default search action
Amir Hossein Jahangir
Person information
- affiliation: Sharif University of Technology, Tehran, Iran
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Mahdi Soltani, Khashayar Khajavi, Mahdi Jafari Siavoshani, Amir Hossein Jahangir:
A multi-agent adaptive deep learning framework for online intrusion detection. Cybersecur. 7(1): 9 (2024) - [j21]Seyed Mohammad Hosseini, Sina Darabi, Amir Hossein Jahangir, Ali Movaghar:
Yuz: Improving Performance of Cluster-Based Services by Near-L4 Session-Persistent Load Balancing. IEEE Trans. Netw. Serv. Manag. 21(2): 1929-1942 (2024) - [c23]Mohammad Hosseini, Sina Darabi, Patrick Eugster, Mahmood Choopani, Amir Hossein Jahangir:
Rethinking Web Caching: An Optimization for the Latency-Constrained Internet. HotNets 2024: 326-334 - 2023
- [j20]Mahdi Soltani, Behzad Ousat, Mahdi Jafari Siavoshani, Amir Hossein Jahangir:
An adaptable deep learning-based intrusion detection system to zero-day attacks. J. Inf. Secur. Appl. 76: 103516 (2023) - [i6]Mahdi Soltani, Khashayar Khajavi, Mahdi Jafari Siavoshani, Amir Hossein Jahangir:
A Multi-Agent Adaptive Deep Learning Framework for Online Intrusion Detection. CoRR abs/2303.02622 (2023) - 2022
- [j19]Mahdi Soltani, Mahdi Jafari Siavoshani, Amir Hossein Jahangir:
A content-based deep intrusion detection system. Int. J. Inf. Sec. 21(3): 547-562 (2022) - [j18]Shahrzad Sedaghat, Amir Hossein Jahangir:
FRT-SDN: an effective firm real time routing for SDN by early removal of late packets. Telecommun. Syst. 80(3): 359-382 (2022) - 2021
- [j17]Shahrzad Sedaghat, Amir Hossein Jahangir:
RT-TelSurg: Real Time Telesurgery Using SDN, Fog, and Cloud as Infrastructures. IEEE Access 9: 52238-52251 (2021) - [j16]A. Hesam Mohseni, Amir Hossein Jahangir, Seyed Mohammad Hosseini:
Toward a comprehensive subjective evaluation of VoIP users' quality of experience (QoE): a case study on Persian language. Multim. Tools Appl. 80(21): 31783-31802 (2021) - [j15]Shahrzad Sedaghat, Amir Hossein Jahangir:
R2T-DSDN: reliable real-time distributed controller-based SDN. J. Supercomput. 77(11): 12420-12457 (2021) - [c22]Seyed Mohammad Hosseini, Amir Hossein Jahangir, Sina Daraby:
Session-persistent Load Balancing for Clustered Web Servers without Acting as a Reverse-proxy. CNSM 2021: 360-364 - [i5]Mahdi Soltani, Behzad Ousat, Mahdi Jafari Siavoshani, Amir Hossein Jahangir:
An Adaptable Deep Learning-Based Intrusion Detection System to Zero-Day Attacks. CoRR abs/2108.09199 (2021) - 2020
- [i4]Mahdi Soltani, Mahdi Jafari Siavoshani, Amir Hossein Jahangir:
A Content-Based Deep Intrusion Detection System. CoRR abs/2001.05009 (2020)
2010 – 2019
- 2019
- [j14]Mohsen Moradi, Amir Hossein Jahangir:
A Generic Error-Free AI-Based Encoding for FFT Computation. Circuits Syst. Signal Process. 38(2): 699-715 (2019) - [j13]Ghasem Kahe, Amir Hossein Jahangir:
A self-tuning controller for queuing delay regulation in TCP/AQM networks. Telecommun. Syst. 71(2): 215-229 (2019) - [j12]Seyed Mohammad Hosseini, Amir Hossein Jahangir, Mehdi Kazemi:
Digesting Network Traffic for Forensic Investigation Using Digital Signal Processing Techniques. IEEE Trans. Inf. Forensics Secur. 14(12): 3312-3321 (2019) - [i3]Seyed Mohammad Hosseini, Amir Hossein Jahangir:
An Effective Payload Attribution Scheme for Cybercriminal Detection Using Compressed Bitmap Index Tables and Traffic Downsampling. CoRR abs/1906.04998 (2019) - [i2]Seyed Mohammad Hosseini, Amir Hossein Jahangir, Mehdi Kazemi:
Digesting Network Traffic for Forensic Investigation Using Digital Signal Processing Techniques. CoRR abs/1910.02023 (2019) - 2018
- [j11]Peyman Dodangeh, Amir Hossein Jahangir:
A biometric security scheme for wireless body area networks. J. Inf. Secur. Appl. 41: 62-74 (2018) - [j10]Mohammad Reza Asadi Kouhanjani, Amir Hossein Jahangir:
Improving hardware Trojan detection using scan chain based ring oscillators. Microprocess. Microsystems 63: 55-65 (2018) - [j9]Seyed Mohammad Hosseini, Amir Hossein Jahangir:
An Effective Payload Attribution Scheme for Cybercriminal Detection Using Compressed Bitmap Index Tables and Traffic Downsampling. IEEE Trans. Inf. Forensics Secur. 13(4): 850-860 (2018) - 2017
- [j8]Laleh Arshadi, Amir-Hossein Jahangir:
An empirical study on TCP flow interarrival time distribution for normal and anomalous traffic. Int. J. Commun. Syst. 30(1) (2017) - 2016
- [i1]Hossein Ahmadvand, Amir Hossein Jahangir, Ataollah Fatahi Baarzi:
Analysis and Evaluation of Real-time and Safety Characteristics of IEEE 802.11p protocol in VANET. CoRR abs/1612.01894 (2016) - 2014
- [j7]Ghasem Kahe, Amir-Hossein Jahangir, Behrouz Ebrahimi:
A compensated PID active queue management controller using an improved queue dynamic model. Int. J. Commun. Syst. 27(12): 4543-4563 (2014) - [j6]Laleh Arshadi, Amir-Hossein Jahangir:
Benford's law behavior of Internet traffic. J. Netw. Comput. Appl. 40: 194-205 (2014) - [j5]Ghasem Kahe, Amir Hossein Jahangir, Behrouz Ebrahimi:
AQM controller design for TCP networks based on a new control strategy. Telecommun. Syst. 57(4): 295-311 (2014) - 2013
- [c21]Ghasem Kahe, Amir Hossein Jahangir:
On the Gaussian Characteristics of Aggregated Short-Lived Flows on High-Bandwidth Links. AINA Workshops 2013: 860-865 - [c20]Saeid Tizpaz-Niari, Amir Hossein Jahangir:
Verification of OSPF vulnerabilities by colored Petri net. SIN 2013: 102-109 - 2011
- [c19]Farshad Amin, Amir Hossein Jahangir:
Time and energy cost analysis of Kerberos security protocol in Wireless Sensor Networks. IAS 2011: 308-313 - [c18]Laleh Arshadi, Amir-Hossein Jahangir:
On the TCP Flow Inter-arrival Times Dsitribution. EMS 2011: 360-365 - [c17]Mehdi Modarressi, Seyed Hossein Nikounia, Amir Hossein Jahangir:
Low-power arithmetic unit for DSP applications. SoC 2011: 68-71 - [c16]Laleh Arshadi, Amir-Hossein Jahangir:
Entropy based SYN flooding detection. LCN 2011: 139-142 - 2010
- [j4]Seyed-Abdoreza Tahaee, Amir-Hossein Jahangir:
A polynomial algorithm for partitioning problems. ACM Trans. Embed. Comput. Syst. 9(4): 34:1-34:38 (2010) - [c15]Hamed Yousefi, Kambiz Mizanian, Amir-Hossein Jahangir:
Modeling and Evaluating the Reliability of Cluster-Based Wireless Sensor Networks. AINA 2010: 827-834
2000 – 2009
- 2009
- [c14]Mohammad Baharloo, Reza Hajisheykhi, Mohammad Arjomand, Amir-Hossein Jahangir:
An Analytical Performance Evaluation for WSNs Using Loop-Free Bellman Ford Protocol. AINA 2009: 568-571 - [c13]Kambiz Mizanian, Reza Hajisheykhi, Mohammad Baharloo, Amir-Hossein Jahangir:
RACE: A Real-Time Scheduling Policy and Communication Architecture for Large-Scale Wireless Sensor Networks. CNSR 2009: 458-460 - [c12]Hamed Yousefi, Ali Dabirmoghaddam, Kambiz Mizanian, Amir-Hossein Jahangir:
Score based reliable routing in wireless sensor networks. ICOIN 2009: 1-5 - [c11]Seyed Hossein Nikounia, Farshad Amin, Amir Hossein Jahangir:
A Lightweight Key Establishment Scheme for Wireless Sensor Networks. NTMS 2009: 1-5 - 2008
- [c10]Mehrdad Khatir, Amir-Hossein Jahangir, Hamid Beigy:
Investigating the Baldwin effect on Cartesian Genetic Programming efficiency. IEEE Congress on Evolutionary Computation 2008: 2360-2364 - [c9]Alireza Masoum, Amir Hossein Jahangir, Zahra Taghikhaki:
Survivability Analysis of Wireless Sensor Network with Transient Faults. CIMCA/IAWTIC/ISE 2008: 975-980 - [c8]Ali Mahjur, Mahmud Taghizadeh, Amir-Hossein Jahangir:
Lazy instruction scheduling: keeping performance, reducing power. ISLPED 2008: 375-380 - [c7]Alireza Masoum, Amir Hossein Jahangir, Zahra Taghikhaki, Akram Masoum:
Survivability modeling of wireless sensor networks. ISWCS 2008: 593-597 - 2007
- [c6]A. Azarfar, Amir Hossein Jahangir:
Voice quality measurement in a typical router-based network. LCN 2007: 274-275 - 2006
- [j3]Saeed Safari, Amir-Hossein Jahangir, Hadi Esmaeilzadeh:
A parameterized graph-based framework for high-level test synthesis. Integr. 39(4): 363-381 (2006) - [j2]Manijeh Keshtgary, Amir Hossein Jahangir, Fahad Ahmed Al-Zahrani, Anura P. Jayasumana:
Survivability Performance Evaluation of WDM Networks with Wavelength Converters. Photonic Netw. Commun. 11(1): 15-27 (2006) - 2005
- [j1]Ali Mahjur, Amir-Hossein Jahangir, A. H. Gholamipour:
On the performance of trace locality of reference. Perform. Evaluation 60(1-4): 51-72 (2005) - [c5]Manijeh Keshtgary, Amir Hossein Jahangir, Anura P. Jayasumana:
Network survivability performance evaluation using fault trees. Communications and Computer Networks 2005: 158-163 - [c4]Ali Mahjur, Amir-Hossein Jahangir:
Dead Block Placement Avoidance in L1 Data Caches. IASTED PDCS 2005: 51-56 - 2004
- [c3]Manijeh Keshtgary, Fahad Ahmed Al-Zahrani, Anura P. Jayasumana, Amir Hossein Jahangir:
Network Survivability Performance Evaluation with Applications in WDM Networks with Wavelength Conversion. LCN 2004: 344-351 - 2003
- [c2]Saeed Safari, Hadi Esmaeilzadeh, Amir-Hossein Jahangir:
Testability Improvement During High-Level Synthesis. Asian Test Symposium 2003: 505 - [c1]Saeed Safari, Hadi Esmaeilzadeh, Amir-Hossein Jahangir:
A novel improvement technique for high-level test synthesis. ISCAS (5) 2003: 609-612
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint