BibTeX records: Mojtaba Vahidi-Asl

download as .bib file

@article{DBLP:journals/ijsg/RezaeiZadehMV23,
  author       = {Morteza RezaeiZadeh and
                  Raazieh Mohagheghiaan and
                  Mojtaba Vahidi{-}Asl},
  title        = {Critical meta-analysis of problem-solving serious games: Clear signs
                  of pedagogists' disengagement and over-optimistic expectations},
  journal      = {Int. J. Serious Games},
  volume       = {10},
  number       = {2},
  pages        = {85--113},
  year         = {2023},
  url          = {https://doi.org/10.17083/ijsg.v10i2.563},
  doi          = {10.17083/IJSG.V10I2.563},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsg/RezaeiZadehMV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/simpra/KhazaelVM23,
  author       = {Behnam Khazael and
                  Mojtaba Vahidi{-}Asl and
                  Hadi Tabatabaee Malazi},
  title        = {Geospatial complex event processing in smart city applications},
  journal      = {Simul. Model. Pract. Theory},
  volume       = {122},
  pages        = {102675},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.simpat.2022.102675},
  doi          = {10.1016/J.SIMPAT.2022.102675},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/simpra/KhazaelVM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/apin/MajdVKB22,
  author       = {Amirabbas Majd and
                  Mojtaba Vahidi{-}Asl and
                  Alireza Khalilian and
                  Babak Bagheri},
  title        = {ConsilientSFL: using preferential voting system to generate combinatorial
                  ranking metrics for spectrum-based fault localization},
  journal      = {Appl. Intell.},
  volume       = {52},
  number       = {10},
  pages        = {11068--11088},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10489-021-02954-7},
  doi          = {10.1007/S10489-021-02954-7},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/apin/MajdVKB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/ValueianVK22,
  author       = {Meysam Valueian and
                  Mojtaba Vahidi{-}Asl and
                  Alireza Khalilian},
  title        = {SituRepair: Incorporating machine-learning fault class prediction
                  to inform situational multiple fault automatic program repair},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {37},
  pages        = {100527},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ijcip.2022.100527},
  doi          = {10.1016/J.IJCIP.2022.100527},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/ValueianVK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/AliabadiSVG21,
  author       = {Maryam Raiyat Aliabadi and
                  Margo I. Seltzer and
                  Mojtaba Vahidi{-}Asl and
                  Ramak Ghavamizadeh},
  title        = {ARTINALI{\#}: An Efficient Intrusion Detection Technique for Resource-Constrained
                  Cyber-Physical Systems},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {33},
  pages        = {100430},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ijcip.2021.100430},
  doi          = {10.1016/J.IJCIP.2021.100430},
  timestamp    = {Thu, 20 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcip/AliabadiSVG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/infsof/NosratiHV21,
  author       = {Mohammad Nosrati and
                  Hassan Haghighi and
                  Mojtaba Vahidi{-}Asl},
  title        = {Test data generation using genetic programming},
  journal      = {Inf. Softw. Technol.},
  volume       = {130},
  pages        = {106446},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.infsof.2020.106446},
  doi          = {10.1016/J.INFSOF.2020.106446},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/infsof/NosratiHV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/AliabadiVG21,
  author       = {Maryam Raiyat Aliabadi and
                  Mojtaba Vahidi{-}Asl and
                  Ramak Ghavamizadeh},
  title        = {{ARTINALI++:} Multi-dimensional Specification Mining for Complex Cyber-Physical
                  System Security},
  journal      = {J. Syst. Softw.},
  volume       = {180},
  pages        = {111016},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jss.2021.111016},
  doi          = {10.1016/J.JSS.2021.111016},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jss/AliabadiVG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/MajdVKPH20,
  author       = {Amirabbas Majd and
                  Mojtaba Vahidi{-}Asl and
                  Alireza Khalilian and
                  Pooria Poorsarvi{-}Tehrani and
                  Hassan Haghighi},
  title        = {SLDeep: Statement-level software defect prediction using deep-learning
                  model on static code features},
  journal      = {Expert Syst. Appl.},
  volume       = {147},
  pages        = {113156},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.eswa.2019.113156},
  doi          = {10.1016/J.ESWA.2019.113156},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eswa/MajdVKPH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/NosratiHV20,
  author       = {Mohammad Nosrati and
                  Hassan Haghighi and
                  Mojtaba Vahidi{-}Asl},
  title        = {Using likely invariants for test data generation},
  journal      = {J. Syst. Softw.},
  volume       = {164},
  pages        = {110549},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jss.2020.110549},
  doi          = {10.1016/J.JSS.2020.110549},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jss/NosratiHV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jetai/KhalilianMVH19,
  author       = {Alireza Khalilian and
                  Alireza Mirzaeiyan and
                  Mojtaba Vahidi{-}Asl and
                  Hassan Haghighi},
  title        = {Experiments with automatic software piracy detection utilising machine-learning
                  classifiers for micro-signatures},
  journal      = {J. Exp. Theor. Artif. Intell.},
  volume       = {31},
  number       = {2},
  pages        = {267--289},
  year         = {2019},
  url          = {https://doi.org/10.1080/0952813X.2018.1546769},
  doi          = {10.1080/0952813X.2018.1546769},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jetai/KhalilianMVH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vlc/MajdVKBZ19,
  author       = {Amirabbas Majd and
                  Mojtaba Vahidi{-}Asl and
                  Alireza Khalilian and
                  Ahmad Baraani{-}Dastjerdi and
                  Bahman Zamani},
  title        = {Code4Bench: {A} multidimensional benchmark of Codeforces data for
                  different program analysis techniques},
  journal      = {J. Comput. Lang.},
  volume       = {53},
  pages        = {38--52},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.cola.2019.03.006},
  doi          = {10.1016/J.COLA.2019.03.006},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/vlc/MajdVKBZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fsen/MoosaviHSVV19,
  author       = {Sharmin Moosavi and
                  Hassan Haghighi and
                  Hasti Sahabi and
                  Farzam Vatanzade and
                  Mojtaba Vahidi{-}Asl},
  editor       = {Hossein Hojjat and
                  Mieke Massink},
  title        = {Greenify: {A} Game with the Purpose of Test Data Generation for Unit
                  Testing},
  booktitle    = {Fundamentals of Software Engineering - 8th International Conference,
                  {FSEN} 2019, Tehran, Iran, May 1-3, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11761},
  pages        = {77--92},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31517-7\_6},
  doi          = {10.1007/978-3-030-31517-7\_6},
  timestamp    = {Tue, 24 Sep 2019 16:23:52 +0200},
  biburl       = {https://dblp.org/rec/conf/fsen/MoosaviHSVV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fsen/BagheriRV19,
  author       = {Babak Bagheri and
                  Mohammad Rezaalipour and
                  Mojtaba Vahidi{-}Asl},
  editor       = {Hossein Hojjat and
                  Mieke Massink},
  title        = {An Approach to Generate Effective Fault Localization Methods for Programs},
  booktitle    = {Fundamentals of Software Engineering - 8th International Conference,
                  {FSEN} 2019, Tehran, Iran, May 1-3, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11761},
  pages        = {244--259},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31517-7\_17},
  doi          = {10.1007/978-3-030-31517-7\_17},
  timestamp    = {Tue, 24 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fsen/BagheriRV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/KhalilianNVH18,
  author       = {Alireza Khalilian and
                  Amir Nourazar and
                  Mojtaba Vahidi{-}Asl and
                  Hassan Haghighi},
  title        = {{G3MD:} Mining frequent opcode sub-graphs for metamorphic malware
                  detection of existing families},
  journal      = {Expert Syst. Appl.},
  volume       = {112},
  pages        = {15--33},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.eswa.2018.06.012},
  doi          = {10.1016/J.ESWA.2018.06.012},
  timestamp    = {Sat, 19 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eswa/KhalilianNVH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iwc/Amiri-ChimehHVS18,
  author       = {Saeed Amiri{-}Chimeh and
                  Hassan Haghighi and
                  Mojtaba Vahidi{-}Asl and
                  Kamyar Setayesh{-}Ghajar and
                  Farshad Gholami{-}Ghavamabad},
  title        = {Rings: {A} Game with a Purpose for Test Data Generation},
  journal      = {Interact. Comput.},
  volume       = {30},
  number       = {1},
  pages        = {1--30},
  year         = {2018},
  url          = {https://doi.org/10.1093/iwc/iww043},
  doi          = {10.1093/IWC/IWW043},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iwc/Amiri-ChimehHVS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/ZamanifarNV18,
  author       = {Azadeh Zamanifar and
                  Eslam Nazemi and
                  Mojtaba Vahidi{-}Asl},
  title        = {A Mobility Solution for Hazardous Areas Based on 6LoWPAN},
  journal      = {Mob. Networks Appl.},
  volume       = {23},
  number       = {6},
  pages        = {1539--1554},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11036-017-0918-6},
  doi          = {10.1007/S11036-017-0918-6},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/monet/ZamanifarNV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/apin/ZamanifarNV17,
  author       = {Azadeh Zamanifar and
                  Eslam Nazemi and
                  Mojtaba Vahidi{-}Asl},
  title        = {{DSHMP-IOT:} {A} distributed self healing movement prediction scheme
                  for internet of things applications},
  journal      = {Appl. Intell.},
  volume       = {46},
  number       = {3},
  pages        = {569--589},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10489-016-0849-0},
  doi          = {10.1007/S10489-016-0849-0},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/apin/ZamanifarNV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/ZamanifarNV17,
  author       = {Azadeh Zamanifar and
                  Eslam Nazemi and
                  Mojtaba Vahidi{-}Asl},
  title        = {{DMP-IOT:} {A} distributed movement prediction scheme for {IOT} health-care
                  applications},
  journal      = {Comput. Electr. Eng.},
  volume       = {58},
  pages        = {310--326},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.compeleceng.2016.09.015},
  doi          = {10.1016/J.COMPELECENG.2016.09.015},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cee/ZamanifarNV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cai/ParsaVZ15,
  author       = {Saeed Parsa and
                  Mojtaba Vahidi{-}Asl and
                  Farzaneh Zareie},
  title        = {Statistical Based Slicing Method for Prioritizing Program Fault Relevant
                  Statements},
  journal      = {Comput. Informatics},
  volume       = {34},
  number       = {4},
  pages        = {823--857},
  year         = {2015},
  url          = {http://www.cai.sk/ojs/index.php/cai/article/view/1284},
  timestamp    = {Mon, 14 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cai/ParsaVZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sqj/ParsaVA14,
  author       = {Saeed Parsa and
                  Mojtaba Vahidi{-}Asl and
                  Maryam Asadi{-}Aghbolaghi},
  title        = {Hierarchy-Debug: a scalable statistical technique for fault localization},
  journal      = {Softw. Qual. J.},
  volume       = {22},
  number       = {3},
  pages        = {427--466},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11219-013-9199-x},
  doi          = {10.1007/S11219-013-9199-X},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sqj/ParsaVA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aici/ParsaPTV11,
  author       = {Saeed Parsa and
                  Hamid Rafati PorShokooh and
                  Saman Teymouri and
                  Mojtaba Vahidi{-}Asl},
  editor       = {Hepu Deng and
                  Duoqian Miao and
                  Jingsheng Lei and
                  Fu Lee Wang},
  title        = {A Heuristic Test Data Generation Approach for Program Fault Localization},
  booktitle    = {Artificial Intelligence and Computational Intelligence - Third International
                  Conference, {AICI} 2011, Taiyuan, China, September 24-25, 2011, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7002},
  pages        = {236--243},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23881-9\_30},
  doi          = {10.1007/978-3-642-23881-9\_30},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/aici/ParsaPTV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aici/ParsaAV11,
  author       = {Saeed Parsa and
                  Maryam Asadi{-}Aghbolaghi and
                  Mojtaba Vahidi{-}Asl},
  editor       = {Hepu Deng and
                  Duoqian Miao and
                  Jingsheng Lei and
                  Fu Lee Wang},
  title        = {Statistical Debugging Using a Hierarchical Model of Correlated Predicates},
  booktitle    = {Artificial Intelligence and Computational Intelligence - Third International
                  Conference, {AICI} 2011, Taiyuan, China, September 24-25, 2011, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7002},
  pages        = {251--256},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23881-9\_32},
  doi          = {10.1007/978-3-642-23881-9\_32},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/aici/ParsaAV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccece/MousavianVP11,
  author       = {Zaynab Mousavian and
                  Mojtaba Vahidi{-}Asl and
                  Saeed Parsa},
  title        = {Finding software fault relevant subgraphs a new graph mining approach
                  for software debugging},
  booktitle    = {Proceedings of the 24th Canadian Conference on Electrical and Computer
                  Engineering, {CCECE} 2011, Niagara Falls, Ontario, Canada, 8-11 May,
                  2011},
  pages        = {908--911},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/CCECE.2011.6030590},
  doi          = {10.1109/CCECE.2011.6030590},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccece/MousavianVP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/MousavianVP11,
  author       = {Zaynab Mousavian and
                  Mojtaba Vahidi{-}Asl and
                  Saeed Parsa},
  editor       = {Antonia Bertolino and
                  Howard Foster and
                  J. Jenny Li},
  title        = {Scalable graph analyzing approach for software fault-localization},
  booktitle    = {Proceedings of the 6th International Workshop on Automation of Software
                  Test, {AST} 2011, Waikiki, Honolulu, HI, USA, May 23-24, 2011},
  pages        = {15--21},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1982595.1982599},
  doi          = {10.1145/1982595.1982599},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/MousavianVP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wea/ParsaZV11,
  author       = {Saeed Parsa and
                  Farzaneh Zareie and
                  Mojtaba Vahidi{-}Asl},
  editor       = {Panos M. Pardalos and
                  Steffen Rebennack},
  title        = {Fuzzy Clustering the Backward Dynamic Slices of Programs to Identify
                  the Origins of Failure},
  booktitle    = {Experimental Algorithms - 10th International Symposium, {SEA} 2011,
                  Kolimpari, Chania, Crete, Greece, May 5-7, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6630},
  pages        = {352--363},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20662-7\_30},
  doi          = {10.1007/978-3-642-20662-7\_30},
  timestamp    = {Mon, 05 Feb 2024 20:31:36 +0100},
  biburl       = {https://dblp.org/rec/conf/wea/ParsaZV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/baip/ParsaNEV10,
  author       = {Saeed Parsa and
                  Somaye Arabi Naree and
                  Neda Ebrahimi and
                  Mojtaba Vahidi{-}Asl},
  editor       = {Vinu V. Das and
                  R. Vijayakumar and
                  Narayan C. Debnath and
                  Janahanlal Stephen and
                  Natarajan Meghanathan and
                  Suresh Sankaranarayanan and
                  P. M. Thankachan and
                  Ford Lumban Gaol and
                  Nessy Thankachan},
  title        = {Finding Discriminative Weighted Sub-graphs to Identify Software Bugs},
  booktitle    = {Information Processing and Management - International Conference on
                  Recent Trends in Business Administration and Information Processing,
                  {BAIP} 2010, Trivandrum, Kerala, India, March 26-27, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {70},
  pages        = {305--309},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12214-9\_49},
  doi          = {10.1007/978-3-642-12214-9\_49},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/baip/ParsaNEV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icica/ParsaPV10,
  author       = {Saeed Parsa and
                  Azam Peyvandi{-}Pour and
                  Mojtaba Vahidi{-}Asl},
  editor       = {Rongbo Zhu and
                  Yanchun Zhang and
                  Baoxiang Liu and
                  Chunfeng Liu},
  title        = {Introducing a New Predicate Network Model Constructed Based on Null
                  Hypothesis Testing for Software Fault Localization},
  booktitle    = {Information Computing and Applications - First International Conference,
                  {ICICA} 2010, Tangshan, China, October 15-18, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6377},
  pages        = {197--204},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16167-4\_26},
  doi          = {10.1007/978-3-642-16167-4\_26},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icica/ParsaPV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/ParsaVNM09,
  author       = {Saeed Parsa and
                  Mojtaba Vahidi{-}Asl and
                  Somaye Arabi Naree and
                  Behrouz Minaei{-}Bidgoli},
  editor       = {Dominik Slezak and
                  Tai{-}Hoon Kim and
                  Kiumi Akingbehin and
                  Tao Jiang and
                  June M. Verner and
                  Silvia Abrah{\~{a}}o},
  title        = {Software Fault Localization Using Elastic Net: {A} New Statistical
                  Approach},
  booktitle    = {Advances in Software Engineering - International Conference on Advanced
                  Software Engineering and Its Applications, {ASEA} 2009 Held as Part
                  of the Future Generation Information Technology Conference, {FGIT}
                  2009, Jeju Island, Korea, December 10-12, 2009. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {59},
  pages        = {127--134},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10619-4\_16},
  doi          = {10.1007/978-3-642-10619-4\_16},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/ParsaVNM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aimsa/ParsaNV08,
  author       = {Saeed Parsa and
                  Somaye Arabi Naree and
                  Mojtaba Vahidi{-}Asl},
  editor       = {Danail Dochev and
                  Marco Pistore and
                  Paolo Traverso},
  title        = {A Learning Approach to Early Bug Prediction in Deployed Software},
  booktitle    = {Artificial Intelligence: Methodology, Systems, and Applications, 13th
                  International Conference, {AIMSA} 2008, Varna, Bulgaria, September
                  4-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5253},
  pages        = {400--404},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85776-1\_38},
  doi          = {10.1007/978-3-540-85776-1\_38},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/aimsa/ParsaNV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csicc/ParsaNV08,
  author       = {Saeed Parsa and
                  Somaye Arabi Naree and
                  Mojtaba Vahidi{-}Asl},
  editor       = {Hamid Sarbazi{-}Azad and
                  Behrooz Parhami and
                  Seyed Ghassem Miremadi and
                  Shaahin Hessabi},
  title        = {Early Bug Detection in Deployed Software Using Support Vector Machine},
  booktitle    = {Advances in Computer Science and Engineering - 13th International
                  {CSI} Computer Conference, {CSICC} 2008, Kish Island, Iran, March
                  9-11, 2008 Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {6},
  pages        = {518--525},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89985-3\_64},
  doi          = {10.1007/978-3-540-89985-3\_64},
  timestamp    = {Thu, 23 Jun 2022 19:54:33 +0200},
  biburl       = {https://dblp.org/rec/conf/csicc/ParsaNV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/snpd/ParsaVN08,
  author       = {Saeed Parsa and
                  Mojtaba Vahidi{-}Asl and
                  Somaye Arabi Naree},
  title        = {Finding Causes of Software Failure Using Ridge Regression and Association
                  Rule Generation Methods},
  booktitle    = {Ninth {ACIS} International Conference on Software Engineering, Artificial
                  Intelligence, Networking and Parallel/Distributed Computing, {SNPD}
                  2008, In conjunction with Second International Workshop on Advanced
                  Internet Technology and Applications, August 6-8, 2008, Phuket, Thailand},
  pages        = {873--878},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SNPD.2008.133},
  doi          = {10.1109/SNPD.2008.133},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/snpd/ParsaVN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iat/SaberiVM07,
  author       = {Alireza Saberi and
                  Mojtaba Vahidi and
                  Behrouz Minaei{-}Bidgoli},
  title        = {Learn to Detect Phishing Scams Using Learning and Ensemble ?Methods},
  booktitle    = {Proceedings of the 2007 {IEEE/WIC/ACM} International Conference on
                  Web Intelligence and International Conference on Intelligent Agent
                  Technology - Workshops, 2-5 November 2007, Silicon Valley, CA, {USA}},
  pages        = {311--314},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/WIIATW.2007.4427596},
  doi          = {10.1109/WIIATW.2007.4427596},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iat/SaberiVM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SharifiSVZ07,
  author       = {Mohsen Sharifi and
                  Alireza Saberi and
                  Mojtaba Vahidi and
                  Mohammad Zoroufi},
  editor       = {Patrick D. McDaniel and
                  Shyam K. Gupta},
  title        = {A Zero Knowledge Password Proof Mutual Authentication Technique Against
                  Real-Time Phishing Attacks},
  booktitle    = {Information Systems Security, Third International Conference, {ICISS}
                  2007, Delhi, India, December 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4812},
  pages        = {254--258},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77086-2\_20},
  doi          = {10.1007/978-3-540-77086-2\_20},
  timestamp    = {Thu, 05 Jan 2023 17:10:29 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/SharifiSVZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics