Follow
Shahriar Bijani
Shahriar Bijani
Dept. of Computer Science, Shahed University
Verified email at shahed.ac.ir - Homepage
Title
Cited by
Cited by
Year
A review of attacks and security approaches in open multi-agent systems
S Bijani, D Robertson
Artificial Intelligence Review 42, 607-636, 2014
872014
Multi-agent negotiation of virtual machine migration using the lightweight coordination calculus
P Anderson, S Bijani, A Vichos
Agent and Multi-Agent Systems. Technologies and Applications: 6th KES …, 2012
122012
Degan: Decentralized generative adversarial networks
MH Faezi, S Bijani, A Dolati
Neurocomputing 419, 335-343, 2021
102021
HIDMN: A host and network-based intrusion detection for mobile networks
S Bijani, M Kazemitabar
2008 International Conference on Computer and Electrical Engineering, 204-208, 2008
82008
A Methodology for Mobile Network Security Risk Management
M Seify, S Bijani
2009 Sixth International Conference on Information Technology: New …, 2009
72009
Probing attacks on multi-agent systems using electronic institutions
S Bijani, D Robertson, D Aspinall
Declarative Agent Languages and Technologies IX: 9th International Workshop …, 2012
52012
Secure information sharing in social agent interactions using information flow analysis
S Bijani, D Robertson, D Aspinall
Engineering Applications of Artificial Intelligence 70, 52-66, 2018
42018
A deterministic multiple key space scheme for wireless sensor networks via combinatorial designs
I Qasemzadeh Kolagar, H Haj Seyyed Javadi, S Bijani
Journal of Communication Engineering 6 (1), 53-70, 2017
42017
Intrusion detection in open peer-to-peer multi-agent systems
S Bijani, D Robertson
Managing the Dynamics of Networks and Services: 5th International Conference …, 2011
42011
Multi-agent Virtual Machine Management Using the Lightweight Coordination Calculus
P Anderson, S Bijani, H Herry
Transactions on Computational Collective Intelligence XII, 123-142, 2013
32013
Securing open multi-agent systems governed by electronic institutions
S Bijani
The University of Edinburgh, 2013
22013
Automated Multi-Step Web Application Attack Analysis Using Reinforcement Learning and Vulnerability Assessment Tools
MS Hamidi, M Doostari, S Bijani
2023
Designing and implementing of a graph planner for intelligent selection of security controls: a case study of Islamic Republic of Iran Police
NM Ahmadi, S Bijani
INFORMATION AND COMMUNICATION TECHNOLOGY IN POLICING 2 (5001640), 79-89, 2021
2021
A Framework for Automatic Security Verification of Android Apps
S Bijani, A Imeni
همايش ملي امنيت سامانه هاي هوشمند همراه, 2016
2016
Secrecy Analysis of Interaction Models in Open Multi-Agent Systems
S Bijani, D Robertson
SICSA PhD Conference, 2011
2011
Security Verification of Interaction Models in Open Multi-agent Systems
S Bijani
International Conference on Verified Software: Theories, Tools and Experiments, 2010
2010
Distance-Angle Vector: A Method in Shape-Based Image Retrieval
S Bijani, R Safabakhsh
کنفرانس-اولين کنفرانس فناوري اطلاعات و دانش, 2004
2004
PhD Workshop: Autonomic Network and Service Management
T Pauw, F Turck, V Ongenae, GS Machado, B Stiller, JM Kang, J Hong, ...
Policy 69, 72, 0
The system can't perform the operation now. Try again later.
Articles 1–18