Mohammad Abdollahi Azgomi
Mohammad Abdollahi Azgomi
Associate Professor at School of Computer Engineering, Iran University of Science and Technology
Verified email at - Homepage
Cited by
Cited by
Improving route stability and overhead on AODV routing protocol and make it usable for VANET
O Abedi, R Berangi, MA Azgomi
2009 29th ieee international conference on distributed computing systems …, 2009
An improved method for test case prioritization by incorporating historical test case data
A Khalilian, MA Azgomi, Y Fazlalizadeh
Science of Computer Programming 78 (1), 93-116, 2012
A taxonomy of frauds and fraud detection techniques
N Laleh, MA Azgomi
International Conference on Information Systems, Technology and Management …, 2009
A stochastic model of attack process for the evaluation of security metrics
J Almasizadeh, MA Azgomi
Computer Networks 57 (10), 2159-2180, 2013
A method for evaluating the consequence propagation of security attacks in cyber–physical systems
H Orojloo, MA Azgomi
Future Generation Computer Systems 67, 57-71, 2017
A survey of quantum-like approaches to decision making and cognition
M Ashtiani, MA Azgomi
Mathematical Social Sciences 75, 49-80, 2015
Malware propagation modeling considering software diversity and immunization
S Hosseini, MA Azgomi, AT Rahmani
Journal of computational science 13, 49-67, 2016
Task scheduling modelling and reliability evaluation of grid services using coloured Petri nets
MA Azgomi, R Entezari-Maleki
Future Generation Computer Systems 26 (8), 1141-1150, 2010
Prioritizing test cases for resource constraint environments using historical test case performance data
Y Fazlalizadeh, A Khalilian, MA Azgomi, S Parsa
2009 2nd IEEE International Conference on Computer Science and Information …, 2009
An efficient control-flow checking technique for the detection of soft-errors in embedded software
T Boroomandnezhad, MA Azgomi
Computers & Electrical Engineering 39 (4), 1320-1332, 2013
A model for malware propagation in scale-free networks based on rumor spreading process
S Hosseini, MA Azgomi
Computer Networks 108, 97-107, 2016
Trust modeling based on a combination of fuzzy analytic hierarchy process and fuzzy VIKOR
M Ashtiani, MA Azgomi
Soft Computing 20 (1), 399-421, 2016
A game-theoretic approach to model and quantify the security of cyber-physical systems
H Orojloo, MA Azgomi
Computers in Industry 88, 44-57, 2017
Conflict-free scheduling and routing of automated guided vehicles in mesh topologies
H Ghasemzadeh, E Behrangi, MA Azgomi
Robotics and Autonomous Systems 57 (6-7), 738-748, 2009
A hesitant fuzzy model of computational trust considering hesitancy, vagueness and uncertainty
M Ashtiani, MA Azgomi
Applied Soft Computing 42, 18-37, 2016
A modelling tool for hierarchical stochastic activity networks
MA Azgomi, A Movaghar
Simulation Modelling Practice and Theory 13 (6), 505-524, 2005
A method for modeling and evaluation of the security of cyber-physical systems
H Orojloo, MA Azgomi
2014 11th International ISC Conference on Information Security and …, 2014
Performance evaluation of sensor medium access control protocol using coloured petri nets
MA Azgomi, A Khalili
Electronic Notes in Theoretical Computer Science 242 (2), 31-42, 2009
Intrusion process modeling for security quantification
J Almasizadeh, MA Azgomi
2009 International Conference on Availability, Reliability and Security, 114-121, 2009
Transformation of UML models into analyzable OSAN models
A Kamandi, MA Azgomi, A Movaghar
Electronic Notes in Theoretical Computer Science 159, 3-22, 2006
The system can't perform the operation now. Try again later.
Articles 1–20