Sattar Hashemi
Sattar Hashemi
Professor of Artificial Intelligence, Shiraz University
Verified email at shirazu.ac.ir
Title
Cited by
Cited by
Year
Malware detection based on mining API calls
A Sami, B Yadegari, H Rahimi, N Peiravian, S Hashemi, A Hamze
Proceedings of the 2010 ACM Symposium on Applied Computing, 1020-1025, 2010
2042010
To combat multi-class imbalanced problems by means of over-sampling techniques
L Abdi, S Hashemi
IEEE Transactions on Knowledge and Data Engineering 28 (1), 238-251, 2016
1952016
Visual domain adaptation via transfer feature learning
J Tahmoresnezhad, S Hashemi
Knowledge and Information Systems 50 (2), 585-605, 2017
1192017
Two-tier network anomaly detection model: a machine learning approach
HH Pajouh, GH Dastghaibyfard, S Hashemi
Journal of Intelligent Information Systems 48 (1), 61-74, 2017
1162017
Adapted one-versus-all decision trees for data stream classification
S Hashemi, Y Yang, Z Mirzamomen, M Kangavari
IEEE Transactions on Knowledge and Data Engineering 21 (5), 624-637, 2008
1132008
Know abnormal, find evil: frequent pattern mining for ransomware threat hunting and intelligence
S Homayoun, A Dehghantanha, M Ahmadzadeh, S Hashemi, R Khayami
IEEE transactions on emerging topics in computing 8 (2), 341-351, 2017
1062017
Flexible decision tree for data stream classification in the presence of concept change, noise and missing values
S Hashemi, Y Yang
Data Mining and Knowledge Discovery 19 (1), 95-131, 2009
832009
A graph mining approach for detecting unknown malwares
M Eskandari, S Hashemi
Journal of Visual Languages & Computing 23 (3), 154-162, 2012
812012
Towards a variable size sliding window model for frequent itemset mining over data streams
M Deypir, MH Sadreddini, S Hashemi
Computers & Industrial Engineering 63 (1), 161-172, 2012
782012
DBFS: An effective Density Based Feature Selection scheme for small sample size and high dimensional imbalanced data sets
M Alibeigi, S Hashemi, A Hamzeh
Data & Knowledge Engineering 81, 67-103, 2012
682012
Detecting overlapping communities in social networks by game theory and structural equivalence concept
H Alvari, S Hashemi, A Hamzeh
International Conference on Artificial Intelligence and Computational …, 2011
602011
DRTHIS: Deep ransomware threat hunting and intelligence system at the fog layer
S Homayoun, A Dehghantanha, M Ahmadzadeh, S Hashemi, R Khayami, ...
Future Generation Computer Systems 90, 94-104, 2019
592019
A Hybrid clustering and classification technique for forecasting short‐term energy consumption
M Torabi, S Hashemi, MR Saybani, S Shamshirband, A Mosavi
Environmental Progress & Sustainable Energy 38 (1), 66-76, 2019
582019
Graph embedding as a new approach for unknown malware detection
H Hashemi, A Azmoodeh, A Hamzeh, S Hashemi
Journal of Computer Virology and Hacking Techniques 13 (3), 153-166, 2017
542017
BoTShark: A deep learning approach for botnet traffic detection
S Homayoun, M Ahmadzadeh, S Hashemi, A Dehghantanha, R Khayami
Cyber Threat Intelligence, 137-153, 2018
512018
HDM-Analyser: a hybrid analysis approach based on data mining techniques for malware detection
M Eskandari, Z Khorshidpour, S Hashemi
Journal of Computer Virology and Hacking Techniques 9 (2), 77-93, 2013
462013
An improved two-hidden-layer extreme learning machine for malware hunting
AN Jahromi, S Hashemi, A Dehghantanha, KKR Choo, H Karimipour, ...
Computers & Security 89, 101655, 2020
422020
An opcode‐based technique for polymorphic Internet of Things malware detection
H Darabian, A Dehghantanha, S Hashemi, S Homayoun, KKR Choo
Concurrency and Computation: Practice and Experience 32 (6), e5173, 2020
382020
Metamorphic Malware Detection using Control Flow Graph Mining
M Eskandari, S Hashemi
IJCSNS 11 (12), 1, 2011
352011
Detecting intrusion transactions in databases using data item dependencies and anomaly analysis
S Hashemi, Y Yang, D Zabihzadeh, M Kangavari
Expert Systems 25 (5), 460-473, 2008
342008
The system can't perform the operation now. Try again later.
Articles 1–20