Mohammad Abdollahi Azgomi
Mohammad Abdollahi Azgomi
Associate Professor at School of Computer Engineering, Iran University of Science and Technology
Verified email at iust.ac.ir - Homepage
TitleCited byYear
Improving route stability and overhead on AODV routing protocol and make it usable for VANET
O Abedi, R Berangi, MA Azgomi
2009 29th IEEE International Conference on Distributed Computing Systems …, 2009
792009
Task scheduling modelling and reliability evaluation of grid services using coloured Petri nets
MA Azgomi, R Entezari-Maleki
Future Generation Computer Systems 26 (8), 1141-1150, 2010
442010
A taxonomy of frauds and fraud detection techniques
N Laleh, MA Azgomi
International Conference on Information Systems, Technology and Management …, 2009
412009
An improved method for test case prioritization by incorporating historical test case data
A Khalilian, MA Azgomi, Y Fazlalizadeh
Science of Computer Programming 78 (1), 93-116, 2012
402012
A survey of quantum-like approaches to decision making and cognition
M Ashtiani, MA Azgomi
Mathematical Social Sciences 75, 49-80, 2015
322015
Prioritizing test cases for resource constraint environments using historical test case performance data
Y Fazlalizadeh, A Khalilian, MA Azgomi, S Parsa
2009 2nd IEEE International Conference on Computer Science and Information …, 2009
322009
Malware propagation modeling considering software diversity and immunization
S Hosseini, MA Azgomi, AT Rahmani
Journal of computational science 13, 49-67, 2016
312016
A modelling tool for hierarchical stochastic activity networks
MA Azgomi, A Movaghar
Simulation Modelling Practice and Theory 13 (6), 505-524, 2005
312005
A stochastic model of attack process for the evaluation of security metrics
J Almasizadeh, MA Azgomi
Computer Networks 57 (10), 2159-2180, 2013
302013
A method for evaluating the consequence propagation of security attacks in cyber–physical systems
H Orojloo, MA Azgomi
Future Generation Computer Systems 67, 57-71, 2017
292017
Trust modeling based on a combination of fuzzy analytic hierarchy process and fuzzy VIKOR
M Ashtiani, MA Azgomi
Soft Computing 20 (1), 399-421, 2016
282016
Performance evaluation of sensor medium access control protocol using coloured petri nets
MA Azgomi, A Khalili
Electronic Notes in Theoretical Computer Science 242 (2), 31-42, 2009
252009
Conflict-free scheduling and routing of automated guided vehicles in mesh topologies
H Ghasemzadeh, E Behrangi, MA Azgomi
Robotics and Autonomous Systems 57 (6-7), 738-748, 2009
252009
Transformation of UML models into analyzable OSAN models
A Kamandi, MA Azgomi, A Movaghar
Electronic Notes in Theoretical Computer Science 159, 3-22, 2006
252006
A model for malware propagation in scale-free networks based on rumor spreading process
S Hosseini, MA Azgomi
Computer Networks 108, 97-107, 2016
242016
Intrusion process modeling for security quantification
J Almasizadeh, MA Azgomi
2009 International Conference on Availability, Reliability and Security, 114-121, 2009
242009
A game-theoretic approach to model and quantify the security of cyber-physical systems
H Orojloo, MA Azgomi
Computers in Industry 88, 44-57, 2017
222017
A hesitant fuzzy model of computational trust considering hesitancy, vagueness and uncertainty
M Ashtiani, MA Azgomi
Applied Soft Computing 42, 18-37, 2016
212016
A method for modeling and evaluation of the security of cyber-physical systems
H Orojloo, MA Azgomi
2014 11th International ISC Conference on Information Security and …, 2014
212014
A game theoretic framework for evaluation of the impacts of hackers diversity on security measures
BZ Moayedi, MA Azgomi
Reliability Engineering & System Safety 99, 45-54, 2012
202012
The system can't perform the operation now. Try again later.
Articles 1–20