default search action
Jaber Karimpour
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Maryam Mohammadzad, Jaber Karimpour, Farnaz Mahan:
Cyber attacker's next action prediction on dynamic real-time behavior model. Comput. Electr. Eng. 113: 109031 (2024) - [j25]Hayder Makki Shakir, Jaber Karimpour, Jafar Razmara:
A Multi-Objective Genetic Algorithm Based Load Balancing Strategy for Health Monitoring Systems in Fog-Cloud. Comput. Syst. Sci. Eng. 48(1): 35-55 (2024) - 2023
- [j24]Maryam Mohammadzad, Jaber Karimpour, Farnaz Mahan:
MAGD: Minimal Attack Graph Generation Dynamically in Cyber Security. Comput. Networks 236: 110004 (2023) - [j23]Maryam Mohammadzad, Jaber Karimpour:
Using rootkits hiding techniques to conceal honeypot functionality. J. Netw. Comput. Appl. 214: 103606 (2023) - [c8]Basim Najim Al-Din, Jaber Karimpour, Farnaz Mahan:
A Deep Fake Detection System Using Diffusion Model Based on Graph Based Image Segmentation. MLIS 2023: 138-144 - 2022
- [j22]MohammadSadegh Mohagheghi, Jaber Karimpour, Ayaz Isazadeh:
Improving modified policy iteration for probabilistic model checking. Comput. Sci. 23(1) (2022) - 2021
- [j21]Zahra Abdi Reyhan, Shahriar Lotfi, Ayaz Isazadeh, Jaber Karimpour:
Intra-Tile Parallelization for Two-Level Perfectly Nested Loops With Non-Uniform Dependences. Comput. J. 64(9): 1358-1383 (2021) - [j20]Ahad Niknia, Miguel Correia, Jaber Karimpour:
Secure cloud-of-clouds storage with space-efficient secret sharing. J. Inf. Secur. Appl. 59: 102826 (2021) - [i1]Ahad Niknia, Miguel Correia, Jaber Karimpour:
Secure cloud-of-clouds storage with space-efficient secret sharing. IACR Cryptol. ePrint Arch. 2021: 666 (2021) - 2020
- [j19]MohammadSadegh Mohagheghi, Jaber Karimpour, Ayaz Isazadeh:
Prioritizing Methods to Accelerate Probabilistic Model Checking of Discrete-Time Markov Models. Comput. J. 63(1): 105-122 (2020) - [j18]Robab Alyari, Jaber Karimpour, Habib Izadkhah:
Specifying a New Requirement Model for Secure Adaptive Systems. Comput. J. 63(8): 1148-1167 (2020)
2010 – 2019
- 2019
- [j17]Ali A. Noroozi, Jaber Karimpour, Ayaz Isazadeh:
Information leakage of multi-threaded programs. Comput. Electr. Eng. 78: 400-419 (2019) - [j16]Khayyam Salehi, Jaber Karimpour, Habib Izadkhah, Ayaz Isazadeh:
Channel Capacity of Concurrent Probabilistic Programs. Entropy 21(9): 885 (2019) - [j15]Ebrahim Zarei Zefreh, Shahriar Lotfi, Leyli Mohammad Khanli, Jaber Karimpour:
Topology and computational-power aware tile mapping of perfectly nested loops with dependencies on distributed systems. J. Parallel Distributed Comput. 129: 14-35 (2019) - [j14]Hamed Babaei, Jaber Karimpour, Amin Hadidi:
Generating an optimal timetabling for multi-departments common lecturers using hybrid fuzzy and clustering algorithms. Soft Comput. 23(13): 4735-4747 (2019) - [c7]Ali A. Noroozi, Khayyam Salehi, Jaber Karimpour, Ayaz Isazadeh:
Secure Information Flow Analysis Using the PRISM Model Checker. ICISS 2019: 154-172 - 2018
- [j13]Hamed Babaei, Jaber Karimpour, Amin Hadidi:
Applying Hybrid Fuzzy Multi-Criteria Decision-Making Approach to Find the Best Ranking for the Soft Constraint Weights of Lecturers in UCTP. Int. J. Fuzzy Syst. 20(1): 62-77 (2018) - [j12]Yousef Seyfari, Shahriar Lotfi, Jaber Karimpour:
Optimizing inter-nest data locality in imperfect stencils based on loop blocking. J. Supercomput. 74(10): 5432-5460 (2018) - 2017
- [j11]Hamed Babaei, Jaber Karimpour, Amin Hadidi:
Common lecturers timetabling among departments based on funnel-shape clustering algorithm. Appl. Intell. 46(2): 386-408 (2017) - [j10]Ebrahim Zarei Zefreh, Shahriar Lotfi, Leyli Mohammad Khanli, Jaber Karimpour:
3-D data partitioning for 3-level perfectly nested loops on heterogeneous distributed systems. Concurr. Comput. Pract. Exp. 29(5) (2017) - [j9]Jaber Karimpour, Shahriar Lotfi, Aliakbar Tajari Siahmarzkooh:
Intrusion detection in network flows based on an optimized clustering criterion. Turkish J. Electr. Eng. Comput. Sci. 25: 1963-1975 (2017) - [j8]Yousef Seyfari, Shahriar Lotfi, Jaber Karimpour:
PVL: Parallelization and Vectorization of Affine Perfectly Nested-Loops Considering Data Locality on Short-Vector Multicore Processors using Intrinsic Vectorization. Scalable Comput. Pract. Exp. 18(1): 67-89 (2017) - 2016
- [j7]Ebrahim Zarei Zefreh, Shahriar Lotfi, Leyli Mohammad Khanli, Jaber Karimpour:
Tiling and Scheduling of Three-level Perfectly Nested Loops with Dependencies on Heterogeneous Systems. Scalable Comput. Pract. Exp. 17(4): 331-350 (2016) - [c6]Golnaz Sahebi, Amin Majd, Masoumeh Ebrahimi, Juha Plosila, Jaber Karimpour, Hannu Tenhunen:
SEECC: A secure and efficient elliptic curve cryptosystem for E-health applications. HPCS 2016: 492-500 - 2015
- [j6]Hamed Babaei, Jaber Karimpour, Amin Hadidi:
A survey of approaches for university course timetabling problem. Comput. Ind. Eng. 86: 43-59 (2015) - [c5]Jaber Karimpour, Ayaz Isazadeh, MohammadSadegh Mohagheghi, Khayyam Salehi:
Improved Iterative Methods for Verifying Markov Decision Processes. FSEN 2015: 207-214 - [c4]Jaber Karimpour, Ayaz Isazadeh, Ali A. Noroozi:
Verifying Observational Determinism. SEC 2015: 82-93 - 2014
- [j5]Ayaz Isazadeh, Jaber Karimpour, Islam Elgedawy, Habib Izadkhah:
An analytical model for source code distributability verification. J. Zhejiang Univ. Sci. C 15(2): 126-138 (2014) - 2013
- [j4]Jaber Karimpour, Ayaz Isazadeh, Habib Izadkhah:
Early performance assessment in component-based software systems. IET Softw. 7(2) (2013) - [j3]Jaber Karimpour, Robab Alyari, Ali A. Noroozi:
Formal framework for specifying dynamic reconfiguration of adaptive systems. IET Softw. 7(5): 258-270 (2013) - 2011
- [c3]Arash Jodeiri Salimi, Ayaz Isazadeh, Jaber Karimpour:
Admission Control for WebServices in Enterprise Systems Using Expert Systems. WISM (1) 2011: 192-199
2000 – 2009
- 2009
- [j2]Ayaz Isazadeh, Jaber Karimpour:
A new formalism for mathematical description and verification of component-based systems. J. Supercomput. 49(3): 334-353 (2009) - 2008
- [j1]Ayaz Isazadeh, Jaber Karimpour:
Viewcharts: Syntax and Semantics. Informatica 19(3): 345-362 (2008) - 2007
- [c2]Ayaz Isazadeh, Jaber Karimpour, Hosein Isazadeh:
A New Method for Describing the Syntax and Semantics of VIEWCHARTS. ISPA Workshops 2007: 345-354 - [c1]Ayaz Isazadeh, Jaber Karimpour, Hosein Isazadeh:
A New Formalism for Describing Concurrent Systems. ISPA Workshops 2007: 355-364
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:45 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint