default search action
Mahdi Abadi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j19]Fatemeh Deldar, Mahdi Abadi:
Deep Learning for Zero-day Malware Detection and Classification: A Survey. ACM Comput. Surv. 56(2): 36:1-36:37 (2024) - 2022
- [j18]Fatemeh Deldar, Mahdi Abadi, Mohammad Ebrahimifard:
Android Malware Detection Using One-Class Graph Neural Networks. ISC Int. J. Inf. Secur. 14(3): 51-60 (2022) - 2021
- [j17]Fatemeh Deldar, Mahdi Abadi:
Enhancing spatial and temporal utilities in differentially private moving objects database release. Int. J. Inf. Sec. 20(4): 511-533 (2021) - [j16]Fatemeh Deldar, Mahdi Abadi:
A differentially private location generalization approach to guarantee non-uniform privacy in moving objects databases. Knowl. Based Syst. 225: 107084 (2021) - 2020
- [j15]Nadia Niknami, Mahdi Abadi, Fatemeh Deldar:
A fully spatial personalized differentially private mechanism to provide non-uniform privacy guarantees for spatial databases. Inf. Syst. 92: 101526 (2020) - [j14]Mahila Dadfarnia, Fazlollah Adibnia, Mahdi Abadi, Ali Dorri:
Incremental collusive fraud detection in large-scale online auction networks. J. Supercomput. 76(9): 7416-7437 (2020) - 2019
- [j13]Fatemeh Deldar, Mahdi Abadi:
PDP-SAG: Personalized Privacy Protection in Moving Objects Databases by Combining Differential Privacy and Sensitive Attribute Generalization. IEEE Access 7: 85887-85902 (2019) - [j12]Asghar Tajoddin, Mahdi Abadi:
RAMD: registry-based anomaly malware detection using one-class ensemble classifiers. Appl. Intell. 49(7): 2641-2658 (2019) - [j11]Mohammad Bagher Bahador, Mahdi Abadi, Asghar Tajoddin:
HLMD: a signature-based approach to hardware-level behavioral malware detection and classification. J. Supercomput. 75(8): 5551-5582 (2019) - 2018
- [j10]Fatemeh Deldar, Mahdi Abadi:
PLDP-TD: Personalized-location differentially private data analysis on trajectory databases. Pervasive Mob. Comput. 49: 1-22 (2018) - 2016
- [j9]Elahe Ghasemi Komishani, Mahdi Abadi, Fatemeh Deldar:
PPTD: Preserving personalized privacy in trajectory data publishing by sensitive attribute generalization and trajectory local suppression. Knowl. Based Syst. 94: 43-59 (2016) - 2015
- [j8]Moosa Yahyazadeh, Mahdi Abadi:
BotGrab: A negative reputation system for botnet detection. Comput. Electr. Eng. 41: 68-85 (2015) - [j7]Reza Sharifnya, Mahdi Abadi:
DFBotKiller: Domain-flux botnet detection based on the history of group activities and failures in DNS traffic. Digit. Investig. 12: 15-26 (2015) - [j6]Elham Parhizkar, Mahdi Abadi:
BeeOWA: A novel approach based on ABC algorithm and induced OWA operators for constructing one-class classifier ensembles. Neurocomputing 166: 367-381 (2015) - 2012
- [j5]Fatemeh Barani, Mahdi Abadi:
BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms. ISC Int. J. Inf. Secur. 4(1): 25-39 (2012) - [j4]Moosa Yahyazadeh, Mahdi Abadi:
BotOnus: an online unsupervised method for Botnet detection. ISC Int. J. Inf. Secur. 4(1): 51-62 (2012) - 2011
- [j3]Seyed Hossein Ahmadinejad, Saeed Jalili, Mahdi Abadi:
A hybrid model for correlating alerts of known and unknown attack scenarios and updating attack graphs. Comput. Networks 55(9): 2221-2240 (2011) - 2010
- [j2]Mahdi Abadi, Saeed Jalili:
A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs. ISC Int. J. Inf. Secur. 2(1): 13-32 (2010) - 2008
- [j1]Mahdi Abadi, Saeed Jalili:
Minimization Analysis of Network Attack Graphs Using Genetic Algorithms. Int. J. Comput. Their Appl. 15(4): 263-273 (2008)
Conference and Workshop Papers
- 2020
- [c13]Mahdieh Safarzadeh, Mahdi Abadi, Alireza Nowroozi:
HAL-RD: cross-correlating heterogeneous alerts and logs using resource dependencies. SAC 2020: 1726-1735 - 2018
- [c12]Ali Dorri, Mahdi Abadi, Mahila Dadfarnia:
SocialBotHunter: Botnet Detection in Twitter-Like Social Networking Services Using Semi-Supervised Collective Classification. DASC/PiCom/DataCom/CyberSciTech 2018: 496-503 - [c11]Farnood Faghihi, Mahdi Abadi, Asghar Tajoddin:
SMSBotHunter: A Novel Anomaly Detection Technique to Detect SMS Botnets. ISCISC 2018: 1-6 - [c10]Niloofar S. Alizadeh, Mahdi Abadi:
Akoman: Hardware-Level Malware Detection Using Discrete Wavelet Transform. SMARTCOMP 2018: 476-481 - 2017
- [c9]Nazanin Habibollahi, Mahdi Abadi, Mahila Dadfarnia:
CAFD: Detecting Collusive Frauds in Online Auction Networks by Combining One-Class Classification and Collective Classification. ISCISC 2017: 48-53 - 2014
- [c8]Alireza Gorji, Mahdi Abadi:
Detecting Obfuscated JavaScript Malware Using Sequences of Internal Function Calls. ACM Southeast Regional Conference 2014: 64: 1-64: 6 - 2013
- [c7]Ahad Azarian, Mahdi Abadi:
On the trade-off between stealth and propagation speed of Internet worms. ISCISC 2013: 1-6 - 2012
- [c6]Elahe Ghasemi Komishani, Mahdi Abadi:
A generalization-based approach for personalized privacy preservation in trajectory data publishing. IST 2012: 1129-1135 - [c5]Samaneh Mahdavifar, Mahdi Abadi, Mohsen Kahani, Hassan Mahdikhani:
A Clustering-Based Approach for Personalized Privacy Preserving Publication of Moving Object Trajectory Data. NSS 2012: 149-165 - 2011
- [c4]Fatemeh Barani, Mahdi Abadi:
An ABC-AIS Hybrid Approach to Dynamic Anomaly Detection in AODV-Based MANETs. TrustCom 2011: 714-720 - 2010
- [c3]Mohammad Ahmadi Livani, Mahdi Abadi:
Distributed PCA-based anomaly detection in wireless sensor networks. ICITST 2010: 1-8 - 2009
- [c2]Parvaz Mahdabi, Mahdi Abadi, Saeed Jalili:
A novel quantum-inspired evolutionary algorithm for solving combinatorial optimization problems. GECCO 2009: 1807-1808 - 2008
- [c1]Parvaz Mahdabi, Saeed Jalili, Mahdi Abadi:
A multi-start quantum-inspired evolutionary algorithm for solving combinatorial optimization problems. GECCO 2008: 613-614
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint