Sajad Homayoun
TitleCited byYear
Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence
S Homayoun, A Dehghantanha, M Ahmadzadeh, S Hashemi, R Khayami
IEEE Transactions on Emerging Topics in Computing (In Press) 99, 11, 2017
512017
BoTShark: A deep learning approach for botnet traffic detection
S Homayoun, M Ahmadzadeh, S Hashemi, A Dehghantanha, R Khayami
Cyber Threat Intelligence, 137-153, 2018
172018
DRTHIS: Deep ransomware threat hunting and intelligence system at the fog layer
S Homayoun, A Dehghantanha, M Ahmadzadeh, S Hashemi, R Khayami, ...
Future Generation Computer Systems 90, 11, 2019
142019
An OpCode-Based Technique for Polymorphic Internet of Things Malware Detection
H Darabian, A Dehghantanha, S Hashemi, S Homayoun, KKR Choo
Concurrency and Computation: Practice and Experience, 2019
92019
Efficient intrusion detection using weighted k-means clustering and naïve bayes classification
Y Emami, M Ahmadzadeh, M Salehi, S Homayoun
Journal of Emerging Trends in Computing and Information Sciences 5 (8), 620-623, 2014
72014
A website evaluation of travel agencies in Iran: An adoption level and value creation approach
R Sadeghein, F Khoshalhan, S Homayoun
International Journal of Advanced Information Technology 2 (6), 1, 2012
62012
Forensics investigation of openflow-based SDN platforms
MK Pandya, S Homayoun, A Dehghantanha
Cyber Threat Intelligence, 281-296, 2018
52018
Integrating Privacy Enhancing Techniques into Blockchains Using Sidechains
R M. Parizi, S Homayoun, A Yazdinejad, A Dehghantanha, ...
IEEE 32nd Canadian Conference of Electrical and Computer Engineering (IEEE …, 2019
42019
A review on data stream classification approaches
S Homayoun, M Ahmadzadeh
Journal of Advanced Computer Science & Technology 5 (1), 8-13, 2016
32016
A Blockchain-based Framework for Detecting Malicious Mobile Applications in App Stores
S Homayoun, A Dehghantanha, R M Parizi, KK Raymond Choo
IEEE 32nd Canadian Conference of Electrical and Computer Engineering (IEEE …, 2019
22019
Private cloud storage forensics: Seafile as a case study
YY Teing, S Homayoun, A Dehghantanha, KKR Choo, RM Parizi, ...
Handbook of Big Data and IoT Security, 73-127, 2019
22019
Performance Analysis of Multiple Virtualized Servers
S Homayoun, A Jalili, M Keshtgari
Computer Engineering and Applications Journal 4 (3), 183-188, 2015
12015
Fault Tolerant Approach for WSN Chain Based Routing Protocols
SH Ahmad Jalili, M Keshtgary
International Journal of Computer Networks and Communications Security 3 (2), 2015
1*2015
Strategic Evaluation of Web-based E-learning; a review on 8 articles
S Mohammadi, S Homayoun
Advances in Computer Science: an International Journal 2 (2), 13-18, 2013
12013
Survey of Business Process Re-engineering Experiences in Iranian Travel Agencies
MJ Tarokh, S Homayoun, R Sadeghein
12008
A multiview learning method for malware threat hunting: windows, IoT and android as case studies
H Darabian, A Dehghantanha, S Hashemi, M Taheri, A Azmoodeh, ...
World Wide Web, 1-20, 2019
2019
Deep dive into ransomware threat hunting and intelligence at fog layer
S Homayoun, A Dehghantanha, M Ahmadzadeh, M Hashemi, R Khayami, ...
Future Generation Computer Systems 90 (Jan 19), 94-104, 2018
2018
Time Reduction on Dispensing Prescription Medicine in Iranian Pharmacies through a Hybrid Approach
S Homayoun, MJ Tarokh
2013
GRID COMPUTING: STRATEGIC DECISION MAKING IN RESOURCE SELECTION
S Mohammadi, S Homayoun, ET Zadeh
International Journal of Computer Science, Engineering and Applications 2 (6), 1, 2012
2012
International Journal of Advanced Information Technology (IJAIT)
R Sadeghein, F Khoshalhan, S Homayoun, J Ali, RZ Khan, BK Tripathy, ...
A Website Evaluation of Travel Agencies in Iran: An Adoption Level and Value …, 2012
2012
The system can't perform the operation now. Try again later.
Articles 1–20