Saeed Jalili

Department of Electrical and Computer Engineering, Tarbiat Modares University, Tehran, Islamic Republic of Iran

[ 1 ] - ADAPTIVE ORDERED WEIGHTED AVERAGING FOR ANOMALY DETECTION IN CLUSTER-BASED MOBILE AD HOC NETWORKS

In this paper, an anomaly detection method in cluster-based mobile ad hoc networks with ad hoc on demand distance vector (AODV) routing protocol is proposed. In the method, the required features for describing the normal behavior of AODV are defined via step by step analysis of AODV and independent of any attack. In order to learn the normal behavior of AODV, a fuzzy averaging method is used fo...

[ 2 ] - پیش بینی ژن‏ های بیماری با استفاده از دسته‏ بند تک‌کلاسی ماشین بردار پشتیبان

Abstract: In disease gene identification and classification, users are only interested in classifying one specific class, disease genes, without considering other classes (non-disease genes). This situation is referred to as one-class classification. Existing machine learning-based methods typically use known disease gene as positive training set and unknown genes as negative training set to bu...

[ 3 ] - A novel local search method for microaggregation

In this paper, we propose an effective microaggregation algorithm to produce a more useful protected data for publishing. Microaggregation is mapped to a clustering problem with known minimum and maximum group size constraints. In this scheme, the goal is to cluster n records into groups of at least k and at most 2k_1 records, such that the sum of the within-group squ...

[ 4 ] - A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs

To prevent an exploit, the security analyst must implement a suitable countermeasure. In this paper, we consider cost-sensitive attack graphs (CAGs) for network vulnerability analysis. In these attack graphs, a weight is assigned to each countermeasure to represent the cost of its implementation. There may be multiple countermeasures with different weights for preventing a single exploit. Also,...

نویسندگان همکار