default search action
Reza Fotohi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j28]Reza Fotohi, Fereidoon Shams Aliee, Bahar J. Farahani:
Decentralized and robust privacy-preserving model using blockchain-enabled Federated Deep Learning in intelligent enterprises. Appl. Soft Comput. 161: 111764 (2024) - [j27]Bahman Varastan, Shahram Jamali, Reza Fotohi:
Hardening of the Internet of Things by using an intrusion detection system based on deep learning. Clust. Comput. 27(3): 2465-2488 (2024) - [j26]Reza Fotohi, Fereidoon Shams Aliee, Bahareh J. Farahani:
A Lightweight and Secure Deep Learning Model for Privacy-Preserving Federated Learning in Intelligent Enterprises. IEEE Internet Things J. 11(19): 31988-31998 (2024) - [j25]Samira Rajabi, Samane Asgari, Shahram Jamali, Reza Fotohi:
An Intrusion Detection System Using the Artificial Neural Network-based Approach and Firefly Algorithm. Wirel. Pers. Commun. 137(4): 2409-2440 (2024) - 2022
- [j24]Reza Fotohi, Masoud Abdan, Sanaz Ghasemi:
A Self-Adaptive Intrusion Detection System for Securing UAV-to-UAV Communications Based on the Human Immune System in UAV Networks. J. Grid Comput. 20(3): 22 (2022) - [j23]Yaser Ebazadeh, Reza Fotohi:
A reliable and secure method for network-layer attack discovery and elimination in mobile ad-hoc networks based on a probabilistic threshold. Secur. Priv. 5(1) (2022) - [j22]Hossein Pakdel, Mohsen Jahanshahi, Reza Fotohi:
An Approach to Environmental Monitoring in Sparse Linear Wireless Sensor Networks for Energy Conservation Using Dual Sinks. Wirel. Pers. Commun. 126(1): 635-663 (2022) - [j21]Amin Khansoltani, Shahram Jamali, Reza Fotohi:
A Request Redirection Algorithm in Content Delivery Network: Using PROMETHEE Approach. Wirel. Pers. Commun. 126(2): 1145-1175 (2022) - 2021
- [j20]Reza Fotohi, Fereidoon Shams Aliee:
Securing communication between things using blockchain technology based on authentication and SHA-256 to improving scalability in large-scale IoT. Comput. Networks 197: 108331 (2021) - [j19]Mahzad Mahdavisharif, Shahram Jamali, Reza Fotohi:
Big Data-Aware Intrusion Detection System in Communication Networks: a Deep Learning Approach. J. Grid Comput. 19(4): 46 (2021) - [j18]Mina Zaminkar, Fatemeh Sarkohaki, Reza Fotohi:
A method based on encryption and node rating for securing the RPL protocol communications in the IoT ecosystem. Int. J. Commun. Syst. 34(3) (2021) - [j17]Shahram Jamali, Mir Mahmoud Talebi, Reza Fotohi:
Congestion control in high-speed networks using the probabilistic estimation approach. Int. J. Commun. Syst. 34(7) (2021) - [j16]Marzieh Masoumi, Ahmad Keshavarz, Reza Fotohi:
File fragment recognition based on content and statistical features. Multim. Tools Appl. 80(12): 18859-18874 (2021) - [j15]Seyed Meysam Zarei, Reza Fotohi:
Defense against flooding attacks using probabilistic thresholds in the internet of things ecosystem. Secur. Priv. 4(3) (2021) - [j14]Maryam Faraji-Biregani, Reza Fotohi:
Secure communication between UAVs using a method based on smart agents in unmanned aerial vehicles. J. Supercomput. 77(5): 5076-5103 (2021) - [j13]Hossein Pakdel, Reza Fotohi:
A firefly algorithm for power management in wireless sensor networks (WSNs). J. Supercomput. 77(9): 9411-9432 (2021) - [j12]Samane Asgari, Shahram Jamali, Reza Fotohi, Mahdi Nooshyar:
Performance-aware placement and chaining scheme for virtualized network functions: a particle swarm optimization approach. J. Supercomput. 77(11): 12209-12229 (2021) - [j11]Monir Shaker, Fereidoon Shams Aliee, Reza Fotohi:
Online rating system development using blockchain-based distributed ledger technology. Wirel. Networks 27(3): 1715-1737 (2021) - [j10]Reza Fotohi, Hossein Pakdel:
A Lightweight and Scalable Physical Layer Attack Detection Mechanism for the Internet of Things (IoT) Using Hybrid Security Schema. Wirel. Pers. Commun. 119(4): 3089-3106 (2021) - [i18]Monir Shaker, Fereidoon Shams Aliee, Reza Fotohi:
Online rating system development using blockchain-based distributed ledger technology. CoRR abs/2101.04173 (2021) - [i17]Hossein Pakdel, Reza Fotohi:
A firefly algorithm for power management in wireless sensor networks (WSNs). CoRR abs/2102.05656 (2021) - [i16]Seyed Meysam Zarei, Reza Fotohi:
Defense against flooding attacks using probabilistic thresholds in the internet of things ecosystem. CoRR abs/2102.09805 (2021) - [i15]Marzieh Masoumi, Ahmad Keshavarz, Reza Fotohi:
File fragment recognition based on content and statistical features. CoRR abs/2102.12699 (2021) - [i14]Shahram Jamali, Mir Mahmoud Talebi, Reza Fotohi:
Congestion control in high-speed networks using the probabilistic estimation approach. CoRR abs/2103.09639 (2021) - [i13]Reza Fotohi, Hossein Pakdel:
A Lightweight and Scalable Physical Layer Attack Detection Mechanism for the Internet of Things (IoT) Using Hybrid Security Schema. CoRR abs/2103.16920 (2021) - [i12]Samane Asgari, Shahram Jamali, Reza Fotohi, Mahdi Nooshyar:
Performance-aware placement and chaining scheme for virtualized network functions: a particle swarm optimization approach. CoRR abs/2105.05248 (2021) - 2020
- [j9]Reza Fotohi, Somayyeh Firoozi Bari, Mehdi Yusefi:
Securing Wireless Sensor Networks Against Denial-of-Sleep Attacks Using RSA Cryptography Algorithm and Interlock Protocol. Int. J. Commun. Syst. 33(4) (2020) - [j8]Reza Fotohi:
Securing of Unmanned Aerial Systems (UAS) against security threats using human immune system. Reliab. Eng. Syst. Saf. 193: 106675 (2020) - [j7]Reza Fotohi, Somayyeh Firoozi Bari:
A novel countermeasure technique to protect WSN against denial-of-sleep attacks using firefly and Hopfield neural network (HNN) algorithms. J. Supercomput. 76(9): 6860-6886 (2020) - [j6]Behnam Seyedi, Reza Fotohi:
NIASHPT: a novel intelligent agent-based strategy using hello packet table (HPT) function for trust Internet of Things. J. Supercomput. 76(9): 6917-6940 (2020) - [j5]Kobra Mabodi, Mehdi Yusefi, Shahram Zandiyan, Leili Irankhah, Reza Fotohi:
Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication. J. Supercomput. 76(9): 7081-7106 (2020) - [j4]Reza Fotohi, Eslam Nazemi, Fereidoon Shams Aliee:
An agent-based self-protective method to secure communication between UAVs in unmanned aerial vehicle networks. Veh. Commun. 26: 100267 (2020) - [j3]Mina Zaminkar, Reza Fotohi:
SoS-RPL: Securing Internet of Things Against Sinkhole Attack Using RPL Protocol-Based Node Rating and Ranking Mechanism. Wirel. Pers. Commun. 114(2): 1287-1312 (2020) - [i11]Kobra Mabodi, Mehdi Yusefi, Shahram Zandiyan, Leili Irankhah, Reza Fotohi:
Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication. CoRR abs/2001.05354 (2020) - [i10]Reza Fotohi, Somayyeh Firoozi Bari:
A novel countermeasure technique to protect WSN against denial-of-sleep attacks using firefly and Hopfield neural network (HNN) algorithms. CoRR abs/2001.05358 (2020) - [i9]Reza Fotohi, Somayyeh Firoozi Bari, Mehdi Yusefi:
Securing Wireless Sensor Networks Against Denial-of-Sleep Attacks Using RSA Cryptography Algorithm and Interlock Protocol. CoRR abs/2001.06077 (2020) - [i8]Reza Fotohi, Yaser Ebazadeh, Mohammad Seyyar Geshlag:
A New Approach for Improvement Security against DoS Attacks in Vehicular Ad-hoc Network. CoRR abs/2002.10333 (2020) - [i7]Fatemeh Sarkohaki, Reza Fotohi, Vahab Ashrafian:
An Efficient Routing Protocol in Mobile Ad-hoc Networks by using Artificial Immune System. CoRR abs/2003.00869 (2020) - [i6]Shahram Behzad, Reza Fotohi, Jaber Hosseini Balov, Mohammad Javad Rabipour:
An Artificial Immune Based Approach for Detection and Isolation Misbehavior Attacks in Wireless Networks. CoRR abs/2003.00870 (2020) - [i5]Reza Fotohi:
Securing of Unmanned Aerial Systems (UAS) against security threats using human immune system. CoRR abs/2003.04984 (2020) - [i4]Mina Zaminkar, Reza Fotohi:
SoS-RPL: Securing Internet of Things Against Sinkhole Attack Using RPL Protocol-Based Node Rating and Ranking Mechanism. CoRR abs/2005.09140 (2020) - [i3]Reza Fotohi, Eslam Nazemi, Fereidoon Shams Aliee:
An agent-based self-protective method to secure communication between UAVs in unmanned aerial vehicle networks. CoRR abs/2006.09293 (2020) - [i2]Maryam Faraji-Biregani, Reza Fotohi:
Secure communication between UAVs using a method based on smart agents in unmanned aerial vehicles. CoRR abs/2011.09285 (2020) - [i1]Mina Zaminkar, Fatemeh Sarkohaki, Reza Fotohi:
A method based on encryption and node rating for securing the RPL protocol communications in the IoT ecosystem. CoRR abs/2012.02242 (2020)
2010 – 2019
- 2018
- [j2]Shahram Behzad, Reza Fotohi, Jaber Hosseini Balov, Mohammad Javad Rabipour:
An Artificial Immune Based Approach for Detection and Isolation Misbehavior Attacks in Wireless Networks. J. Comput. 13(6): 705-720 (2018) - 2017
- [j1]Shahram Jamali, Reza Fotohi:
DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system. J. Supercomput. 73(12): 5173-5196 (2017)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 20:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint