Journal Papers

[1] Mojtaba Mostafavi, Peyman Kabiri, “Detection of Repetitive and Irregular Hypercall Attacks from Guest Virtual Machines to XEN Hypervisor”, Iran Journal of Computer Science, Vol. 1, No. 2, pp. 89-97, Springer, January 2018, (DOI: 10.1007/s42044-018-0006-5).

[2] Seyyed Ali Hoseini, Peyman Kabiri, “Camera pose estimation in unknown environments using a sequence of wide-baseline monocular images”, Journal of AI and Data Mining, Vol. 6, No. 1, pp. 93-103, Winter and Spring 2018. (ISC)

[3] Sirous KourkiNejat, Peyman Kabiri, “An Adaptive and Cost-based Intrusion Response System”, Cybernetics and Systems: An International Journal, Vol. 48, No. 6-7, pp. 495-509, 8-December-2017 (DOI: 10.1080/01969722.2017.1319693). (ISI IF for 2016 = 1.434)

[4] Mehdi Hosseinzadeh Aghdam, Morteza Analoui, Peyman Kabiri, “Collaborative filtering using nonnegative matrix factorization”, Journal of Information Science (JIS), Vol. 43, No. 4, pp. 567-579, 1-Aug-2017. (DOI: 10.1177/0165551516654354). (ISI IF for 2016 = 1.372)

[5] Mohsen Moshki, Peyman Kabiri, Alireza Mohebol-Hojeh, “Scalable Data-Driven Modelling of SpatioTemporal Systems: Weather Forecasting”, Intelligent Data Analysis – An International Journal, Vol. 21, No. 3, pp. 577-595, 29 June 2017, (DOI: 10.3233/IDA-150494). (ISI IF for 2016 = 0.772)

[6] Sanaz Farajzadeh, Peyman Kabiri, “Trust Based Secure Route Detection for MANETs”, Journal of Productivity and Development, Vol. 3, No. 1, pp. 13-25, 2017.

[7] Hamid Ghaderi, Peyman Kabiri, “Automobile engine condition monitoring using sound emission”, Turkish Journal of Electrical Engineering & Computer Sciences, Vol. 25, No. 3, pp. 1807-1826, 2017, (DOI: 10.3906/elk-1605-77). (ISI IF for 2016 = 0.578)

[8] Mehdi Hosseinzadeh Aghdam, Morteza AnaLoui, Peyman Kabiri, “Modelling Trust Networks using Resistive Circuits for Trust-aware Recommender Systems”, Journal of Information Science (JIS), Vol. 43, No. 1, pp. 135-144, 1- February-2017, (DOI: 10.1177/0165551516628733). (ISI IF for 2015 = 0.878)

[9] Keyvan RahimiZadeh, Morteza AnaLoui, Peyman Kabiri, Bahman Javadi, “Workload-Aware Placement of Multi-Tier Applications in Virtualized Datacenters”, The Computer Journal, Section B: Computer and Communications Networks and Systems, Vol. 60 No. 2, pp. 210-239, February 2017, (DOI: 10.1093/comjnl/bxw097). (ISI IF for 2015 = 1.000)

[10] Keyvan RahimiZadeh, Morteza Analoui and Peyman Kabiri, “Multi-Layered Applications Placement in Virtualised Datacentre”, Journal of Soft Computing and Information Technology (JSCIT), pp. 1-15, Vol. 5, No. 3, Fall-2016. (ISC)

The above paper in Persian:

[10] کیوان رحیمی زاده، مرتضی آنالویی، پیمان کبیری، “مکان یابی کاربردهای چند لایه ای در بستر مرکز داده مجازی شده”، مجله علمی پژوهشی رایانش نرم و فناوری اطلاعات، شماره صفحات 1 تا 15، جلد 5، شماره 3، پاییز سال 1395.

[11]     Mehdi Hosseinzadeh Aghdam, Peyman Kabiri, “Feature Selection for Intrusion Detection System using Ant Colony Optimization”, International Journal of Network Security, Vol. 18, No. 3, pp. 420-432, May 2016.

[12]     Ali Ahmadvand, Peyman Kabiri, “Multispectral MRI Image Segmentation Using Markov Random Field Model”, Signal, Image and Video Processing, Springer London, Vol. 10, Issue 2, pp. 251-258, February 2016, (DOI: 10.1007/s11760-014-0734-4). (ISI IF for 2015 = 0.872)

[13]     Keyvan RahimiZadeh, Reza Nasiri Gerde, Morteza AnaLoui, Peyman Kabiri, “Performance Evaluation of Web Server Workloads in Xen-based Virtualized Computer System: Analytical Modeling and Experimental Validation”, Concurrency and Computation: Practice and Experience, John Wiley & Sons, Vol. 27, Issue 17, pp. 4741-4762, 26-January-2015, (DOI: 10.1002/cpe.3454). (ISI IF for 2015 = 0.942)

[14]     Keyvan RahimiZadeh, Morteza Analoui, Peyman Kabiri, Bahman Javadi, “Performance modeling and analysis of virtualized multi-tier applications under dynamic workloads”, Journal of Network and Computer Applications, Elsevier, Vol. 56, pp. 166-187, 21-July-2015, (DOI:10.1016/j.jnca.2015.06.020). (ISI IF for 2015 = 2.331)

[15] Mobarakeh Moosavirad, Peyman Kabiri and Hamidreza Mahini, “Rashnu: A Wi-Fi Intrusion Response Scheme”, Security and Communication Networks, John Wiley & Sons, Vol. 8, Issue 12, pp. 2070-2078, 14-July-2015, (DOI: 10.1002/sec.1153). (ISI IF for 2015 = 0.806)

[16] Mehdi Hosseinzadeh Aghdam, Morteza AnaLoui and Peyman Kabiri, “A Novel Non-negative Matrix Factorization Method for Recommender Systems”, Applied Mathematics & Information Sciences, Natural Sciences Publishing (NSP), Vol. 9, No. 5, pp. 2721-2732, September 2015, (DOI: http://dx.doi.org/10.12785/amis/090558) (ISI IF for 2013 = 0.731)

[17] Mohsen Moshki, Peyman Kabiri, Alireza Mohebol-Hojeh, “Scalable Feature Selection in High Dimensional Data Based on GRASP”, Applied Artificial Intelligence, Taylor & Francis, Vol. 29, Issue 3, pp. 283-296, 1-April-2015, (DOI:10.1080/08839514.2015.1004616). (ISI IF for 2015 = 0.540)

[18] Rasoul Masoudi, Peyman Kabiri, “New intensity-hue-saturation pan-sharpening method based on texture analysis and genetic algorithm-adaption”, Journal of Applied Remote Sensing, SPIE, Vol. 8, Issue.1, pp.1-14, 083640 (May 01, 2014); (DOI: 10.1117/1.JRS.8.083640). (ISI IF for 2014 = 1.183)

[19] Mohsen Moshki, Peyman Kabiri, Alireza Mohebol-Hojeh, “Feasibility of Very Short time Weather Prediction Using Genetic Algorithm based on data from Iranian Synoptic Stations”, International Journal of Signal and Data Processing, Vol. 10, Issue 20, No. 2, pp. 3-20, April 2014. (in Persian)

[19] محسن مشکی، پیمان کبیری، عليرضا محب الحجه، “امکان‌سنجي پيش‌بيني خیلی کوتاه مدت وضع هوا به کمک الگوریتم ژنتیک بر پايه داده‌هاي ايستگاه‌هاي همدیدی ایران”، مجله (دو فصل نامه علمی-پژوهشی) پردازش علائم و داده¬ها، دوره 10، شماره 2، صفحات 3-20، 19/1/1393.

[20] Keyvan RahimiZadeh, Peyman Kabiri, “Trust-based routing method using a mobility-based clustering approach in mobile ad hoc networks”, Security and Communication Networks, John Wiley & Sons, Vol. 7, Issue 11, pp. 1746–1763, November 2014, DOI: 10.1002/sec.872. (ISI IF for 2014 = 0.72)

[21] S. Mobarakeh Moosavirad, Peyman Kabiri, Hamidreza Mahini, “RSSAT: A Wireless Intrusion Detection System Based on Received Signal Strength Acceptance Test”, Journal of Advances in Computer Research, Vol. 4, No. 1, pp. 65-80, February 2013.

[22] Ali Salimi, Peyman Kabiri, “Avoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots”, Journal of Advances in Computer Research, Vol. 3, No. 1, pp. 65-79, February 2012.

[23] Peyman Kabiri, Mehran Aghaei, “Feature Analysis for Intrusion Detection in Mobile Ad-hoc Networks”, International Journal of Network Security, Vol. 12, No. 1, pp. 42–49, January 2011.

[24] Gholam Reza Zargar, Peyman Kabiri, “Identification of Effective Optimal Network Feature Set for Probing Attack Detection Using PCA Method”, International Journal of Web Application (IJWA), Vol. 2, No. 3, pp. 164-174, Digital Information Research Foundation, September 2010.

[25] Gholam Reza Zargar, Peyman Kabiri, “Category-Based Selection of Effective Parameters for Intrusion Detection”, International Journal of Computer Science and Network Security, Vol. 9, No. 9, September 2009.

[26] Peyman Kabiri, Ali Ghorbani, “A Rule-Based Temporal Alert Correlation System”, International Journal of Network Security, Vol. 5, No. 1, pp. 66-72, July 2007.

[27] Peyman Kabiri, Ali Ghorbani, “Research on Intrusion Detection and Response: A Survey”, International Journal of Network Security, Vol. 1, No. 2, pp. 84-102, 2005.

Books

Peyman Kabiri

Privacy, Intrusion Detection and Response: Technologies for Protecting Networks

“Premier Reference Source” series

Publisher: IGI-Global, 701 E. Chocolate Ave., Hershey, PA 17033, USA

Release Date: October, 2011

DOI: 10.4018/978-1-60960-836-1

ISBN13: 9781609608361

ISBN10: 1609608364

EISBN13: 9781609608378

Conference Papers

[1] Ali Mokhtari, Peyman Kabiri, “A Novel Seven-valued Buffer”, 3rd National Conference on technology in Electrical and Computer Engineering, Semnan, 16 May, Iran, 2018.

[2] Marzieh Kianinejad, Peyman Kabiri, “A strategy for trust propagation along the more trusted paths”, The 3rd Conference on Swarm Intelligence and Evolutionary Computation (CSIEC2018), Bam, Iran, 6-8 March 2018.

[3] Seyyed Ali Hoseini, Peyman Kabiri, “A Feature-based Approach for Monocular Camera Tracking in Unknown Environments”, 3rd International Conference on Pattern Recognition and Image Analysis (IPRIA 2017), Shahrekord, Iran, 19-20 April, 2017

[4] Mohammad Sadeghi, Peyman Kabiri, “Securing Internet Service Provider Privacy during Attacker Tracking over the Internet”(Contribution 537- Q4/17), ITU-T Study Group 17 meeting on Security, Geneva, Switzerland, 14 March 2016.

[5] Mohsen Falahi DaryaKenari, Peyman Kabiri, Seyyed Ali Hoseini, “Determining Depth of Surfaces and Disparity Map Extraction in Aerial Imagery Using Stereovision”, The 1st National Conference on Geospatial Information Technology, Tehran, Iran, 19-20 January 2016. (in Persian)

The above paper in Persian:

[5] محسن فلاحی دریاکناری ، پیمان کبیری، سید علی حسینی، “تعیین عمق سطوح و استخراج نقشه اختلاف سطح در تصاویر هوایی با استفاده از بینایی دوگانه”، اولین کنفرانس مهندسی فناوری اطلاعات مکانی، تهران، ایران، 29 و 30 دی ماه 1394.

[6] Keyvan RahimiZadeh, Morteza Analoui and Peyman Kabiri, “A Performance Model for Evaluation of a Virtualized Computer System”, 5th Conference on Information and Knowledge Technology (IKT2013), Shiraz, Iran, May 22-24 2013.

[7] Mehdi Hosseinzadeh Aghdam, Morteza Analoui and Peyman Kabiri, “Application of Nonnegative Matrix Factorization in Recommender Systems”, 6th International Symposium on Telecommunications (IST’2012), Tehran, Iran, 6-8 November 2012.

[8] Hamid Ghaderi, Peyman Kabiri, “Fourier Transform and Correlation-based Feature Selection for Fault Detection of Automobile Engines”, 16th International Symposium on Artificial Intelligence and Signal Processing (AISP2012), Shiraz, Iran, 2-3 May 2012.

[9] Yaser Ghanbari, Peyman Kabiri, “Improving Intrusion Detection Systems with Hierarchical Architecture Using an Interlayer Messaging System”, ITU-T Study Group 17 meeting on Security, Geneva, Switzerland, 28 February 2012

[10] Ali Salimi, Peyman Kabiri, “A New Architecture for the Trust, Response to Intrusion Attempts and Redirecting the Intruders to Honeypots”, ITU-T Study Group 17 meeting on Security, Geneva, Switzerland, 28 February 2012.

[11] Jalil Ghavidel Neycharan, Morteza Analoui, Peyman Kabiri, “A New Method to Make Ensemble of Classifiers By Applying Noise on the Training Dataset”, Proceedings of 1st Specialised Conference on Intelligent Computer Systems and their Applications, University of PayamNoor – Tehran Province – Technical and Engineering Complex, 20 December 2011. (in Persian)

[11] جلیل قویدل، مرتضی آنالویی، پیمان کبیری، “روشی نوین برای ایجاد مجمع رده بندها با اعمال نویز روی مجموعه داده های آموزشی”، مجموعه مقالات اولين همايش تخصصی سيستمهای هوشمند کامپيوتری و کاربردهای آنها، دانشگاه پيام نور استان تهران- مجتمع فنی و مهندسی (30 آذرماه1390).

[12] Hamid Ghaderi, Peyman Kabiri, “PCA and Wavelet Transform for Automobile Fault Detection and Condition Monitoring”, 1st International Conference on Acoustics and Vibration (ISAV2011), Tehran, Iran, 21-22 December 2011. (in Persian)
The above paper in Persian:

[12] حمید قادری، پیمان کبیری، “تحلیل مولفۀ اصلی و تبدیل موجک برای پایش وضعیت و تشخیص خطای موتور خودرو”، اولین کنفرانس بین المللی آکوستیک و ارتعاشات (ISAV2011)، تهران، ایران، 30 آذر و 1 دی ماه 1390.

[13] Monireh Naderi, Peyman Kabiri, “Retrieval of the Similar Music Using Similarity in the Features”, 1st International Conference on Acoustics and Vibration (ISAV2011), Tehran, Iran, 21-22 December 2011. (in Persian)
The above paper in Persian:

[13] منیره نادری، پیمان کبیری، “شناسایی موسیقی های مشابه با استفاده از تشابه ویژگی ها”، اولین کنفرانس بین المللی آکوستیک و ارتعاشات (ISAV2011)، تهران، ایران، 30 آذر و 1 دی ماه 1390.

[14] Mehdi Hosseinzadeh Aghdam, Morteza Analoui, Peyman Kabiri, Mohammad Anisi, “Trust Modelling Using Dirichlet Multinomial distribution”, First CSUT Conference on Computer, Communication and Information Technologies (CSCCIT2011), Tabriz, Iran, 16-17 November 2011. (in Persian)
The above paper in Persian:

[14] مهدي حسین زاده اقدم، مرتضی آنالویی، پیمان کبیری، محمد انیسی، “مدلسازی اعتماد با استفاده از توزیع چند جزئی دیریکله”، اولین کنفرانس ملی دانش پژوهان کامپیوتر و فناوری اطلاعات (CSCCIT)، تبریز، ایران، 25 و 26 آبان 1390.

[15] Peyman Kabiri, Mohammad H. Pandi, Sirous Kourki nejat, Hamid Ghaderi, “NDVI Optimization Using Genetic Algorithm”, The 7th Iranian Conference on Machine Vision and Image Processing (MVIP 2011), Tehran, Iran, 15 to 17-Nov-2011.

[16] Peyman Kabiri, Hamid Ghaderi, Sirous Kourki nejat, “Optimizing Cloud Detection Index for MODIS Imagery Using Genetic Algorithm”, The 7th Iranian Conference on Machine Vision and Image Processing (MVIP 2011), Tehran, Iran, 15 to 17-Nov-2011.

[17] Hamid Ghaderi, Peyman Kabiri, “Automobile Independent Fault Detection based on Acoustic Emission Using FFT”, Singapore International NDT Conference & Exhibition (SINCE2011), Singapore, 3-4 November 2011.

[18] Hamid Ghaderi, Peyman Kabiri, “Automobile Independent Fault Detection based on Acoustic Emission Using Wavelet”, Singapore International NDT Conference & Exhibition (SINCE2011), Singapore, 3-4 November 2011.

[19] Peyman Kabiri, Alireza Amiraghdam, “3D Image Extraction of the Ground From Arial Images Using Binary Differential Comparison Algorithm”, 10th Conference of the Iranian Aerospace Society (AERO2011), Tehran, Iran, March 2011. (in Persian)

The above paper in Persian:

[19] پیمان کبیری، علیرضا امیراقدم، “استخراج شکل سه بعدی زمین از تصاویر هوایی با استفاده از الگوریتم مقایسه تفریق باینری”، دهمین کنفرانس انجمن هوافضای ایران (AERO2011)، تهران، ایران، اسفندماه 1389.

[20] Peyman Kabiri, Amir Makinezhad, “Using PCA in Acoustic Emission Condition Monitoring to Detect Faults in an Automobile Engine”, 29th European Conference on Acoustic Emission Testing (EWGAE2010), Austria, September 2010.

[21] Gholam Reza Zargar, Peyman Kabiri, “Selecting Effective Parameters for Detecting Neptune Attack in Computer Networks”, 15th National Conference of Iranian Computer Society, Tehran, Iran, 2010. (in Persian)

The above paper in Persian:

[21] پيمان کبيری، غلامرضا زرگر، ”انتخاب پارامترهای موثر در تشخیص حمله Neptune در شبکه های کامپیوتری“، پانزدهمين کنفرانس انجمن کامپيوتر ايران، تهران، ایران، اسفندماه 1388.

[22] Gholam Reza Zargar, Peyman Kabiri, “Selecting Effective Parameters for Detecting Denial Of Service Attacks in Computer Networks”, 15th National Conference of Iranian Computer Society, Tehran, Iran, 2010. (in Persian)

The above paper in Persian:

[22] پيمان کبيری، غلامرضا زرگر، ”انتخاب پارامترهای موثر در تشخیص حملات ممانعت از سرویس در شبکه های کامپیوتری“، پانزدهمين کنفرانس انجمن کامپيوتر ايران، تهران، ایران، اسفندماه 1388.

[23] Gholam Reza Zargar, Peyman Kabiri, “Identification of Effective Network Features to Detect Smurf Attacks”, Proceedings of 2009 IEEE Student Conference on Research and Development (SCOReD 2009), pp. 49-52, Malaysia, 2009.

[24] Peyman Kabiri, Gholam Reza Zargar, “Identification of Effective Network Features for Probing Attack Detection”, First International Conference on Networked Digital Technologies (NDT 2009), VSB-Technical University of Ostrava, Czech Republic, pp. 405-410, July 29-31, 2009.

[25] Peyman Kabiri, Farhoosh Alghabi, “Generation of Gridded Data for 2D Proportional Keen Approximator Using Radial Basis Functions”, Second International Symposium on Intelligent Information Technology Application (IITA2008), Vol. 3, pp. 480-485, IEEE, Shanghai, China, December, 2008.

[26] Farhoosh Alghabi, Peyman Kabiri, “A Novel Approach for Speeding Up RBF-Based Interpolation Methods”, Second International Symposium on Intelligent Information Technology Application (IITA2008), Vol. 3, pp.8-13, IEEE, Shanghai, China, December, 2008.

[27] Peyman Kabiri, Hamed Shahbazi, Mohsen Soryani, “Statistical Shape based Multispectral Image Retrieval Extracting Power Spectrum Vectors”, Third IEEE International Conference on Digital Information Management (ICDIM 2008), pp. 650-655, London, UK, November 13-16 2008.

[28] Mohsen Soryani, Peyman Kabiri, Hamed Shahbazi, “Content Based Multispectral Image Retrieval Using Principal Component Analysis”, ACM International Conference on Image and Video Retrieval (CIVR2008), pp. 205-210, ACM, Niagara Falls, Canada, July 2008.

[29] Peyman Kabiri, Mohsen Soryani, Hamed Shahbazi, “Content Based Multispectral Image Retrieval Using Independent Component Analysis”, The 2008 International Congress on Image and Signal Processing (CISP08), Vol.2, pp.485-489, Sanya, China, May 2008.

[30] Peyman Kabiri, Mohsen Soryani, Hamed Shahbazi, “Multi-Spectral Image Classification Using Fuzzy Association Rules”, 13th National Conference of Iranian Computer Society, Kish Island, Iran, March 2008. (in Persian)

The above paper in Persian:

[30] پيمان کبيری، محسن سريانی و حامد شهبازی، ”طبقه بندی تصاوير چند طيفی با استفاده از قواعد تداعی فازی“، سيزدهمين کنفرانس انجمن کامپيوتر ايران، جزیره کیش، ایران، اسفندماه 1386.

[31] Kushan Ahmadian, Abbas Golestani, Nasser Mozayani, and Peyman Kabiri, “A New Multi-Objective Evolutionary Approach for Creating Ensemble of Classifiers”, Proceedings of 2007 IEEE International Conference on Systems, Man and Cybernetics, pp. 1031-1036, Montreal, Canada, October 2007.

[32] Kabiri, Peyman; Ghorbani, Ali, “Dimension Reduction and Alert Correlation for Intrusion Detection”, Expo’05, University of New Brunswick, Fredericton, Canada, 28th June 2005.

[33] Analoui, Morteza; Mirzaei, Abdolreza; Kabiri, Peyman, “Intrusion Detection Using Multivariate Analysis of Variance Algorithm”, Third IEEE International Conference on Systems, Signals & Devices (SSD’05), Vol. 3, Sousse, Tunisia, March 21-24, 2005.

[34] Kabiri, Peyman, “A Comparison between the Proportional Keen Approximator and the Neural Networks Learning Methods”, 6th International Conference on Enterprise Information Systems, Vol.¬2, pp. 159-164, Porto, Portugal, April 14-17, 2004.

[35] Kabiri, Peyman, “A New Machine Learning Methodology: Implementing Linear Approximation”, 6th Annual CSI Computer Conference (CSICC’2001), pp. 93-102, 20-22 Isfehan, Iran, February 2001.

[36] Kabiri, Peyman, “Using Black Box and Machine Learning Approach in Controlling a Machine”, 2002 IEEE International Conference on Systems, Man and Cybernetics, Vol. 7, 02CH37349C-4, Hammamet, Tunisia, October, 2002.

[37] Kabiri, Peyman; Sherkat, Nasser and Shih, Chi-Hsien V, “Compensating for Robot Arm Positioning Inaccuracy in 3D-Space”, SPIE’s International Symposium on Intelligent Systems in Design and Manufacturing II, B. Gopalakrishnan, San Murugesan, Editors, Proceedings of SPIE Vol. 3833-16, pp. 100-108, Boston, USA, SEP. 1999.

[38] Kabiri, Peyman; Sherkat, Nasser and Shih, Chi-Hsien V, “Compensation for Robot Arm Flexibility Using Machine Intelligence”, SPIE’s International Symposium on Intelligent Systems in Design and Manufacturing, Vol. 3517, pp. 139-148, Boston, USA, 1998.

[39] Kabiri, Peyman; Sherkat, Nasser and Shih, Victor, “Using Machine Learning Methods to Simulate Non-deterministic Parameters for a Robot Arm”, Simulation in Industry, 10th European Simulation Symposium (ESS98) and Exhibition, pp. 746-750, Nottingham, UK, 1998.

[40] Kabiri, Peyman; Sherkat, Nasser and Shih, Chi-Hsien V, “Adaptive Error Compensation Using A Novel Machine Learning Method”, The 3rd International Conference on Systems Science and Systems Engineering (ICSSSE’98), pp. 340-345, Beijing, China, 1998.

[41] Sherkat, Nasser, Shih, Victor and Kabiri, Peyman. “A Neural Fuzzy Approach to Backlash and Low Stiffness Compensation of Robot Joints”, International Conference of Information Sciences, Duke University, USA, Vol. 1, 1997.

Book Chapters

[1] Peyman Kabiri, Ali Ghorbani, “Dimension Reduction and its Effects on Clustering for Intrusion Detection”, Privacy, Intrusion Detection and Response: Technologies for Protecting Networks, Editor: Peyman Kabiri, pp. 168-190, IGI Global, USA, October 2011, DOI: 10.4018/978-1-60960-836-1.ch007.

[2] Mohsen Moshki, Mehran Garmehi, Peyman Kabiri, “Applying Weighted PCA on Multiclass Classification for Intrusion Detection”, Privacy, Intrusion Detection and Response: Technologies for Protecting Networks, Editor: Peyman Kabiri, pp. 218-238, IGI Global, USA, October 2011, DOI: 10.4018/978-1-60960-836-1.ch009.

[3] Gholam Reza Zargar, Peyman Kabiri, “Selection of Effective Network Parameters in Attacks for Intrusion Detection”, Advances in Data Mining: Application and Theoretical Aspects, Proceedings of 10th Industrial Conference on Data Mining ICDM´2010, Lecture Notes in Computer Science (LNCS) (Book Chapter), Editor: Petra Perner, Vol. 6171, pp. 643-653, Springer, Germany, July 2010, DOI: 10.1007/978-3-642-14400-4_50.

Accepted Papers

[1]

The above paper in Persian:

[1]