Cluster-based vulnerability assessment of operating systems and web browsers Y Movahedi, M Cukier, A Andongabo, I Gashi Computing 101 (2), 139-160, 2019 | 20 | 2019 |
Application of routine activity theory to cyber intrusion location and time K Bock, S Shannon, Y Movahedi, M Cukier 2017 13th European Dependable Computing Conference (EDCC), 139-146, 2017 | 18 | 2017 |
Vulnerability prediction capability: A comparison between vulnerability discovery models and neural network models Y Movahedi, M Cukier, I Gashi Computers & Security 87, 101596, 2019 | 15 | 2019 |
Cluster-based vulnerability assessment applied to operating systems Y Movahedi, M Cukier, A Andongabo, I Gashi 2017 13th European Dependable Computing Conference (EDCC), 18-25, 2017 | 9 | 2017 |
Design and Development of the Pattern to Assign and Estimate the Reliability of Complicated Systems by Bayesian Network Method, Case Study: A High Technology Camera Y Movahedi, M Dolatkhah, M Karbasian, V Rasty International Journal of Industrial Engineering 24 (4), 437-448, 2014 | 4 | 2014 |
Predicting the Discovery Pattern of Publically Known Exploited Vulnerabilities Y Movahedi, M Cukier, I Gashi IEEE Transactions on Dependable and Secure Computing, 2020 | 3 | 2020 |
Some Guidelines for Risk Assessment of Vulnerability Discovery Processes Y Movahedi PQDT-Global, 2019 | 2 | 2019 |
Reliability Optimization of Fuzzy Multi-state Systems Y Movahedi Department of Industrial and Systems Engineering, Isfahan University of …, 2015 | | 2015 |