default search action
Peyman Kabiri
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j20]Asma Abdolahpoor, Peyman Kabiri:
New texture-based pansharpening method using wavelet packet transform and PCA. Int. J. Wavelets Multiresolution Inf. Process. 18(4): 2050025:1-2050025:15 (2020) - [j19]Davar Ahmadpour, Peyman Kabiri:
Detecting forged management frames with spoofed addresses in IEEE 802.11 networks using received signal strength indicator. Iran J. Comput. Sci. 3(3): 137-143 (2020)
2010 – 2019
- 2019
- [c8]Peyman Kabiri, Mahdieh Chavoshi:
Destructive Attacks Detection and Response System for Physical Devices in Cyber-Physical Systems. Cyber Security 2019: 1-6 - 2018
- [j18]Mojtaba Mostafavi, Peyman Kabiri:
Detection of repetitive and irregular hypercall attacks from guest virtual machines to Xen hypervisor. Iran J. Comput. Sci. 1(2): 89-97 (2018) - 2017
- [j17]Sirous Kourki Nejat, Peyman Kabiri:
An Adaptive and Cost-Based Intrusion Response System. Cybern. Syst. 48(6-7): 495-509 (2017) - [j16]Keyvan RahimiZadeh, Morteza Analoui, Peyman Kabiri, Bahman Javadi:
Workload-Aware Placement of Multi-Tier Applications in Virtualized Datacenters. Comput. J. 60(2): 210-239 (2017) - [j15]Hamid Ghaderi, Peyman Kabiri:
Automobile engine condition monitoring using sound emission. Turkish J. Electr. Eng. Comput. Sci. 25: 1807-1826 (2017) - [j14]Mohsen Moshki, Peyman Kabiri, Alireza Mohebalhojeh:
Scalable data-driven modeling of spatio-temporal systems: Weather forecasting. Intell. Data Anal. 21(3): 577-595 (2017) - [j13]Mehdi Hosseinzadeh Aghdam, Morteza Analoui, Peyman Kabiri:
Modelling trust networks using resistive circuits for trust-aware recommender systems. J. Inf. Sci. 43(1): 135-144 (2017) - [j12]Mehdi Hosseinzadeh Aghdam, Morteza Analoui, Peyman Kabiri:
Collaborative filtering using non-negative matrix factorisation. J. Inf. Sci. 43(4): 567-579 (2017) - 2016
- [j11]Mehdi Hosseinzadeh Aghdam, Peyman Kabiri:
Feature Selection for Intrusion Detection System Using Ant Colony Optimization. Int. J. Netw. Secur. 18(3): 420-432 (2016) - [j10]Ali Ahmadvand, Peyman Kabiri:
Multispectral MRI image segmentation using Markov random field model. Signal Image Video Process. 10(2): 251-258 (2016) - 2015
- [j9]Mohsen Moshki, Peyman Kabiri, Alireza Mohebalhojeh:
Scalable Feature Selection in High-Dimensional Data Based on GRASP. Appl. Artif. Intell. 29(3): 283-296 (2015) - [j8]Keyvan RahimiZadeh, Reza Nasiri Gerde, Morteza Analoui, Peyman Kabiri:
Performance evaluation of Web server workloads in Xen-based virtualized computer system: analytical modeling and experimental validation. Concurr. Comput. Pract. Exp. 27(17): 4741-4762 (2015) - [j7]Keyvan RahimiZadeh, Morteza Analoui, Peyman Kabiri, Bahman Javadi:
Performance modeling and analysis of virtualized multi-tier applications under dynamic workloads. J. Netw. Comput. Appl. 56: 166-187 (2015) - [j6]S. Mobarakeh Moosavirad, Peyman Kabiri, Hamidreza Mahini:
Rashnu: a Wi-Fi intrusion response scheme. Secur. Commun. Networks 8(12): 2070-2078 (2015) - 2014
- [j5]Keyvan RahimiZadeh, Peyman Kabiri:
Trust-based routing method using a mobility-based clustering approach in mobile ad hoc networks. Secur. Commun. Networks 7(11): 1746-1763 (2014) - 2012
- [c7]Mehdi Hosseinzadeh Aghdam, Morteza Analoui, Peyman Kabiri:
Application of nonnegative matrix factorization in recommender systems. IST 2012: 873-876 - 2011
- [j4]Peyman Kabiri, Mehran Aghaei:
Feature Analysis for Intrusion Detection in Mobile Ad-hoc Networks. Int. J. Netw. Secur. 12(1): 42-49 (2011) - 2010
- [j3]Peyman Kabiri, Gholam Reza Zargar:
Identification of Effective Optimal Network Feature Set for Probing Attack Detection Using PCA Method. Int. J. Web Appl. 2(3): 164-174 (2010) - [c6]Gholam Reza Zargar, Peyman Kabiri:
Selection of Effective Network Parameters in Attacks for Intrusion Detection. ICDM 2010: 643-652
2000 – 2009
- 2008
- [c5]Hamed Shahbazi, Mohsen Soryani, Peyman Kabiri:
Content based multispectral image retrieval using principal component analysis. CIVR 2008: 205-210 - [c4]Peyman Kabiri, Hamed Shahbazi, Mohsen Soryani:
Statistical shape based multispectral image retrieval extracting Power Spectrum Vectors. ICDIM 2008: 650-655 - 2007
- [j2]Peyman Kabiri, Ali A. Ghorbani:
A Rule-based Temporal Alert Correlation System. Int. J. Netw. Secur. 5(1): 66-72 (2007) - [c3]Kushan Ahmadian, Abbas Golestani, Nasser Mozayani, Peyman Kabiri:
A new multi-objective evolutionary approach for creating ensemble of classifiers. SMC 2007: 1031-1036 - 2005
- [j1]Peyman Kabiri, Ali A. Ghorbani:
Research on Intrusion Detection and Response: A Survey. Int. J. Netw. Secur. 1(2): 84-102 (2005) - 2004
- [c2]Peyman Kabiri:
A Comparison Between the Proportional Keen Approximator and the Neural Networks Learning Methods. ICEIS (2) 2004: 159-164 - 2002
- [c1]Peyman Kabiri:
Using black box and machine learning approach in controlling a machine. SMC (2) 2002: 6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint