Up a level |
Osmanpoor, M., Shameli-Sendi, A., & Daneshgar, F. F. (2024). Convergence of the Harris hawks optimization algorithm and fuzzy system for cloud-based task scheduling enhancement. Cluster Computing-the Journal of Networks Software Tools and Applications, 15 pages. External link
Khanahmadi, M., Shameli-Sendi, A., Jabbarifar, M., Fournier, Q., & Dagenais, M. (2023). Detection of microservice-based software anomalies based on OpenTracing in cloud. Software: Practice and Experience, 53(8), 1681-1699. External link
Khodayarseresht, E., Shameli-Sendi, A., Fournier, Q., & Dagenais, M. (2023). Energy and carbon-aware initial VM placement in geographically distributed cloud data centers. Sustainable Computing: Informatics and Systems, 39, 11 pages. External link
Shameli-Sendi, A., Dagenais, M., & Wang, L. (2018). Realtime intrusion risk assessment model based on attack and service dependency graphs. Computer Communications, 116, 253-272. External link
Jabbarifar, M., Dagenais, M., & Shameli-Sendi, A. (2015). Online Incremental Clock Synchronization. Journal of Network and Systems Management, 23(4), 1034-1066. External link
Shameli-Sendi, A., & Dagenais, M. (2015). ORCEF: Online response cost evaluation framework for intrusion response system. Journal of Network and Computer Applications, 55, 89-107. External link
Shameli-Sendi, A., & Dagenais, M. (2014). ARITO: Cyber-attack response system using accurate risk impact tolerance. International Journal of Information Security, 13(4), 367-390. External link
Shameli-Sendi, A., Desfossez, J., Dagenais, M., & Jabbarifar, M. (2013). A retroactive-burst framework for automated intrusion response system. Journal of Computer Networks and Communications, 2013, 1-8. Available
Shameli-Sendi, A., Ezzati-jivan, N., Jabbarifar, M., & Dagenais, M. (2012). Intrusion response systems: survey and taxonomy. International Journal of Computer Science and Network Security, 12(1), 1-14. External link
Shameli-Sendi, A., Jabbarifar, M., Dagenais, M., & Shajari, M. (2012). System health monitoring using a novel method : security unified process. Journal of Computer Networks and Communications, 2012, 1-20. Available