YEAR |
TITLE |
2023 |
FrMi: Fault-revealing Mutant Identification using killability severity
T Rostami, S Jalili
Information and Software Technology 164, 107307
|
2023 |
Decentralized control architecture for multi-authoring microgrids
SHA Soltani, S Jalili, MKSE Eslami
Computing, 1-26
|
2023 |
Secured location-aware mobility-enabled RPL
E Arvan, MKH Dehkordi, S Jalili
Journal of Network and Computer Applications 209, 103516
|
2022 |
Lexical Diversity in the Speech of Chinese and Arab Persian Language Learners:
A Research Based on Guirads index
SA Jalili, RM Sahraee
Journal of Teaching Persian to Speakers of Other Languages
|
2022 |
LSPA-SGs: A lightweight and secure protocol for authentication and key agreement
based Elliptic Curve Cryptography in smart grids
SAM Taqi, S Jalili
Energy Reports 8, 153-164
|
2022 |
New Insight of Human Brain Connectivity Mapping based on Inter-correlation
of Multi-view fMRI Decoder
O Hourani, N Moghadam Charkari, S Jalili
TechRxiv
|
2022 |
Efficacy of Adding Magnesium Sulfate to Ropivacaine in Ultrasound-guided
Transversus Abdominis Plane Block on Analgesia After Open Appendectomy
S Jalili, A Farzaneh, M Ghaemi, N Motamed, F Gheiasi
Paramedical Sciences and Military Health 16 (3), 21-29
|
2021 |
An Ensemble Multiview learning method for visual object decoding from fMRI
brain data
O Hourani, N Moghadam Charkari, S Jalili
Signal and Data Processing 18 (3), 109-126
|
2021 |
Effect of Ultrasound-guided Transversus Abdominis Plane Block for Analgesia
after Laparoscopic Cholecystectomy
S Jalili, M Ghaemi, SF Gheiasi, M Deilami
Journal of Mazandaran University of Medical Sciences 31 (201), 142-149
|
2021 |
File Fragment Type Classification by Bag-Of-Visual-Words.
M Erfan, S Jalili
ISeCure 13 (2)
|
2021 |
Candidate disease gene prediction using One-Class classification
A Vasighi Zaker, S Jalili
Soft Computing Journal 4 (1), 74-83
|
2021 |
Improvement of Semantic Labeling Method by KBO for Automated Termination
Proof
M Kadkhoda, S Jalili, M Izadi
Soft Computing Journal 1 (2), 14-25
|
2021 |
Aspects extraction for aspect level opinion analysis based on deep CNN
AAM Pour, S Jalili
2021 26th International Computer Conference, Computer Society of Iran
(CSICC …
|
2021 |
Comparison of anesthesia results between Wide Awake Local Anesthesia no
Tourniquet (WALANT) and Forearm Tourniquet Bier Block in hand surgeries:
A randomized clinical trial
R Farzam, M Deilami, S Jalili, K Kamali
Archives of Bone and Joint Surgery 9 (1), 116
|
2020 |
DPCT: a dynamic method for detecting protein complexes from TAP-aware weighted
PPI network
A SabziNezhad, S Jalili
Frontiers in genetics 11, 567
|
2020 |
Effective defense against fingerprinting attack based on autocorrelation
property minimization approach
H Jahani, S Jalili
Journal of Intelligent Information Systems 54, 341-362
|
2020 |
Antioxidant activity of pericarp extract from different varieties of pomegranate
fruit
S Jalili, A Tabatabee Naini, M Ashrafi, M Aminlari
Journal of Agricultural Science and Technology 22 (1), 95-107
|
2019 |
Voxel selection framework based on meta‐heuristic search and mutual information
for brain decoding
O Hourani, NM Charkari, S Jalili
International Journal of Imaging Systems and Technology 29 (4), 663-676
|
2019 |
A Binary Particle Swarm Optimization Approach for Gene Expression Biclustering
Problem
B Taher, MH Fares, S Jalili
arXiv e-prints, arXiv: 1911.11223
|
2019 |
Efficient Distributed k-Clique Mining for Large Networks Using MapReduce
S Shahrivari, S Jalili
IEEE Transactions on Knowledge and Data Engineering 33 (3), 964-974
|
2019 |
On the computational power of the light: A plan for breaking data encryption
standard
JS Sartakhti, S Jalili
Theoretical Computer Science 773, 71-78
|
2019 |
Adaptive three-phase support vector data description
M Rahmanimanesh, JA Nasiri, S Jalili, N Moghaddam Charkari
Pattern Analysis and Applications 22, 491-504
|
2019 |
Comparison of effects of propofol and ketofol (Ketamine-Propofol mixture)
on emergence agitation in children undergoing tonsillectomy
S Jalili, A Esmaeeili, K Kamali, V Rashtchi
African Health Sciences 19 (1), 1736-1744
|
2019 |
Online tor privacy breach through website fingerprinting attack
H Jahani, S Jalili
Journal of Network and Systems Management 27, 289-326
|
2019 |
An algorithm based on theory of constraints and branch and bound for solving
integrated product-mix-outsourcing problem
E Mehdizadeh, S Jalili
Journal of Optimization in Industrial Engineering 12 (1), 167-172
|
2018 |
C-PUGP: A cluster-based positive unlabeled learning method for disease gene
prediction and prioritization
A Vasighizaker, S Jalili
Computational biology and chemistry 76, 23-31
|
2018 |
Multi-kernel one class link prediction in heterogeneous complex networks
H Shakibian, NM Charkari, S Jalili
Applied Intelligence 48, 3411-3428
|
2018 |
HM3alD: Polymorphic Malware Detection Using
Program Behavior-Aware Hidden Markov Model
A Tajoddin, S Jalili
Applied Sciences 8 (7), 1044
|
2018 |
The Relationship between Menstrual Cycle Phases with Postoperative Nausea
and Vomiting after Open Cholecystectomy Surgery
S Jalili, V Rashtchi
Preventive Care in Nursing & Midwifery Journal 8 (1), 49-54
|
2018 |
Disease genes prediction by HMM based PU-learning using gene expression
profiles
O Nikdelfaz, S Jalili
Journal of biomedical informatics 81, 102-111
|
2017 |
A Novel Measure for Semantic Similarity Computation of Gene Ontology Terms
Using Weighted Aggregation of Information Contents
A Lakizadeh, S Jalili
Hepatitis Monthly 19 (8)
|
2017 |
Fine granular proximity breach prevention during numerical data anonymization.
R Mortazavi, S Jalili
Trans. Data Priv. 10 (2), 117-144
|
2017 |
PbMMD: A novel policy based multi-process malware detection
SM Bidoki, S Jalili, A Tajoddin
Engineering Applications of Artificial Intelligence 60, 57-70
|
2017 |
TBM, a transformation based method for microaggregation of large volume
mixed data
M Salari, S Jalili, R Mortazavi
Data mining and knowledge discovery 31, 65-91
|
2016 |
A novel passive website fingerprinting attack on tor using fast fourier
transform
H Jahani, S Jalili
Computer Communications 96, 43-51
|
2016 |
A multilayered approach for link prediction in heterogeneous complex networks
H Shakibian, NM Charkari, S Jalili
Journal of Computational Science 17, 73-82
|
2016 |
Single-pass and linear-time k-means clustering based on MapReduce
S Shahrivari, S Jalili
Information Systems 60, 1-12
|
2016 |
BiCAMWI: a genetic-based biclustering algorithm for detecting dynamic protein
complexes
A Lakizadeh, S Jalili
PloS one 11 (7), e0159923
|
2016 |
Predicting metabolic syndrome using decision tree and support vector machine
methods
F Karimi-Alavijeh, S Jalili, M Sadeghi
ARYA atherosclerosis 12 (3), 146
|
2016 |
Enhancing aggregation phase of microaggregation methods for interval disclosure
risk minimization
R Mortazavi, S Jalili
Data mining and knowledge discovery 30, 605-639
|
2016 |
Ensemble link predictor for heterogeneous complex networks
H Shakibian, NM Charkari, S Jalili
International Journal of Information & Communication Technology Research
8 …
|
2016 |
Towards modeling and runtime verification of self-organizing systems
B Abolhasanzadeh, S Jalili
Expert Systems with Applications 44, 230-244
|
2016 |
ANATOMICAL CHARACTERISTICS OF THE LEAVES AND STEMS OF 9 SPECIES OF THE GENUS
LONICERA FROM CAPRIFOLIACEAE FAMILY IN IRAN
S JALILI, SMM HAMDI, AZ ORAGHI
JOURNAL OF PLANT RESEARCH (IRANIAN JOURNAL OF BIOLOGY) 29 (4), 740-754
|
2015 |
Automated software design using ant colony optimization with semantic network
support
V Tawosi, S Jalili, SMH Hasheminejad
Journal of Systems and Software 109, 1-17
|
2015 |
Distributed discovery of frequent subgraphs of a network using MapReduce
S Shahrivari, S Jalili
Computing 97, 1101-1120
|
2015 |
CAMWI: Detecting protein complexes using weighted clustering coefficient
and weighted density
S Jalili, SA Marashi
Computational biology and chemistry 58, 231-240
|
2015 |
Preference-based anonymization of numerical datasets by multi-objective
microaggregation
R Mortazavi, S Jalili
Information Fusion 25, 85-104
|
2015 |
Computation with optical sensitive sheets
S Goliaei, S Jalili
Natural Computing 14, 437-450
|
2015 |
PCD-GED: Protein complex detection considering PPI dynamics based on time
series gene expression data
A Lakizadeh, S Jalili, SA Marashi
Journal of theoretical biology 378, 31-38
|
2015 |
Image preprocessing with a parallel optoelectronic processor
AG Rudi, S Jalili
Computers & Electrical Engineering 46, 554-565
|
2015 |
VR-BFDT: A variance reduction based binary fuzzy decision tree induction
method for protein function prediction
F Golzari, S Jalili
Journal of Theoretical Biology 377, 10-24
|
2015 |
To identify and explain the effective factors on tax compliance (A Case
Study of State Tax Administration of West Tehran)
M Marandi, S Jalili, Z Houshmand
Journal of Management and Accounting Studies 3 (03), 128-137
|
2015 |
High-performance parallel frequent subgraph discovery
S Shahrivari, S Jalili
The Journal of Supercomputing 71, 2412-2432
|
2015 |
In vitro differentiation of human skin-derived precursors cells into insulin
producing cells by glucose and rat pancreatic extract
M Mehrabi, S Hosseinkhani, C Jalili, A Mostafaie
Cellular and Molecular Research (Iranian Journal of Biology) 28 (1),
124-135
|
2015 |
Least squares twin multi-class classification support vector machine
JA Nasiri, NM Charkari, S Jalili
Pattern Recognition 48 (3), 984-992
|
2015 |
ISeCure
R Mortazavi, S Jalili
|
2015 |
ANOVEL LOCAL SEARCH METHOD FOR MICROAGGREGATION
R Mortazavi, S Jalili
THE ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY 7 (1), 0-0
|
2015 |
Routing anomaly detection in OLSR-based MANETs
H Gohargazi, S Jalili, M Rahmanimanesh
International Journal of Mobile Communications 13 (3), 276-298
|
2015 |
Fast parallel all-subgraph enumeration using multicore machines
S Shahrivari, S Jalili
Scientific Programming 2015, 6-6
|
2015 |
Source code and design conformance, design pattern detection from source
code by classification approach
A Chihada, S Jalili, SMH Hasheminejad, MH Zangooei
Applied Soft Computing 26, 357-367
|
2015 |
A 2-dimensional optical architecture for solving Hamiltonian path problem
based on micro ring resonators
N Shakeri, S Jalili, V Ahmadi, AR Zali, S Goliaei
Optics & Laser Technology 65, 56-65
|
2015 |
CCIC: Clustering analysis classes to identify software components
SMH Hasheminejad, S Jalili
Information and Software Technology 57, 329-351
|
2014 |
An evolutionary approach to identify logical components
SMH Hasheminejad, S Jalili
Journal of Systems and Software 96, 24-50
|
2014 |
Automatic test path generation from sequence diagram using genetic algorithm
B Hoseini, S Jalili
7th International Symposium on Telecommunications (IST2014), 106-111
|
2014 |
A utility preserving data-oriented anonymization method based on data ordering
M Salari, S Jalili, R Mortazavi
7th International Symposium on Telecommunications (IST2014), 966-971
|
2014 |
Iterative constraint satisfaction method for microaggregation problem
R Mortazavi, S Jalili
2014 11th International ISC Conference on Information Security and …
|
2014 |
Fast data-oriented microaggregation algorithm for large numerical datasets
R Mortazavi, S Jalili
Knowledge-Based Systems 67, 195-205
|
2014 |
A clustering-based model for class responsibility assignment problem in
object-oriented analysis
H Masoud, S Jalili
Journal of Systems and Software 93, 110-131
|
2014 |
The generalized total graph of modules respect to proper submodules over
commutative rings.
NK Tohidi, F Esmaeili Khalil Saraei, SA Jalili
Journal of Algebra and Related Topics 2 (1), 27-42
|
2014 |
The effect of translation strategy on lexical and grammatical errors of
Chinese language learners writing Persian texts
SI Akbar Jalil, SM Abtahi, M Khodadadian
Journal of Teaching Persian to Speakers of Other Languages 3 (TOME 6),
137-161
|
2014 |
The relationship between earnings quality and corporate social responsibility
listed in the Tehran Stock Exchange
S Jalili, F Kaiser
Knowledge Audit, 147-170
|
2013 |
Multivariate microaggregation by iterative optimization
R Mortazavi, S Jalili, H Gohargazi
Applied intelligence 39, 529-544
|
2013 |
A parallel optical implementation of arithmetic operations
AG Rudi, S Jalili
Optics & Laser Technology 49, 173-182
|
2013 |
Pose dune sonde nasogastrique a Iaide dun catheter de Nelaton par rapport
a la technique classique: essai clinique randomise
M Ghaemi, N Mousavinasab, S Jalili
Eastern Mediterranean Health Journal 2013 (19), 1L-1L
|
2013 |
Dynamic clustering using combinatorial particle swarm optimization
H Masoud, S Jalili, SMH Hasheminejad
Applied intelligence 38, 289-314
|
2013 |
Nelaton catheter assisted versus standard nasogastric tube insertion: a
randomized, clinical trial/Insertion dun tube nasogastrique à laide dune
sonde Nélaton par rapport à …
M Ghaemi, N Mousavinasab, S Jalili
Eastern Mediterranean Health Journal 19 (3), S194
|
2013 |
Fuzzy Voting for Anomaly Detection in Cluster-Based Mobile Ad Hoc Networks
M Rahmanimanesh, S Jalili
Nashriyyah-i Muhandisi-i Barq va Muhandisi-i Kampyutar-i Iran 32 (4),
86
|
2013 |
Nelaton catheter assisted versus standard nasogastric tube insertion: a
randomized, clinical trial/Pose dune sonde nasogastrique à laide dun
cathéter de Nélaton par rapport …
M Ghaemi, N Mousavinasab, S Jalili
Eastern Mediterranean Health Journal 19 (2), 1
|
2013 |
A new light-based solution to the Hamiltonian path problem
JS Sartakhti, S Jalili, AG Rudi
Future Generation Computer Systems 29 (2), 520-527
|
2013 |
An Optical Wavelength-Based Computational Machine.
S Goliaei, S Jalili
International Journal of Unconventional Computing 9
|
2013 |
An optical polynomial time solution for the satisfiability problem
S Goliaei, S Jalili
Optical Supercomputing: 4th International Workshop, OSC 2012, in Memory
of H …
|
2013 |
SCI-GA: Software Component Identification using Genetic Algorithm.
SMH Hasheminejad, S Jalili
J. Object Technol. 12 (2), 3:1-34
|
2013 |
Protein fold recognition with a two-layer method based on SVM-SA, WP-NN
and C4. 5 (TLM-SNC)
MH Zangooei, S Jalili
International Journal of Data Mining and Bioinformatics 8 (2), 203-223
|
2013 |
Fusion of one–class classifiers for protocol–based anomaly detection in
AODV–based mobile ad hoc networks
M Rahmanimanesh, S Jalili, AR Sharafat
International Journal of Ad Hoc and Ubiquitous Computing 14 (3), 158-171
|
2013 |
Adaptive ordered weighted averaging for anomaly detection in cluster-based
mobile ad hoc networks
M Rahmanimanesh, S Jalili
IRANIAN JOURNAL OF FUZZY SYSTEMS 10 (2), 83-109
|
2012 |
RANGI: a fast list-colored graph motif finding algorithm
AG Rudi, S Shahrivari, S Jalili, ZRM Kashani
IEEE/ACM Transactions on Computational Biology and Bioinformatics 10
(2 …
|
2012 |
HPobSAM for modeling and analyzing IT Ecosystems–Through a case study
N Khakpour, S Jalili, M Sirjani, U Goltz, B Abolhasanzadeh
Journal of Systems and Software 85 (12), 2770-2784
|
2012 |
Anomaly detection based on an enhanced projection distance
SA Jouibari, S Jalili, M Rahmanimanesh
6th International Symposium on Telecommunications (IST), 965-970
|
2012 |
VoIP anomaly detection by combining OCSVM and PSO algorithm
MS Miandare, S Jalili
6th International Symposium on Telecommunications (IST), 1038-1043
|
2012 |
An optical solution to the 3-SAT problem using wavelength based selectors
S Goliaei, S Jalili
The Journal of Supercomputing 62, 663-672
|
2012 |
Formal modeling of evolving self-adaptive systems
N Khakpour, S Jalili, C Talcott, M Sirjani, M Mousavi
Science of Computer Programming 78 (1), 3-26
|
2012 |
Light-based solution for the dominating set problem
S Goliaei, S Jalili, J Salimi
Applied optics 51 (29), 6979-6983
|
2012 |
Protein secondary structure prediction using DWKF based on SVR-NSGAII
MH Zangooei, S Jalili
Neurocomputing 94, 87-101
|
2012 |
The Principles of Preparing Persian Language Proficiency Test (PLPT)/(AMFA)
RM Sahraei, SA Jalili
Journal of Teaching Persian to Speakers of Other Languages 1 (1), 123-150
|
2012 |
Predicting job wait time in grid environment by applying machine learning
methods on historical information
S Kianpisheh, S Jalili, NM Charkari
International Journal of Grid and Distributed Computing 5 (3), 11-22
|
2012 |
WSCMon: runtime monitoring of web service orchestration based on refinement
checking
M Khaxar, S Jalili
Service Oriented Computing and Applications 6 (1), 33-49
|
2012 |
PSSP with dynamic weighted kernel fusion based on SVM-PHGS
MH Zangooei, S Jalili
Knowledge-Based Systems 27, 424-442
|
2012 |
Design patterns selection: An automatic two-phase method
SMH Hasheminejad, S Jalili
Journal of Systems and Software 85 (2), 408-424
|
2012 |
The study of the ability of financial and profitability value index in explanation
of Firms stock return in Tehran stock exchange
S JALILI, NAA NONAHAL, N KHALEGHI
FINANCIAL KNOWLEDGE OF SECURITY ANALYSIS (FINANCIAL STUDIES) 5 (14),
77-94
|
2012 |
An Optical Polynomial Time Solution for the Satisfiability Problem.
S Goliaei, S Jalili
OSC, 15-24
|
2011 |
Action recognition by local space-time features and least square twin SVM
(LS-TSVM)
K Mozafari, JA Nasiri, NM Charkari, S Jalili
2011 first international conference on informatics and computational
…
|
2011 |
Hierarchical least square twin support vector machines based framework for
human action recognition
K Mozafari, JA Nasiri, NM Charkari, S Jalili
2011 7th Iranian Conference on Machine Vision and Image Processing,
1-5
|
2011 |
Comparison of intratracheal and intravenous lidocaine effects on bucking,
cough, and emergence time at the end of anesthesia
MB Khezri, S Jalili, S Asefzadeh, H Kayalha
|
2011 |
A hybrid model for correlating alerts of known and unknown attack scenarios
and updating attack graphs
SH Ahmadinejad, S Jalili, M Abadi
Computer Networks 55 (9), 2221-2240
|
2011 |
A Memetic Particle Swarm Optimization Algorithm for Network Vulnerability
Analysis
M Abadi, S Jalili
Evolutionary Algorithms
|
2011 |
Comparison of intratracheal and intravenous lidocaines effect on airways
responses during extubation
MB Khezri, S Jalili, S Asefzade, H Kayalha
Journal of Birjand University of Medical Sciences 18 (02)
|
2011 |
Assuring the Correctness of Large-scale Adaptive Systems
N Khakpour, S Jalili, M Sirjani
TU Braunschweig
|
2011 |
Optical graph 3-colorability
S Goliaei, S Jalili
Optical Supercomputing: Third International Workshop, OSC 2010, Bertinoro
…
|
2010 |
Identification of System Software Components Using Clustering Approach.
G Shahmohammadi, S Jalili, SMH Hasheminejad
J. Object Technol. 9 (6), 77-98
|
2010 |
PobSAM: policy-based managing of actors in self-adaptive systems
N Khakpour, S Jalili, C Talcott, M Sirjani, MR Mousavi
Electronic Notes in Theoretical Computer Science 263, 129-143
|
2010 |
Formal analysis of policy-based self-adaptive systems
N Khakpour, R Khosravi, M Sirjani, S Jalili
Proceedings of the 2010 ACM Symposium on Applied Computing, 2536-2543
|
2010 |
Synthesizing a specification-based monitor for safety requirements
SM Babamir, S Jalili
IRANIAN JOURNAL OF SCIENCE AND TECHNOLOGY TRANSACTION B-ENGINEERING
34 (3 …
|
2010 |
A Particle Swarm Optimization Algorithm for Minimization Analysis of Cost-Sensitive
Attack Graphs.
M Abadi, S Jalili
ISeCure 2 (1)
|
2010 |
Making real-time systems fault tolerant: a specification-based approach
SM Babamir, S Jalili
CSIR
|
2009 |
Selecting proper security patterns using text classification
SMH Hasheminejad, S Jalili
2009 International Conference on Computational Intelligence and Software
…
|
2009 |
Alert correlation using correlation probability estimation and time windows
SH Ahmadinejad, S Jalili
2009 International Conference on Computer Technology and Development
2, 170-175
|
2009 |
A Quantitative Evaluation of Maintainability of Software Architecture Styles
GR Shahmohammadii, S Jalili
AUT Journal of Electrical Engineering 41 (2), 29-38
|
2009 |
VERIFICATION OF DISTRIBUTED FIREWALLS CONFIGURATION VS. SECURITY POLICIES
USING ℒ ℐ ()
N Khakpour, S Jalili
Applied Artificial Intelligence 23 (10), 945-975
|
2009 |
Using supervised and transductive learning techniques to extract network
attack scenarios
N Khakpour, S Jalili
2009 14th International CSI Computer Conference, 71-76
|
2009 |
Monitoring safety properties of composite web services at runtime using
CSP
M Khaxar, S Jalili, N Khakpour, MS Jokhio
2009 13th Enterprise Distributed Object Computing Conference Workshops,
107-113
|
2009 |
A non-parametric pixel-based background modeling for dynamic scenes
N Armanfard, M Komeili, M Valizade, E Kabir, S Jalili
2009 International Conference on Advances in Computational Tools for
…
|
2009 |
A novel quantum-inspired evolutionary algorithm for solving combinatorial
optimization problems
P Mahdabi, M Abadi, S Jalili
Proceedings of the 11th Annual conference on Genetic and evolutionary
…
|
2009 |
Formal Analysis of Smart Home Policies using Compositional Verification.
N Khakpour, M Sirjani, S Jalili
ICFI 9, 220-233
|
2009 |
AUTOMATIC GENERATION OF NOVEL INTRUSION SIGNATURES USING ONE-CLASS CLASSIFIERS
AND INDUCTIVE LEARNING METHODS
M ABADI, S JALILI
JOURNAL OF FACULTY OF ENGINEERING (UNIVERSITY OF TEHRAN) 42 (7117),
823-829
|
2009 |
Correlating alerts into compressed graphs using an attribute-based method
and time windows
SH Ahmadinejad, S Jalili
Security Technology: International Conference, SecTech 2009, Held as
Part of …
|
2009 |
An optical wavelength-based solution to the 3-SAT problem
S Goliaei, S Jalili
Optical SuperComputing: Second International Workshop, OSC 2009, Bertinoro
…
|
2008 |
A multi-start quantum-inspired evolutionary algorithm for solving combinatorial
optimization problems
P Mahdabi, S Jalili, M Abadi
Proceedings of the 10th annual conference on Genetic and evolutionary
…
|
2008 |
Automatic Testing of Object Oriented Software With use case scenarios and
UML specification
S Jalili, A Karbalaei
Journal of Iranian Association of Electrical and Electronics Engineers
5 (1 …
|
2008 |
ANALYZING WEIGHTED ATTACK GRAPHS USING GENETIC ALGORITHMS
M AABADI, S JALILI
NASHRIYYAH-I MUHANDESI-I BARQ VA MUHANDESI-I KAMPYUTAR-I IRAN (PERSIAN)
5 (4 …
|
2008 |
QUANTITATIVE EVALUATION OF ARCHITECTURAL STYLES FROM THE RELIABILITY VIEWPOINT
IN SAFETY CRITICAL SOFTWARE
G SHAHMOHAMMADI, S JALILI
THE CSI JOURNAL ON COMPUTER SCIENCE AND ENGINEERING 6 (3), 68-81
|
2008 |
Using binary particle swarm optimization for minimization analysis of large-scale
network attack graphs
M AABADI, S Jalili
Scientia Iranica 15 (6), 605-619
|
2007 |
Analyzing Weighted Attack Graphs Using Genetic Algorithms
M Abadi, S Jalili
Nashriyyah-i Muhandisi-i Barq va Muhandisi-i Kampyutar-i Iran 12 (4),
189
|
2007 |
Rverl: Run-time verification of real-time and reactive programs using event-based
real-time logic approach
S Jalili, M MirzaAghaei
5th ACIS International Conference on Software Engineering Research …
|
2007 |
EBV, AN APPROACH TO AUTOMATIC CONSTRUCTING
OF RUN-TIME VERIFIER OF THE SAFETY-CRITICAL
SOFTWARE
SM Babamiri, S Jalili
Sharif Journal of Industrial Engineering & Management 23 (38), 81-101
|
2007 |
EBV, AN APPROACH TO AUTOMATIC CONSTRUCTING OF RUN-TIME VERIFIER OF THE SAFETY-CRITICAL
SOFTWARE
SM Babamiri, S Jalili
Sharif Journal of Civil Engineering 23 (38), 81-101
|
2007 |
A Formal Approach for Analysis of Distributed Firewalls Congurations
N Khakpour, S Jalili
ICSC
|
2006 |
INDUCTIVE LEARNING OF THE OPERATIONAL LOGIC OF A PROGRAM FROM ITS MANY CORRECT
EXECUTIONS AND APPLYING IT TO RUNTIME VERIFICATION OF THE PROGRAM EXECUTION
S JALILI, H BOLAND GHAMAT AZAR
The Modares Journal of Electrical Engineering 6 (1), 11-30
|
2006 |
An ant colony optimization algorithm for network vulnerability analysis
M Abadi, S Jalili
Iran. J. Electr. Electron. Eng 2 (3), 106-120
|
2006 |
Verication of Service Access Control Policies: A Description Logic Approach
S Jalili, N Khakpour
ICSC
|
2006 |
INCREASING PERFORMANCE OF TEXT CLASSIFICATION BASED ON IMPROVING FEATURE
SELECTION
S JALILI, M BITARAFAN
JOURNAL OF FACULTY OF ENGINEERING (UNIVERSITY OF TEHRAN) 40 (397), 313-328
|
2006 |
A logical based approach to detection of intrusions against programs
SM Babamir, S Jalili
2nd International Conference on Global E-Security, 72-79
|
2005 |
AECM: an aspect enabled component model
S Jalili, SMKO Abadi
12th Asia-Pacific Software Engineering Conference (APSEC05), 6 pp.
|
2005 |
Comparison of mirtazapine and fluoxetine in the treatment of major depressive
disorder: a double‐blind, randomized trial
H Amini, S Aghayan, SA Jalili, S Akhondzadeh, O Yahyazadeh, ...
Journal of clinical pharmacy and therapeutics 30 (2), 133-138
|
2005 |
ANALYZING THE INTRUDER ROLE IN CRYPTOGRAPHIC PROTOCOLS
LB TORK, S JALILI
JOURNAL OF FACULTY OF ENGINEERING (UNIVERSITY OF TABRIZ) 32 (340), 1-14
|
2004 |
Screening for vesicoureteral reflux and renal scars in siblings of children
with known reflux
N Ataei, A Madani, ST Esfahani, A Kejbafzadeh, O Ghaderi, S Jalili,
...
Pediatric Nephrology 19, 1127-1131
|
2003 |
A MODEL FOR SPECIFICATION OF CRYPTOGRAPHIC PROTOCOLS AND ITS OPERATIONAL
INTERPRETATION WITH ALGEBRAIC METHODS
S Jalili, B TORK LADANI
The Modares Journal of Electrical Engineering 3 (1), 11-29
|
|
pg-Continuous frames in Banach Space
SA Jalili, JS Moghaddam, NKH Tohidi
Journal of Advances in Mathematics 12 (1)
|
|
Analyzing the Intruder Role in Cryptographic Protocols
BT Ladani, S Jalili
|
|
INTERNATIONAL JOURNAL OF COMPUTERS AND THEIR APPLICATIONS
K Alghathbar, D Wijesekera, Y Ganjisaffar, H Abolhassani, M Abadi, ...
|
|
A light-based solution to the Subset-sum problem
AM Mourkani, S Jalili, M Mohabbati
|