default search action
Alireza Shameli-Sendi
Person information
- affiliation: Shahid Beheshti University (SBU), Faculty of Computer Science and Engineering, Tehran, Iran
- affiliation (PhD): Polytechnique Montréal, Canada
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Vahid Moghiss, Alireza Shameli-Sendi:
I-RECON: An IoT-Based Search Engine for Internet-Facing Services Vulnerability Reconnaissance. IEEE Access 12: 96100-96112 (2024) - [j28]Mohamad Erfan Mazaheri, Alireza Shameli-Sendi:
APTracker: A Comprehensive and Analytical Malware Dataset Based on Attribution to APT Groups. IEEE Access 12: 145148-145158 (2024) - [j27]Mohammad Osmanpoor, Alireza Shameli-Sendi, Fateme Faraji Daneshgar:
Convergence of the Harris hawks optimization algorithm and fuzzy system for cloud-based task scheduling enhancement. Clust. Comput. 27(4): 4909-4923 (2024) - [j26]Amirmohammad Karamzadeh, Alireza Shameli-Sendi:
Reducing cold start delay in serverless computing using lightweight virtual machines. J. Netw. Comput. Appl. 232: 104030 (2024) - 2023
- [j25]Ehsan Khodayarseresht, Alireza Shameli-Sendi:
A multi-objective cloud energy optimizer algorithm for federated environments. J. Parallel Distributed Comput. 174: 81-99 (2023) - [j24]Parisa Sadat Kalaki, Alireza Shameli-Sendi, Behzad Khalaji Emamzadeh Abbasi:
Anomaly detection on OpenStack logs based on an improved robust principal component analysis model and its projection onto column space. Softw. Pract. Exp. 53(3): 665-681 (2023) - [j23]Mohammad Khanahmadi, Alireza Shameli-Sendi, Masoume Jabbarifar, Quentin Fournier, Michel R. Dagenais:
Detection of microservice-based software anomalies based on OpenTracing in cloud. Softw. Pract. Exp. 53(8): 1681-1699 (2023) - [j22]Ehsan Khodayarseresht, Alireza Shameli-Sendi, Quentin Fournier, Michel R. Dagenais:
Energy and carbon-aware initial VM placement in geographically distributed cloud data centers. Sustain. Comput. Informatics Syst. 39: 100888 (2023) - [j21]Amin Bagheri, Alireza Shameli-Sendi:
Automating the Translation of Cloud Users' High-Level Security Needs to an Optimal Placement Model in the Cloud Infrastructure. IEEE Trans. Serv. Comput. 16(6): 4580-4590 (2023) - [j20]Sina Tamjidi, Alireza Shameli-Sendi:
Intelligence in security countermeasures selection. J. Comput. Virol. Hacking Tech. 19(1): 137-148 (2023) - [j19]Puya Pakshad, Alireza Shameli-Sendi, Behzad Khalaji Emamzadeh Abbasi:
A security vulnerability predictor based on source code metrics. J. Comput. Virol. Hacking Tech. 19(4): 615-633 (2023) - 2022
- [c9]Arash Hadadi, Alireza Shameli-Sendi:
A Quality of Service Aware VM Placement for User Applications in Cloud Data Center. CCCI 2022: 1-6 - 2021
- [j18]Niloofar Moradi, Alireza Shameli-Sendi, Alireza Khajouei:
A Scalable Stateful Approach for Virtual Security Functions Orchestration. IEEE Trans. Parallel Distributed Syst. 32(6): 1383-1394 (2021) - [j17]Alireza Shameli-Sendi:
Understanding Linux kernel vulnerabilities. J. Comput. Virol. Hacking Tech. 17(4): 265-278 (2021) - 2020
- [j16]Alireza Shameli-Sendi:
An efficient security data-driven approach for implementing risk assessment. J. Inf. Secur. Appl. 54: 102593 (2020) - [j15]Sima Bagheri, Alireza Shameli-Sendi:
Dynamic Firewall Decomposition and Composition in the Cloud. IEEE Trans. Inf. Forensics Secur. 15: 3526-3539 (2020)
2010 – 2019
- 2019
- [j14]Masoume Jabbarifar, Alireza Shameli-Sendi, Bettina Kemme:
A scalable network-aware framework for cloud monitoring orchestration. J. Netw. Comput. Appl. 133: 1-14 (2019) - [j13]Alireza Shameli-Sendi, Yosr Jarraya, Makan Pourzandi, Mohamed Cheriet:
Efficient Provisioning of Security Service Function Chaining Using Network Security Defense Patterns. IEEE Trans. Serv. Comput. 12(4): 534-549 (2019) - 2018
- [j12]Alireza Shameli-Sendi, Michel R. Dagenais, Lingyu Wang:
Realtime intrusion risk assessment model based on attack and service dependency graphs. Comput. Commun. 116: 253-272 (2018) - [j11]Alireza Shameli-Sendi, Habib Louafi, Wenbo He, Mohamed Cheriet:
Dynamic Optimal Countermeasure Selection for Intrusion Response System. IEEE Trans. Dependable Secur. Comput. 15(5): 755-770 (2018) - [c8]Sima Bagheri, Alireza Shameli-Sendi:
Software Project Estimation Using Improved Use Case Point. SERA 2018: 143-150 - 2017
- [c7]Alireza Shameli-Sendi, Habib Louafi, Mohamed Cheriet:
Payless Monitoring Service for Tenants in Cloud with Traffic and Energy-Aware Function Deployment. CloudCom 2017: 247-254 - 2016
- [j10]Alireza Shameli-Sendi, Rouzbeh Aghababaei-Barzegar, Mohamed Cheriet:
Taxonomy of information security risk assessment (ISRA). Comput. Secur. 57: 14-30 (2016) - 2015
- [j9]Alireza Shameli-Sendi, Michel R. Dagenais:
ORCEF: Online response cost evaluation framework for intrusion response system. J. Netw. Comput. Appl. 55: 89-107 (2015) - [j8]Alireza Shameli-Sendi, Makan Pourzandi, Mohamed Fekih Ahmed, Mohamed Cheriet:
Taxonomy of Distributed Denial of Service mitigation approaches for cloud computing. J. Netw. Comput. Appl. 58: 165-179 (2015) - [j7]Masoume Jabbarifar, Michel R. Dagenais, Alireza Shameli-Sendi:
Online Incremental Clock Synchronization. J. Netw. Syst. Manag. 23(4): 1034-1066 (2015) - [c6]Yosr Jarraya, Alireza Shameli-Sendi, Makan Pourzandi, Mohamed Cheriet:
Multistage OCDO: Scalable Security Provisioning Optimization in SDN-Based Cloud. CLOUD 2015: 572-579 - [c5]Alireza Shameli-Sendi, Habib Louafi, Wenbo He, Mohamed Cheriet:
A Defense-Centric Model for Multi-step Attack Damage Cost Evaluation. FiCloud 2015: 145-149 - [c4]Alireza Shameli-Sendi, Yosr Jarraya, Mohamed Fekih Ahmed, Makan Pourzandi, Chamseddine Talhi, Mohamed Cheriet:
Optimal placement of sequentially ordered virtual security appliances in the cloud. IM 2015: 818-821 - 2014
- [j6]Alireza Shameli-Sendi, Mohamed Cheriet, Abdelwahab Hamou-Lhadj:
Taxonomy of intrusion risk assessment and response system. Comput. Secur. 45: 1-16 (2014) - [j5]Alireza Shameli-Sendi, Michel R. Dagenais:
ARITO: Cyber-attack response system using accurate risk impact tolerance. Int. J. Inf. Sec. 13(4): 367-390 (2014) - [c3]Alireza Shameli-Sendi, Mohamed Cheriet:
Cloud Computing: A Risk Assessment Model. IC2E 2014: 147-152 - 2013
- [j4]Alireza Shameli Shameli-Sendi, Julien Desfossez, Michel R. Dagenais, Masoume Jabbarifar:
A Retroactive-Burst Framework for Automated Intrusion Response System. J. Comput. Networks Commun. 2013: 134760:1-134760:8 (2013) - [c2]Naser Ezzati-Jivan, Alireza Shameli-Sendi, Michel R. Dagenais:
Multilevel label placement for execution trace events. CCECE 2013: 1-6 - 2012
- [j3]Alireza Shameli-Sendi, Masoume Jabbarifar, Michel R. Dagenais, Mehdi Shajari:
System Health Monitoring Using a Novel Method: Security Unified Process. J. Comput. Networks Commun. 2012: 151205:1-151205:20 (2012) - [j2]Alireza Shameli-Sendi, Michel R. Dagenais, Masoume Jabbarifar, Mario Couture:
Real Time Intrusion Prediction based on Optimized Alerts with Hidden Markov Model. J. Networks 7(2): 311-321 (2012) - 2010
- [j1]Masoume Jabbarifar, Alireza Shameli-Sendi, Alireza Sadighian, Naser Ezzati-Jivan, Michel R. Dagenais:
A Reliable and Efficient Time Synchronization Protocol for Heterogeneous Wireless Sensor Network. Wirel. Sens. Netw. 2(12): 910-918 (2010) - [c1]Masoume Jabbarifar, Alireza Shameli-Sendi, Hossein Pedram, Mehdi Dehghan, Michel R. Dagenais:
L-SYNC: Larger Degree Clustering Based Time-Synchronisation for Wireless Sensor Network. SERA 2010: 171-178
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint