzy detection of malicious attacks on web applications based on hidden markov model ensemble M Geraily, MV Jahan 2012 Third International Conference on Intelligent Systems Modelling and …, 2012 | 10 | 2012 |
A novel memetic algorithm with imperialist competition as local search S Nozarian, MV Jahan International Proceedings of Computer Science and Information Technology 30 …, 2012 | 10 | 2012 |
Malware detection using hidden Markov model based on Markov blanket feature selection method B Pechaz, MV Jahan, M Jalali 2015 International congress on technology, communication and knowledge …, 2015 | 8 | 2015 |
An Imperialist Competitive Algorithm for 1-D Cutting Stock Problem S Nozarian, MV Jahan, M Jalali International Journal of Information Science 3 (2), 25-36, 2011 | 8 | 2011 |
Stock market prediction with hidden markov model M Farshchian, MV Jahan 2015 International Congress on Technology, Communication and Knowledge …, 2015 | 7 | 2015 |