A review of attacks and security approaches in open multi-agent systems S Bijani, D Robertson Artificial Intelligence Review 42, 607-636, 2014 | 88 | 2014 |
Multi-agent negotiation of virtual machine migration using the lightweight coordination calculus P Anderson, S Bijani, A Vichos Agent and Multi-Agent Systems. Technologies and Applications: 6th KES …, 2012 | 12 | 2012 |
Degan: Decentralized generative adversarial networks MH Faezi, S Bijani, A Dolati Neurocomputing 419, 335-343, 2021 | 10 | 2021 |
HIDMN: A host and network-based intrusion detection for mobile networks S Bijani, M Kazemitabar 2008 International Conference on Computer and Electrical Engineering, 204-208, 2008 | 8 | 2008 |
A Methodology for Mobile Network Security Risk Management M Seify, S Bijani 2009 Sixth International Conference on Information Technology: New …, 2009 | 7 | 2009 |
Probing attacks on multi-agent systems using electronic institutions S Bijani, D Robertson, D Aspinall Declarative Agent Languages and Technologies IX: 9th International Workshop …, 2012 | 5 | 2012 |
Secure information sharing in social agent interactions using information flow analysis S Bijani, D Robertson, D Aspinall Engineering Applications of Artificial Intelligence 70, 52-66, 2018 | 4 | 2018 |
A deterministic multiple key space scheme for wireless sensor networks via combinatorial designs I Qasemzadeh Kolagar, H Haj Seyyed Javadi, S Bijani Journal of Communication Engineering 6 (1), 53-70, 2017 | 4 | 2017 |
Intrusion detection in open peer-to-peer multi-agent systems S Bijani, D Robertson Managing the Dynamics of Networks and Services: 5th International Conference …, 2011 | 4 | 2011 |
Multi-agent Virtual Machine Management Using the Lightweight Coordination Calculus P Anderson, S Bijani, H Herry Transactions on Computational Collective Intelligence XII, 123-142, 2013 | 3 | 2013 |
Securing open multi-agent systems governed by electronic institutions S Bijani The University of Edinburgh, 2013 | 2 | 2013 |
Automated Multi-Step Web Application Attack Analysis Using Reinforcement Learning and Vulnerability Assessment Tools MS Hamidi, M Doostari, S Bijani | | 2023 |
Designing and implementing of a graph planner for intelligent selection of security controls: a case study of Islamic Republic of Iran Police NM Ahmadi, S Bijani INFORMATION AND COMMUNICATION TECHNOLOGY IN POLICING 2 (5001640), 79-89, 2021 | | 2021 |
A Framework for Automatic Security Verification of Android Apps S Bijani, A Imeni همايش ملي امنيت سامانه هاي هوشمند همراه, 2016 | | 2016 |
Secrecy Analysis of Interaction Models in Open Multi-Agent Systems S Bijani, D Robertson SICSA PhD Conference, 2011 | | 2011 |
Security Verification of Interaction Models in Open Multi-agent Systems S Bijani International Conference on Verified Software: Theories, Tools and Experiments, 2010 | | 2010 |
Distance-Angle Vector: A Method in Shape-Based Image Retrieval S Bijani, R Safabakhsh کنفرانس-اولين کنفرانس فناوري اطلاعات و دانش, 2004 | | 2004 |
PhD Workshop: Autonomic Network and Service Management T Pauw, F Turck, V Ongenae, GS Machado, B Stiller, JM Kang, J Hong, ... Policy 69, 72, 0 | | |