Meysam Ghahramani
Meysam Ghahramani
Lorestan University
Verified email at - Homepage
Cited by
Cited by
Similarity-based Android malware detection using Hamming distance of static binary features
R Taheri, M Ghahramani, R Javidan, M Shojafar, Z Pooranian, M Conti
Future Generation Computer Systems 105, 230-247, 2020
RSS: An energy-efficient approach for securing IoT service protocols against the DoS attack
M Ghahramani, R Javidan, M Shojafar, R Taheri, M Alazab, R Tafazolli
IEEE Internet of Things Journal 8 (5), 3619-3635, 2020
A secure biometric-based authentication protocol for global mobility networks in smart cities
M Ghahramani, R Javidan, M Shojafar
The Journal of Supercomputing, 2020
A large family of cospectral Cayley graphs over dihedral groups
A Abdollahi, S Janbaz, M Ghahramani
Discrete Mathematics 340 (5), 1116-1121, 2017
Deep Image: A precious image based deep learning method for online malware detection in IoT Environment
M Ghahramani, R Taheri, M Shojafar, R Javidan, S Wan
arXiv preprint arXiv:2204.01690, 2022
A Robust Anonymous Remote User Authentication Protocol for IoT Services
M Ghahramani, R Javidan
Wireless Personal Communications, 1-23, 2021
A recursive algorithm for solving “a secret sharing” problem
SM Ayat, M Ghahramani
Cryptologia 43 (6), 497-503, 2019
Time dependency: an efficient biometric-based authentication for secure communication in wireless healthcare sensor networks
M Ghahramani, R Javidan
Journal of Computer Virology and Hacking Techniques, 2022
Find It With A Pencil: An Efficient Approach For Vulnerability Detection In Authentication Protocols
M Ghahramani
IEEE Transactions on Information Forensics and Security, 2023
VQR: Vulnerability analysis in Quadratic Residues-based Authentication Protocols
M Ghahramani, H Haddad pajouh, R Javidan, S Kumari
Ambient Intelligence and Humanized Computing, 2023
The Independence Number of Circulant Triangle-free Graphs
SM Ayat, SM Ayat, M Ghahramani
AIMS Mathematics 5 (4), 3741-3750, 2020
M-RL: A mobility and impersonation-aware IDS for DDoS UDP flooding attacks in IoT-Fog networks
S Javanmardi, M Ghahramani, M Shojafar, M Alazab, AM Caruso
Computers & Security, 103778, 2024
The system can't perform the operation now. Try again later.
Articles 1–12