


default search action
Abbas Rasoolzadegan Barforoush
Person information
- affiliation: Ferdowsi University of Mashhad, Mashhad, Iran
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Zahra Purfallah Mazraemolla, Abbas Rasoolzadegan
:
An effective failure detection method for microservice-based systems using distributed tracing data. Eng. Appl. Artif. Intell. 133: 108558 (2024) - [j25]Neda Khorasani
, Faeze Ramezani
, Hoda Taheri
, Neda Mohammadi, Parisa Khoshdel, Bahareh Taghavi
, Saeid Abrishami
, Abbas Rasoolzadegan
:
Cloud Broker: A Systematic Mapping Study. IEEE Trans. Serv. Comput. 17(5): 2989-3005 (2024) - 2023
- [j24]Jalal Sakhdari, Behrooz Zolfaghari, Shaghayegh Izadpanah, Samaneh Mahdizadeh Zargar, Mahla Rahati-Quchani, Mahsa Shadi, Saeid Abrishami
, Abbas Rasoolzadegan:
Edge computing: A systematic mapping study. Concurr. Comput. Pract. Exp. 35(22) (2023) - [j23]Ali Ahmadian Ramaki, Abbas Ghaemi Bafghi
, Abbas Rasoolzadegan:
CAPTAIN: Community-based Advanced Persistent Threat Analysis in IT Networks. Int. J. Crit. Infrastructure Prot. 42: 100620 (2023) - [j22]Ali Ahmadian Ramaki
, Abbas Ghaemi Bafghi, Abbas Rasoolzadegan:
Towards Event Aggregation for Reducing the Volume of Logged Events During IKC Stages of APT Attacks. ISC Int. J. Inf. Secur. 15(2) (2023) - [j21]Niloofar Bozorgvar, Abbas Rasoolzadegan
, Ahad Harati:
Probabilistic detection of GoF design patterns. J. Supercomput. 79(2): 1654-1682 (2023) - [i5]Hanieh Khosravi, Abbas Rasoolzadegan:
A Meta-Learning Approach for Software Refactoring. CoRR abs/2301.08061 (2023) - 2022
- [j20]Neda Mohammadi
, Abbas Rasoolzadegan
:
A two-stage location-sensitive and user preference-aware recommendation system. Expert Syst. Appl. 191: 116188 (2022) - [j19]Zeinab Shahbazi, Abbas Rasoolzadegan
, Zahra Purfallah, Somayeh Jafari Horestani:
A new method for detecting various variants of GoF design patterns using conceptual signatures. Softw. Qual. J. 30(3): 651-686 (2022) - [j18]Mariam Kouli, Abbas Rasoolzadegan
:
A Feature-Based Method for Detecting Design Patterns in Source Code. Symmetry 14(7): 1491 (2022) - [c2]Neda Mohammadi
, Abbas Rasoolzadegan:
A Pattern-aware Design and Implementation Guideline for Microservice-based Systems. CSICC 2022: 1-6 - 2021
- [j17]Diyana Tehrany Dehkordy, Abbas Rasoolzadegan
:
A new machine learning-based method for android malware detection on imbalanced dataset. Multim. Tools Appl. 80(16): 24533-24554 (2021) - [i4]Jalal Sakhdari, Shaghayegh Izadpanah, Behrooz Zolfaghari, Samaneh H.-Mahdizadeh-Zargar, Mahla Rahati-Quchani, Mahsa Shadi, Saeid Abrishami, Abbas Rasoolzadegan:
Edge Computing: A Systematic Mapping Study. CoRR abs/2102.02720 (2021) - [i3]Hoda Taheri, Faeze Ramezani, Neda Mohammadi, Parisa Khoshdel, Bahareh Taghavi, Neda Khorasani, Saeid Abrishami, Abbas Rasoolzadegan:
Cloud Broker: A Systematic Mapping Study. CoRR abs/2102.12717 (2021) - [i2]Ali Ahmadian Ramaki, Abbas Ghaemi Bafghi, Abbas Rasoolzadegan:
Towards event aggregation for reducing the volume of logged events during IKC stages of APT attacks. CoRR abs/2109.14303 (2021) - 2020
- [j16]Bahareh Bafandeh Mayvan
, Abbas Rasoolzadegan
, Abbas Javan Jafari:
Bad smell detection using quality metrics and refactoring opportunities. J. Softw. Evol. Process. 32(8) (2020) - [j15]Mohammad Mahdi NezhadShokouhi, Mohammad Ali Majidi, Abbas Rasoolzadegan
:
Software defect prediction using over-sampling and feature extraction based on Mahalanobis distance. J. Supercomput. 76(1): 602-635 (2020) - [j14]Abbas Javan Jafari, Abbas Rasoolzadegan:
Security patterns: A systematic mapping study. J. Comput. Lang. 56: 100938 (2020)
2010 – 2019
- 2019
- [j13]Bahareh Bafandeh Mayvan, Abbas Rasoolzadegan
, A. M. Ebrahimi:
A new benchmark for evaluating pattern mining methods based on the automatic generation of testbeds. Inf. Softw. Technol. 109: 60-79 (2019) - [j12]Abbas Javan Jafari, Abbas Rasoolzadegan
:
Quality-centric security pattern mutations. Softw. Qual. J. 27(4): 1531-1561 (2019) - 2018
- [j11]Ali Ahmadian Ramaki, Abbas Rasoolzadegan
, Abbas Ghaemi Bafghi:
A Systematic Mapping Study on Intrusion Alert Analysis in Intrusion Detection Systems. ACM Comput. Surv. 51(3): 55:1-55:41 (2018) - [j10]Ali Ahmadian Ramaki, Abbas Rasoolzadegan
, Abbas Javan Jafari:
A systematic review on intrusion detection based on the Hidden Markov Model. Stat. Anal. Data Min. 11(3): 111-134 (2018) - [j9]Mohaddeseh Basiri
, Abbas Rasoolzadegan
:
Delay-Aware Resource Provisioning for Cost-Efficient Cloud Gaming. IEEE Trans. Circuits Syst. Video Technol. 28(4): 972-983 (2018) - [i1]Abbas Javan Jafari, Abbas Rasoolzadegan:
Security Patterns: A Systematic Mapping Study. CoRR abs/1811.12715 (2018) - 2017
- [j8]Hamed Arshad
, Abbas Rasoolzadegan
:
A secure authentication and key agreement scheme for roaming service with user anonymity. Int. J. Commun. Syst. 30(18) (2017) - [j7]Bahareh Bafandeh Mayvan, Abbas Rasoolzadegan
, Z. Ghavidel Yazdi:
The state of the art on design patterns: A systematic mapping of the literature. J. Syst. Softw. 125: 93-118 (2017) - [j6]Bahareh Bafandeh Mayvan, Abbas Rasoolzadegan
:
Design pattern detection based on the graph theory. Knowl. Based Syst. 120: 211-225 (2017) - 2016
- [j5]Hamed Arshad
, Abbas Rasoolzadegan
:
Design of a Secure Authentication and Key Agreement Scheme Preserving User Privacy Usable in Telecare Medicine Information Systems. J. Medical Syst. 40(11): 237:1-237:19 (2016) - [j4]Ali Ahmadian Ramaki, Abbas Rasoolzadegan:
Causal knowledge analysis for detecting and modeling multi-step attacks. Secur. Commun. Networks 9(18): 6042-6065 (2016) - 2015
- [j3]Abbas Rasoolzadegan, Rohollah Alesheykh, Mohammad Reza Meybodi:
A new approach to active rule scheduling. Eng. Appl. Artif. Intell. 39: 55-79 (2015) - 2014
- [j2]Abbas Rasoolzadegan
, Ahmad Abdollahzadeh Barforoush:
Reliable yet flexible software through formal model transformation (rule definition). Knowl. Inf. Syst. 40(1): 79-126 (2014) - 2011
- [c1]Abbas Rasoolzadegan:
A New Approach to Reliable, yet Flexible Software. CAiSE (Doctoral Consortium) 2011: 3-14
2000 – 2009
- 2008
- [j1]Abbas Rasoolzadegan Barforoush, Rohollah Alesheykh, Ahmad Abdollahzadeh:
A New Rule Scheduling Approach based on Estimation of Rule Execution Probability in Active Database. J. Convergence Inf. Technol. 3(3): 6-13 (2008)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint