A survey on web penetration test M Mirjalili, A Nowroozi, M Alidoosti Advances in Computer Science: an International Journal 3 (6), 107-121, 2014 | 43 | 2014 |
A general computational recognition primed decision model with multi-agent rescue simulation benchmark A Nowroozi, ME Shiri, A Aslanian, C Lucas Information Sciences 187, 52-71, 2012 | 34 | 2012 |
A Survey of Anomaly Detection Approaches in Internet of Things M Behniafar, A Nowroozi, HR Shahriari ISeCure 10 (2), 79-92, 2018 | 27 | 2018 |
A novel sophisticated hybrid method for intrusion detection using the artificial immune system E Farzadnia, H Shirazi, A Nowroozi Journal of Information Security and Applications 58, 102721, 2021 | 22 | 2021 |
XABA: A zero-knowledge anomaly-based behavioral analysis method to detect insider threats A Zargar, A Nowroozi, R Jalili 2016 13th International Iranian society of cryptology conference on …, 2016 | 21 | 2016 |
A crisis situations decision-making systems software development process with rescue experiences A Nowroozi, P Teymoori, T Ramezanifarkhani, MR Besharati, M Izadi IEEE Access 8, 59599-59617, 2020 | 17 | 2020 |
A new intrusion detection system using the improved dendritic cell algorithm E Farzadnia, H Shirazi, A Nowroozi The Computer Journal 64 (8), 1193-1214, 2021 | 13 | 2021 |
Evaluating the web‐application resiliency to business‐layer DoS attacks M Alidoosti, A Nowroozi, A Nickabadi ETRI Journal, 2019 | 10 | 2019 |
BLProM: A black-box approach for detecting business-layer processes in the web applications M Alidoosti, A Nowroozi, A Nickabadi Journal of Computing and Security 6 (2), 65-80, 2019 | 4 | 2019 |
BLProM: Business-Layer Process Miner of the Web Application. M Alidoosti, A Nowroozi ISCISC, 1-6, 2018 | 4 | 2018 |
Semantic web Racer: Dynamic security testing of the web application against race condition in the business layer M Alidoosti, A Nowroozi, A Nickabadi Expert Systems with Applications 195, 116569, 2022 | 3 | 2022 |
Behavior and system based backdoor detection focusing on CMD phase Y FarzaneNia, A Nowroozi 2015 12th International Iranian Society of Cryptology Conference on …, 2015 | 3 | 2015 |
Corrigendum to ‘A novel sophisticated hybrid method for intrusion detection using the artificial immune system’: Journal of Information Security and Applications Volume 58, May … E Farzadnia, H Shirazi, A Nowroozi Journal of Information Security and Applications 70, 103349, 2022 | 2 | 2022 |
Business-Layer Session Puzzling Racer: Dynamic Security Testing Against Session Puzzling Race Conditions in Business Layer. M Alidoosti, A Nowroozi, A Nickabadi ISeCure 14 (1), 2022 | 2 | 2022 |
IAVS: Intelligent Active Network Vulnerability Scanner MH Bazrafkan, A Nowroozi, T Ramezanifarkhani, P Teymoori Norsk IKT-konferanse for forskning og utdanning, 2020 | 1 | 2020 |
Assessing of Web Application Resiliency against Flooding DoS Attacks in the Business Layer M Alidoosti, A Nowroozi, A Nickabadi TABRIZ JOURNAL OF ELECTRICAL ENGINEERING 49 (4), 1757-1767, 2019 | 1 | 2019 |
A Novel Template-Based Learning Model M Abolghasemi-Dahaghani, F Didehvar, A Nowroozi arXiv preprint arXiv:1101.5039, 2011 | 1 | 2011 |
Business-layer client-side racer: dynamic security testing of the web application against client-side race condition in the business layer M Alidoosti, A Nowroozi, A Nickabadi International Journal of Information Security 22 (4), 1029-1054, 2023 | | 2023 |
Anomaly Detection Fog (ADF): A federated approach for internet of things M Behniafar, A Mahjur, A Nowroozi Scientia Iranica 30 (2), 465-476, 2023 | | 2023 |
Corrigendum to ‘A novel sophisticated hybrid method for intrusion detection using the artificial immune system’ E Farzadnia, H Shirazi, A Nowroozi | | 2022 |