Volgen
Behrouz Tork Ladani
Behrouz Tork Ladani
Professor of software engineering at Faculty of Computer Engineering, University of Isfahan
Geverifieerd e-mailadres voor eng.ui.ac.ir - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
An auction method for resource allocation in computational grids
H Izakian, A Abraham, BT Ladani
Future Generation Computer Systems 26 (2), 228-235, 2010
1412010
A discrete particle swarm optimization approach for grid job scheduling
H Izakian, BT Ladani, A Abraham, V Snasel
International Journal of Innovative Computing, Information and Control 6 (9 …, 2010
1302010
A novel particle swarm optimization approach for grid job scheduling
H Izakian, B Tork Ladani, K Zamanifar, A Abraham
International Conference on Information Systems, Technology and Management …, 2009
1022009
Multi-font Farsi/Arabic isolated character recognition using chain codes
H Izakian, SA Monadjemi, BT Ladani, K Zamanifar
World Academy of Science, Engineering and Technology 43 (7), 67-70, 2008
472008
An evolutionary game model for analysis of rumor propagation and control in social networks
M Askarizadeh, BT Ladani, MH Manshaei
Physica A: statistical mechanics and its applications 523, 21-39, 2019
422019
The impact of group propagation on rumor spreading in mobile social networks
E Sahafizadeh, BT Ladani
Physica A: Statistical Mechanics and its Applications 506, 412-423, 2018
372018
Passive testing–a constrained invariant checking approach
BT Ladani, B Alcalde, A Cavalli
IFIP International Conference on Testing of Communicating Systems, 9-22, 2005
302005
A continuous double auction method for resource allocation in computational grids
H Izakian, BT Ladani, K Zamanifar, A Abraham, V Snasel
2009 IEEE Symposium on Computational Intelligence in Scheduling, 29-35, 2009
292009
Interdependency analysis in security investment against strategic attacks
M Ezhei, B Tork Ladani
Information Systems Frontiers 22 (1), 187-201, 2020
272020
Benchmarking reputation systems: A quantitative verification approach
AJ Bidgoly, BT Ladani
Computers in Human Behavior 57, 274-291, 2016
272016
Information sharing vs. privacy: A game theoretic analysis
M Ezhei, BT Ladani
Expert Systems with Applications 88, 327-337, 2017
242017
Anonymity and security for autonomous mobile agents
F Raji, BT Ladani
IET information security 4 (4), 397-410, 2010
222010
VAnDroid: A framework for vulnerability analysis of Android applications using a model‐driven reverse engineering technique
A Nirumand, B Zamani, B Tork Ladani
Software: Practice and Experience 49 (1), 70-99, 2019
212019
Trust modeling and verification using colored petri nets
AJ Bidgoly, BT Ladani
2011 8th International ISC Conference on Information Security and Cryptology …, 2011
212011
A collaborative filtering recommender system based on user's time pattern activity
P Adibi, BT Ladani
The 5th Conference on Information and Knowledge Technology, 252-257, 2013
192013
Modeling and quantitative verification of trust systems against malicious attackers
AJ Bidgoly, BT Ladani
The Computer Journal 59 (7), 1005-1027, 2016
172016
Quantitative verification of beta reputation system using PRISM probabilistic model checker
AJ Bidgoly, BT Ladani
2013 10th International ISC Conference on Information Security and …, 2013
162013
MEGDroid: A model-driven event generation framework for dynamic android malware analysis
H Hasan, BT Ladani, B Zamani
Information and Software Technology 135, 106569, 2021
142021
Modelling and quantitative verification of reputation systems against malicious attackers
AJ Bidgoly, BT Ladani
The Computer Journal 58 (10), 2567-2582, 2015
142015
Traffic analysis for WiMAX network under DDoS attack
M Shojaee, N Movahhedinia, BT Ladani
2010 Second Pacific-Asia Conference on Circuits, Communications and System 1 …, 2010
132010
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20