default search action
Mona Taghavi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2023
- [j13]Mona Taghavi, Jamal Bentahar, Hadi Otrok, Kaveh Bakhtiyari:
A reinforcement learning model for the reliability of blockchain oracles. Expert Syst. Appl. 214: 119160 (2023) - 2020
- [j12]Mona Taghavi, Jamal Bentahar, Hadi Otrok:
Two-stage game theoretical framework for IaaS market share dynamics. Future Gener. Comput. Syst. 102: 173-189 (2020) - [j11]Mona Taghavi, Jamal Bentahar, Hadi Otrok, Kaveh Bakhtiyari:
A Blockchain-Based Model for Cloud Service Quality Monitoring. IEEE Trans. Serv. Comput. 13(2): 276-288 (2020) - 2018
- [j10]Mona Taghavi, Jamal Bentahar, Kaveh Bakhtiyari, Chihab Hanachi:
New Insights Towards Developing Recommender Systems. Comput. J. 61(3): 319-348 (2018) - 2015
- [j9]Kaveh Bakhtiyari, Mona Taghavi, Hafizah Husain:
Hybrid affective computing - keyboard, mouse and touch screen: from review to experiment. Neural Comput. Appl. 26(6): 1277-1296 (2015) - 2013
- [j8]Ahmed Patel, Mona Taghavi, Kaveh Bakhtiyari, Joaquim Celestino Júnior:
An intrusion detection and prevention system in cloud computing: A systematic review. J. Netw. Comput. Appl. 36(1): 25-41 (2013) - 2012
- [j7]Mona Taghavi, Ahmed Patel, Nikita Schmidt, Christopher Wills, Yiqi Tew:
An analysis of web proxy logs with query distribution pattern approach for search engines. Comput. Stand. Interfaces 34(1): 162-170 (2012) - [j6]Ahmed Patel, Mona Taghavi, Joaquim Celestino Júnior, Rodziah Latih, Abdullah Mohd Zin:
Safety Measures for Social Computing in Wiki Learning Environment. Int. J. Inf. Secur. Priv. 6(2): 1-15 (2012) - [j5]Ahmed Patel, Wei Qi, Mona Taghavi:
An Evaluation of a Secure and Trustworthy Mobile Agent-based E-marketplace System. Inf. Manag. Comput. Secur. 20(2): 123-146 (2012) - 2011
- [j4]Kenan Kalajdzic, Ahmed Patel, Mona Taghavi:
Two Methods for Active Detection and Prevention of Sophisticated ARP-Poisoning Man-in-the-Middle Attacks on Switched Ethernet LANs. Int. J. Digit. Crime Forensics 3(3): 50-60 (2011) - [j3]Ahmed Patel, Wei Qi, Mona Taghavi:
Design of Secure and Trustworthy Mobile Agent-based E-marketplace System. Inf. Manag. Comput. Secur. 19(5): 333-352 (2011) - [j2]Mona Taghavi, Ahmed Patel, Hamed Taghavi:
Design of an Integrated Project Management Information System for Large Scale Public Projects: Iranian Case Study. J. Inf. Technol. Res. 4(3): 14-28 (2011) - [j1]Ahmed Patel, Mona Taghavi, Kaveh Bakhtiyari:
Evaluation of Cheating Detection Methods in Academic Writings. Libr. Hi Tech 29(4): 623-640 (2011)
Conference and Workshop Papers
- 2018
- [c6]Mona Taghavi, Jamal Bentahar, Hadi Otrok, Kaveh Bakhtiyari:
Cloudchain: A Blockchain-Based Coopetition Differential Game Model for Cloud Computing. ICSOC 2018: 146-161 - 2017
- [c5]Mona Taghavi, Jamal Bentahar, Hadi Otrok, Omar Abdel Wahab, Azzam Mourad:
On the Effects of User Ratings on the Profitability of Cloud Services. ICWS 2017: 1-8 - 2014
- [c4]Kaveh Bakhtiyari, Mona Taghavi, Hafizah Husain:
Implementation of Emotional-Aware Computer Systems Using Typical Input Devices. ACIIDS (1) 2014: 364-374 - 2013
- [c3]Mona Taghavi, Kaveh Bakhtiyari, Edgar Scavino:
Agent-based computational investing recommender system. RecSys 2013: 455-458 - 2012
- [c2]Ahmed Patel, Mona Taghavi, Kaveh Bakhtiyari, Joaquim Celestino Júnior:
Taxonomy and Proposed Architecture of Intrusion Detection and Prevention Systems for Cloud Computing. CSS 2012: 441-458 - [c1]Antoniel da Silva Rego, Joaquim Celestino Jr., André L. M. dos Santos, Eduardo Coelho Cerqueira, Ahmed Patel, Mona Taghavi:
BEE-C: A bio-inspired energy efficient cluster-based algorithm for data continuous dissemination in Wireless Sensor Networks. ICON 2012: 405-410
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint