default search action
Soodeh Hosseini
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Elham Asadi, Soodeh Hosseini:
A clustered-LPSEIRS malware propagation model in complex networks. Appl. Netw. Sci. 9(1): 62 (2024) - [j25]Mahdieh Maazalahi, Soodeh Hosseini:
K-means and meta-heuristic algorithms for intrusion detection systems. Clust. Comput. 27(8): 10377-10419 (2024) - [j24]Morteza Jouyban, Soodeh Hosseini:
A new approach for estimating the number of communities in complex networks using PGD-SNMTF and GA. Evol. Syst. 15(2): 591-609 (2024) - [j23]Mohammad Mousavi, Soodeh Hosseini:
A deep convolutional neural network approach using medical image classification. BMC Medical Informatics Decis. Mak. 24(1): 239 (2024) - 2023
- [j22]Benyamin MazhariSefat, Soodeh Hosseini:
Social network security using genetic algorithm. Evol. Syst. 14(2): 175-190 (2023) - [j21]Soodeh Hosseini, Saman Rafiee Sardo:
Network intrusion detection based on deep learning method in internet of thing. J. Reliab. Intell. Environ. 9(2): 147-159 (2023) - [j20]Zahra Asghari Varzaneh, Soodeh Hosseini, Mohammad Masoud Javidi:
A novel binary horse herd optimization algorithm for feature selection problem. Multim. Tools Appl. 82(26): 40309-40343 (2023) - 2022
- [j19]Soodeh Hosseini, Ali Emamali Nezhad, Hossein Seilani:
Botnet detection using negative selection algorithm, convolution neural network and classification methods. Evol. Syst. 13(1): 101-115 (2022) - [j18]Soodeh Hosseini, Aboozar Zandvakili:
The SEIRS-C model of information diffusion based on rumour spreading with fuzzy logic in social networks. Int. J. Comput. Math. 99(9): 1918-1940 (2022) - [j17]Reyhane Hafezi Fard, Soodeh Hosseini:
Machine Learning algorithms for prediction of energy consumption and IoT modeling in complex networks. Microprocess. Microsystems 89: 104423 (2022) - [j16]Soodeh Hosseini, Zahra Asghari Varzaneh:
Deep text clustering using stacked AutoEncoder. Multim. Tools Appl. 81(8): 10861-10881 (2022) - [j15]Morteza Hamzehi, Soodeh Hosseini:
Business intelligence using machine learning algorithms. Multim. Tools Appl. 81(23): 33233-33251 (2022) - [j14]Soodeh Hosseini, Aboozar Zandvakili:
Information dissemination modeling based on rumor propagation in online social networks with fuzzy logic. Soc. Netw. Anal. Min. 12(1): 34 (2022) - 2021
- [j13]Soodeh Hosseini:
Defense against malware propagation in complex heterogeneous networks. Clust. Comput. 24(2): 1199-1215 (2021) - [j12]Soodeh Hosseini, Hossein Seilani:
Anomaly process detection using negative selection algorithm and classification techniques. Evol. Syst. 12(3): 769-778 (2021) - [j11]Soodeh Hosseini, Saman Rafiee Sardo:
Data mining tools -a case study for network intrusion detection. Multim. Tools Appl. 80(4): 4999-5019 (2021) - [j10]Soodeh Hosseini, Ali Emamali Nezhad, Hossein Seilani:
Android malware classification using convolutional neural network and LSTM. J. Comput. Virol. Hacking Tech. 17(4): 307-318 (2021) - [j9]Soodeh Hosseini, Reyhane Hafezi Fard:
Machine Learning Algorithms for Predicting Electricity Consumption of Buildings. Wirel. Pers. Commun. 121(4): 3329-3341 (2021) - 2020
- [j8]Soodeh Hosseini, Behnam Mohammad Hasani Zade:
New hybrid method for attack detection using combination of evolutionary algorithms, SVM, and ANN. Comput. Networks 173: 107168 (2020) - [j7]Soodeh Hosseini:
A new machine learning method consisting of GA-LR and ANN for attack detection. Wirel. Networks 26(6): 4149-4162 (2020)
2010 – 2019
- 2019
- [j6]Soodeh Hosseini, Mehrdad Azizi:
The hybrid technique for DDoS detection with supervised learning algorithms. Comput. Networks 158: 35-45 (2019) - [j5]Soodeh Hosseini, Ramin Vakili:
Game theory approach for detecting vulnerable data centers in cloud computing network. Int. J. Commun. Syst. 32(8) (2019) - 2016
- [j4]Soodeh Hosseini, Mohammad Abdollahi Azgomi:
A model for malware propagation in scale-free networks based on rumor spreading process. Comput. Networks 108: 97-107 (2016) - [j3]Soodeh Hosseini, Mohammad Abdollahi Azgomi, Adel Torkaman Rahmani:
Malware propagation modeling considering software diversity and immunization. J. Comput. Sci. 13: 49-67 (2016) - [j2]Soodeh Hosseini, Mohammad Abdollahi Azgomi, Adel Torkaman Rahmani:
Agent-based simulation of the dynamics of malware propagation in scale-free networks. Simul. 92(7): 709-722 (2016) - 2015
- [j1]Soodeh Hosseini, Mohammad Abdollahi Azgomi, Adel Torkaman Rahmani:
Dynamics of a rumor-spreading model with diversity of configurations in scale-free networks. Int. J. Commun. Syst. 28(18): 2255-2274 (2015) - 2014
- [c2]Soodeh Hosseini, Mohammad Abdollahi Azgomi, Adel Torkaman Rahmani:
A malware propagation model considering software diversity and topology dynamics. ISCISC 2014: 73-78
2000 – 2009
- 2008
- [c1]Soodeh Hosseini, Mohammad Abdollahi Azgomi:
UML Model Refactoring with Emphasis on Behavior Preservation. TASE 2008: 125-128
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-08 20:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint