Raouf Khayami
TitleCited byYear
A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks
HH Pajouh, R Javidan, R Khayami, D Ali, KKR Choo
IEEE Transactions on Emerging Topics in Computing, 2016
842016
A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting
H HaddadPajouh, A Dehghantanha, R Khayami, KKR Choo
Future Generation Computer Systems 85, 88-96, 2018
562018
Know abnormal, find evil: frequent pattern mining for ransomware threat hunting and intelligence
S Homayoun, A Dehghantanha, M Ahmadzadeh, S Hashemi, R Khayami
IEEE transactions on emerging topics in computing, 2017
512017
An efficient Swarm-Intelligence approach for task scheduling in cloud-based internet of things applications
HR Boveiri, R Khayami, M Elhoseny, M Gunasekaran
Journal of Ambient Intelligence and Humanized Computing 10 (9), 3469-3479, 2019
38*2019
Qualitative characteristics of enterprise architecture
R Khayami
Procedia Computer Science 3, 1277-1282, 2011
362011
Using COBIT and ITIL frameworks to establish the alignment of business and IT organizations as one of the critical success factors in ERP implementation
R Parvizi, F Oghbaei, SR Khayami
The 5th Conference on Information and Knowledge Technology, 274-278, 2013
272013
Intelligent OS X malware threat detection with code inspection
HH Pajouh, A Dehghantanha, R Khayami, KKR Choo
Journal of Computer Virology and Hacking Techniques 14 (3), 213-223, 2018
202018
Network traffic classification using machine learning techniques over software defined networks
MR Parsaei, MJ Sobouti, SR Khayami, R Javidan
International Journal of Advanced Computer Science and Applications 8 (7 …, 2017
182017
BoTShark: A deep learning approach for botnet traffic detection
S Homayoun, M Ahmadzadeh, S Hashemi, A Dehghantanha, R Khayami
Cyber Threat Intelligence, 137-153, 2018
172018
DRTHIS: Deep ransomware threat hunting and intelligence system at the fog layer
S Homayoun, A Dehghantanha, M Ahmadzadeh, S Hashemi, R Khayami, ...
Future Generation Computer Systems 90, 94-104, 2019
142019
The analytical comparison of qualitative models of software systems
R Khayami, A Towhidi, K Ziarati
World Applied Sciences Journal 6 (1), 1-6, 2009
92009
Intelligent OS X malware threat detection with code inspection
H HaddadPajouh, A Dehghantanha, R Khayami, RKK Choo
Journal of Computer Virology and Hacking Techniques 14 (3), 213-223, 2017
72017
Systematic literature review in the area of Enterprise architecture during past 10 years
Z Rasti, A Darajeh, R Khayami, H Sanatnama
2015 2nd International Conference on Knowledge-Based Engineering and …, 2015
72015
CYRUS 2D simulation team description paper 2014
R Khayami, N Zare, M Karimi, P Mahor, A Afshar, MS Najafi, M Asadi, ...
RoboCup 2014 Symposium and Competitions: Team description papers, 2014
72014
Static Homogeneous Multiprocessor Task Graph Scheduling Using Ant Colony Optimization.
HR Boveiri, R Khayami
TIIS 11 (6), 3046-3070, 2017
42017
Virtual collaboration readiness measurement a case study in the automobile industry
K Ziarati, R Khayami, E Parvinnia, GA Milani
Computer Society of Iran Computer Conference, 913-916, 2008
42008
Measurable quality characteristics of a software system on software architecture level
SR Khayami, A Towhidi, K Ziarati
Proceedings of the World Congress on Engineering 1, 2008
42008
Evaluation and Analyzing of Enterprise Architecture Extensibility
R Khayami
Global Journal on Technology, 2013
22013
Designing a Fuzzy Rule Base System to Head Cluster Election in Wireless Sensor Networks
M Gharghi, E Parvinnia, R Khayami
Indian Journal of Science and Technology 6, 2013
22013
A knowledge sharing model for Iranian educational and research organizations
M Ghelichkhani, R Khaiami
Indian Journal of Science and Technology 8 (28), 1, 2015
12015
The system can't perform the operation now. Try again later.
Articles 1–20