Raouf Khayami
Title
Cited by
Cited by
Year
A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks
HH Pajouh, R Javidan, R Khayami, A Dehghantanha, KKR Choo
IEEE Transactions on Emerging Topics in Computing 7 (2), 314-323, 2016
2352016
A deep recurrent neural network based approach for internet of things malware threat hunting
H HaddadPajouh, A Dehghantanha, R Khayami, KKR Choo
Future Generation Computer Systems 85, 88-96, 2018
1762018
Know abnormal, find evil: frequent pattern mining for ransomware threat hunting and intelligence
S Homayoun, A Dehghantanha, M Ahmadzadeh, S Hashemi, R Khayami
IEEE transactions on emerging topics in computing 8 (2), 341-351, 2017
992017
An efficient Swarm-Intelligence approach for task scheduling in cloud-based internet of things applications
HR Boveiri, R Khayami, M Elhoseny, M Gunasekaran
Journal of Ambient Intelligence and Humanized Computing 10 (9), 3469-3479, 2019
842019
DRTHIS: Deep ransomware threat hunting and intelligence system at the fog layer
S Homayoun, A Dehghantanha, M Ahmadzadeh, S Hashemi, R Khayami, ...
Future Generation Computer Systems 90, 94-104, 2019
562019
Qualitative characteristics of enterprise architecture
R Khayami
Procedia Computer Science 3, 1277-1282, 2011
462011
BoTShark: A deep learning approach for botnet traffic detection
S Homayoun, M Ahmadzadeh, S Hashemi, A Dehghantanha, R Khayami
Cyber Threat Intelligence, 137-153, 2018
442018
Network traffic classification using machine learning techniques over software defined networks
MR Parsaei, MJ Sobouti, SR Khayami, R Javidan
International Journal of Advanced Computer Science and Applications 8 (7 …, 2017
362017
Using COBIT and ITIL frameworks to establish the alignment of business and IT organizations as one of the critical success factors in ERP implementation
R Parvizi, F Oghbaei, SR Khayami
The 5th Conference on Information and Knowledge Technology, 274-278, 2013
352013
Intelligent OS X malware threat detection with code inspection
HH Pajouh, A Dehghantanha, R Khayami, KKR Choo
Journal of Computer Virology and Hacking Techniques 14 (3), 213-223, 2018
342018
Medical image registration using deep neural networks: a comprehensive review
HR Boveiri, R Khayami, R Javidan, A Mehdizadeh
Computers & Electrical Engineering 87, 106767, 2020
132020
AI4SAFE-IoT: An AI-powered secure architecture for edge layer of Internet of things
H HaddadPajouh, R Khayami, A Dehghantanha, KKR Choo, RM Parizi
Neural Computing and Applications 32 (20), 16119-16133, 2020
112020
A novel end‐to‐end deep learning scheme for classifying multi‐class motor imagery electroencephalography signals
A Hassanpour, M Moradikia, H Adeli, SR Khayami, P Shamsinejadbabaki
Expert Systems 36 (6), e12494, 2019
102019
CYRUS 2D simulation team description paper 2014
R Khayami, N Zare, M Karimi, P Mahor, A Afshar, MS Najafi, M Asadi, ...
RoboCup 2014 Symposium and Competitions: Team description papers, 2014
102014
The analytical comparison of qualitative models of software systems
R Khayami, A Towhidi, K Ziarati
World Applied Sciences Journal 6 (1), 1-6, 2009
102009
Systematic literature review in the area of Enterprise architecture during past 10 years
Z Rasti, A Darajeh, R Khayami, H Sanatnama
2015 2nd International Conference on Knowledge-Based Engineering and …, 2015
92015
Intelligent OS X malware threat detection with code inspection
H HaddadPajouh, A Dehghantanha, R Khayami, RKK Choo
Journal of Computer Virology and Hacking Techniques 14 (3), 213-223, 2017
82017
Telesurgery QoS improvement over SDN based on a Type‐2 fuzzy system and enhanced cuckoo optimization algorithm
MR Parsaei, HR Boveiri, R Javidan, R Khayami
International Journal of Communication Systems 33 (11), e4426, 2020
62020
Static Homogeneous Multiprocessor Task Graph Scheduling Using Ant Colony Optimization.
HR Boveiri, R Khayami
TIIS 11 (6), 3046-3070, 2017
62017
Enterprise Architecture Analysis and Evaluation
SR Khayami
Shiraz University, 2009
6*2009
The system can't perform the operation now. Try again later.
Articles 1–20