Follow
Raouf Khayami
Title
Cited by
Cited by
Year
A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in IoT backbone networks
HH Pajouh, R Javidan, R Khayami, A Dehghantanha, KKR Choo
IEEE Transactions on Emerging Topics in Computing 7 (2), 314-323, 2016
3722016
A deep recurrent neural network based approach for internet of things malware threat hunting
H HaddadPajouh, A Dehghantanha, R Khayami, KKR Choo
Future Generation Computer Systems 85, 88-96, 2018
3022018
Know abnormal, find evil: frequent pattern mining for ransomware threat hunting and intelligence
S Homayoun, A Dehghantanha, M Ahmadzadeh, S Hashemi, R Khayami
IEEE transactions on emerging topics in computing 8 (2), 341-351, 2017
1422017
An efficient Swarm-Intelligence approach for task scheduling in cloud-based internet of things applications
HR Boveiri, R Khayami, M Elhoseny, M Gunasekaran
Journal of Ambient Intelligence and Humanized Computing 10 (9), 3469-3479, 2019
1162019
DRTHIS: Deep ransomware threat hunting and intelligence system at the fog layer
S Homayoun, A Dehghantanha, M Ahmadzadeh, S Hashemi, R Khayami, ...
Future Generation Computer Systems 90, 94-104, 2019
972019
BoTShark: A deep learning approach for botnet traffic detection
S Homayoun, M Ahmadzadeh, S Hashemi, A Dehghantanha, R Khayami
Cyber Threat Intelligence, 137-153, 2018
692018
Medical image registration using deep neural networks: a comprehensive review
HR Boveiri, R Khayami, R Javidan, A Mehdizadeh
Computers & Electrical Engineering 87, 106767, 2020
602020
Network traffic classification using machine learning techniques over software defined networks
MR Parsaei, MJ Sobouti, R Javidan
International Journal of Advanced Computer Science and Applications 8 (7), 2017
582017
Intelligent OS X malware threat detection with code inspection
HH Pajouh, A Dehghantanha, R Khayami, KKR Choo
Journal of Computer Virology and Hacking Techniques 14 (3), 213-223, 2018
522018
Qualitative characteristics of enterprise architecture
R Khayami
Procedia Computer Science 3, 1277-1282, 2011
522011
AI4SAFE-IoT: An AI-powered secure architecture for edge layer of Internet of things
H HaddadPajouh, R Khayami, A Dehghantanha, KKR Choo, RM Parizi
Neural Computing and Applications 32 (20), 16119-16133, 2020
462020
A novel end‐to‐end deep learning scheme for classifying multi‐class motor imagery electroencephalography signals
A Hassanpour, M Moradikia, H Adeli, SR Khayami, P Shamsinejadbabaki
Expert Systems 36 (6), e12494, 2019
422019
Using COBIT and ITIL frameworks to establish the alignment of business and IT organizations as one of the critical success factors in ERP implementation
R Parvizi, F Oghbaei, SR Khayami
The 5th Conference on Information and Knowledge Technology, 274-278, 2013
362013
CYRUS 2D simulation team description paper 2014
R Khayami, N Zare, M Karimi, P Mahor, A Afshar, MS Najafi, M Asadi, ...
RoboCup 2014 Symposium and Competitions: Team description papers, 2014
152014
The analytical comparison of qualitative models of software systems
R Khayami, A Towhidi, K Ziarati
World Applied Sciences Journal 6 (1), 1-6, 2009
102009
Preprocessing breast cancer data to improve the data quality, diagnosis procedure, and medical care services
Z Sajjadnia, R Khayami, MR Moosavi
Cancer Informatics 19, 1176935120917955, 2020
92020
Intelligent OS X malware threat detection with code inspection
H HaddadPajouh, A Dehghantanha, R Khayami, RKK Choo
Journal of Computer Virology and Hacking Techniques 14 (3), 213-223, 2017
82017
Systematic literature review in the area of Enterprise architecture during past 10 years
Z Rasti, A Darajeh, R Khayami, H Sanatnama
2015 2nd International Conference on Knowledge-Based Engineering and …, 2015
82015
An intelligent hybrid approach for task scheduling in cluster computing environments as an infrastructure for biomedical applications
HR Boveiri, R Javidan, R Khayami
Expert Systems 38 (1), e12536, 2021
72021
Telesurgery QoS improvement over SDN based on a Type‐2 fuzzy system and enhanced cuckoo optimization algorithm
MR Parsaei, HR Boveiri, R Javidan, R Khayami
International Journal of Communication Systems 33 (11), e4426, 2020
72020
The system can't perform the operation now. Try again later.
Articles 1–20