default search action
Mahmoud Abbasi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j9]Mahmoud Abbasi, Javier Prieto, Amin Shahraki, Juan M. Corchado:
Industrial data monetization: A blockchain-based industrial IoT data trading system. Internet Things 24: 100959 (2023) - [c7]Marta Plaza-Hernández, Mahmoud Abbasi, Vladimir Djapic, Javier Prieto Tejedor, Emilio S. Corchado Rodríguez:
Environmental Parameters that Negatively Impact Underwater Cultural Heritage. DCAI (2) 2023: 199-206 - [c6]Mahmoud Abbasi, Javier Prieto, Juan Manuel Corchado:
Network Automation: From Intent-Based Networking to Cloud-Native Networking. DCAI (2) 2023: 418-427 - 2022
- [j8]Mahmoud Abbasi, Marta Plaza-Hernández, Javier Prieto, Juan M. Corchado:
Security in the Internet of Things Application Layer: Requirements, Threats, and Solutions. IEEE Access 10: 97197-97216 (2022) - [j7]Amin Shahraki, Mahmoud Abbasi, Amir Taherkordi, Anca Delia Jurcut:
A comparative study on online machine learning techniques for network traffic streams analysis. Comput. Networks 207: 108836 (2022) - [j6]Amin Shahraki, Mahmoud Abbasi, Amir Taherkordi, Anca Delia Jurcut:
Active Learning for Network Traffic Classification: A Technical Study. IEEE Trans. Cogn. Commun. Netw. 8(1): 422-439 (2022) - [c5]Yeray Mezquita, Marta Plaza-Hernández, Mahmoud Abbasi, Javier Prieto:
Cryptocurrencies, Systematic Literature Review on Their Current Context and Challenges. BLOCKCHAIN 2022: 162-172 - [c4]Marta Plaza-Hernández, Mahmoud Abbasi, Yeray Mezquita:
An IoUT-Based Platform for Managing Underwater Cultural Heritage. DCAI (2) 2022: 127-136 - [c3]Mahmoud Abbasi, Marta Plaza-Hernández, Yeray Mezquita:
Security of IoT Application Layer: Requirements, Threats, and Solutions. ISAmI 2022: 86-100 - [c2]Mahmoud Abbasi, Amir Taherkordi, Amin Shahraki:
FLITC: A Novel Federated Learning-Based Method for IoT Traffic Classification. SMARTCOMP 2022: 206-212 - 2021
- [j5]Mahmoud Abbasi, Amin Shahraki, Hamid R. Barzegar, Claus Pahl:
Synchronization Techniques in "Device to Device- and Vehicle to Vehicle-Enabled" Cellular Networks: A survey. Comput. Electr. Eng. 90: 106955 (2021) - [j4]Mahmoud Abbasi, Amin Shahraki, Amir Taherkordi:
Deep Learning for Network Traffic Monitoring and Analysis (NTMA): A Survey. Comput. Commun. 170: 19-41 (2021) - [j3]Mahmoud Abbasi, Amin Shahraki, Md. Jalil Piran, Amir Taherkordi:
Deep Reinforcement Learning for QoS provisioning at the MAC layer: A Survey. Eng. Appl. Artif. Intell. 102: 104234 (2021) - [c1]Amin Shahraki, Mahmoud Abbasi, Amir Taherkordi, Mohammed Kaosar:
Internet Traffic Classification Using an Ensemble of Deep Convolutional Neural Networks. FlexNets@SIGCOMM 2021: 38-43 - [i3]Amin Shahraki, Mahmoud Abbasi, Md. Jalil Piran, Mingzhe Chen, Shuguang Cui:
A Comprehensive Survey on 6G Networks: Applications, Core Services, Enabling Technologies, and Future Challenges. CoRR abs/2101.12475 (2021) - [i2]Amin Shahraki, Mahmoud Abbasi, Amir Taherkordi, Anca Delia Jurcut:
Active Learning for Network Traffic Classification: A Technical Survey. CoRR abs/2106.06933 (2021) - 2020
- [j2]Amin Shahraki, Mahmoud Abbasi, Øystein Haugen:
Boosting algorithms for network intrusion detection: A comparative evaluation of Real AdaBoost, Gentle AdaBoost and Modest AdaBoost. Eng. Appl. Artif. Intell. 94: 103770 (2020)
2010 – 2019
- 2019
- [j1]Seyed Reza Nabavi, Mahmoud Abbasi:
Black box modeling and multiobjective optimization of electrochemical ozone production process. Neural Comput. Appl. 31(S-2): 957-968 (2019) - [i1]Mahmoud Abbasi:
NB-IoT Small Cell: A 3GPP Perspective. CoRR abs/1910.00677 (2019)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:47 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint