Follow
Raouf Khayami
Title
Cited by
Cited by
Year
A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks
HH Pajouh, R Javidan, R Khayami, A Dehghantanha, KKR Choo
IEEE Transactions on Emerging Topics in Computing 7 (2), 314-323, 2016
5062016
A deep recurrent neural network based approach for internet of things malware threat hunting
H HaddadPajouh, A Dehghantanha, R Khayami, KKR Choo
Future Generation Computer Systems 85, 88-96, 2018
4412018
Know abnormal, find evil: frequent pattern mining for ransomware threat hunting and intelligence
S Homayoun, A Dehghantanha, M Ahmadzadeh, S Hashemi, R Khayami
IEEE transactions on emerging topics in computing 8 (2), 341-351, 2017
2032017
An efficient Swarm-Intelligence approach for task scheduling in cloud-based internet of things applications
HR Boveiri, R Khayami, M Elhoseny, M Gunasekaran
Journal of Ambient Intelligence and Humanized Computing 10, 3469-3479, 2019
1522019
DRTHIS: Deep ransomware threat hunting and intelligence system at the fog layer
S Homayoun, A Dehghantanha, M Ahmadzadeh, S Hashemi, R Khayami, ...
Future Generation Computer Systems 90, 94-104, 2019
1452019
Medical image registration using deep neural networks: a comprehensive review
HR Boveiri, R Khayami, R Javidan, A Mehdizadeh
Computers & Electrical Engineering 87, 106767, 2020
1272020
A novel end‐to‐end deep learning scheme for classifying multi‐class motor imagery electroencephalography signals
A Hassanpour, M Moradikia, H Adeli, SR Khayami, P Shamsinejadbabaki
Expert Systems 36 (6), e12494, 2019
1142019
BoTShark: A deep learning approach for botnet traffic detection
S Homayoun, M Ahmadzadeh, S Hashemi, A Dehghantanha, R Khayami
Cyber Threat Intelligence, 137-153, 2018
972018
Network traffic classification using machine learning techniques over software defined networks
MR Parsaei, MJ Sobouti, R Javidan
International Journal of Advanced Computer Science and Applications 8 (7), 2017
902017
AI4SAFE-IoT: An AI-powered secure architecture for edge layer of Internet of things
H HaddadPajouh, R Khayami, A Dehghantanha, KKR Choo, RM Parizi
Neural Computing and Applications 32 (20), 16119-16133, 2020
812020
Intelligent OS X malware threat detection with code inspection
HH Pajouh, A Dehghantanha, R Khayami, KKR Choo
Journal of Computer Virology and Hacking Techniques 14, 213-223, 2018
622018
Qualitative characteristics of enterprise architecture
R Khayami
Procedia Computer Science 3, 1277-1282, 2011
552011
Using COBIT and ITIL frameworks to establish the alignment of business and IT organizations as one of the critical success factors in ERP implementation
R Parvizi, F Oghbaei, SR Khayami
The 5th Conference on Information and Knowledge Technology, 274-278, 2013
422013
Medical image registration using unsupervised deep neural network: A scoping literature review
S Abbasi, M Tavakoli, HR Boveiri, MAM Shirazi, R Khayami, H Khorasani, ...
Biomedical Signal Processing and Control 73, 103444, 2022
252022
CYRUS 2D simulation team description paper 2014
R Khayami, N Zare, M Karimi, P Mahor, A Afshar, MS Najafi, M Asadi, ...
RoboCup 2014 Symposium and Competitions: Team description papers, 2014
202014
Preprocessing breast cancer data to improve the data quality, diagnosis procedure, and medical care services
Z Sajjadnia, R Khayami, MR Moosavi
Cancer Informatics 19, 1176935120917955, 2020
162020
Telesurgery QoS improvement over SDN based on a Type‐2 fuzzy system and enhanced cuckoo optimization algorithm
MR Parsaei, HR Boveiri, R Javidan, R Khayami
International Journal of Communication Systems 33 (11), e4426, 2020
132020
The analytical comparison of qualitative models of software systems
R Khayami, A Towhidi, K Ziarati
World Applied Sciences Journal 6 (1), 1-6, 2009
102009
An intelligent hybrid approach for task scheduling in cluster computing environments as an infrastructure for biomedical applications
HR Boveiri, R Javidan, R Khayami
Expert Systems 38 (1), e12536, 2021
92021
Intelligent os x malware threat detection with code inspection
H HaddadPajouh, A Dehghantanha, R Khayami, RKK Choo
Journal of Computer Virology and Hacking Techniques 14 (3), 2017
82017
The system can't perform the operation now. Try again later.
Articles 1–20