Meysam Ghahramani
Meysam Ghahramani
Verified email at - Homepage
Cited by
Cited by
Similarity-based Android malware detection using Hamming distance of static binary features
R Taheri, M Ghahramani, R Javidan, M Shojafar, Z Pooranian, M Conti
Future Generation Computer Systems 105, 230-247, 2020
RSS: An energy-efficient approach for securing IoT service protocols against the DoS attack
M Ghahramani, R Javidan, M Shojafar, R Taheri, M Alazab, R Tafazolli
IEEE Internet of Things Journal 8 (5), 3619-3635, 2020
A secure biometric-based authentication protocol for global mobility networks in smart cities
M Ghahramani, R Javidan, M Shojafar
The Journal of Supercomputing, 2020
A large family of cospectral Cayley graphs over dihedral groups
A Abdollahi, S Janbaz, M Ghahramani
Discrete Mathematics 340 (5), 1116-1121, 2017
A Robust Anonymous Remote User Authentication Protocol for IoT Services
M Ghahramani, R Javidan
Wireless Personal Communications, 1-23, 2021
The Independence Number of Circulant Triangle-free Graphs
SM Ayat, SM Ayat, M Ghahramani
AIMS Mathematics 5 (4), 3741-3750, 2020
A recursive algorithm for solving “a secret sharing” problem
SM Ayat, M Ghahramani
Cryptologia 43 (6), 497-503, 2019
Deep Image: A precious image based deep learning method for online malware detection in IoT Environment
M Ghahramani, R Taheri, M Shojafar, R Javidan, S Wan
arXiv preprint arXiv:2204.01690, 2022
Time dependency: an efficient biometric-based authentication for secure communication in wireless healthcare sensor networks
M Ghahramani, R Javidan
Journal of Computer Virology and Hacking Techniques, 2022
The system can't perform the operation now. Try again later.
Articles 1–9