Follow
Yazdan Movahedi
Title
Cited by
Cited by
Year
Cluster-based vulnerability assessment of operating systems and web browsers
Y Movahedi, M Cukier, A Andongabo, I Gashi
Computing 101 (2), 139-160, 2019
202019
Application of routine activity theory to cyber intrusion location and time
K Bock, S Shannon, Y Movahedi, M Cukier
2017 13th European Dependable Computing Conference (EDCC), 139-146, 2017
182017
Vulnerability prediction capability: A comparison between vulnerability discovery models and neural network models
Y Movahedi, M Cukier, I Gashi
Computers & Security 87, 101596, 2019
152019
Cluster-based vulnerability assessment applied to operating systems
Y Movahedi, M Cukier, A Andongabo, I Gashi
2017 13th European Dependable Computing Conference (EDCC), 18-25, 2017
92017
Design and Development of the Pattern to Assign and Estimate the Reliability of Complicated Systems by Bayesian Network Method, Case Study: A High Technology Camera
Y Movahedi, M Dolatkhah, M Karbasian, V Rasty
International Journal of Industrial Engineering 24 (4), 437-448, 2014
42014
Predicting the Discovery Pattern of Publically Known Exploited Vulnerabilities
Y Movahedi, M Cukier, I Gashi
IEEE Transactions on Dependable and Secure Computing, 2020
32020
Some Guidelines for Risk Assessment of Vulnerability Discovery Processes
Y Movahedi
PQDT-Global, 2019
22019
Reliability Optimization of Fuzzy Multi-state Systems
Y Movahedi
Department of Industrial and Systems Engineering, Isfahan University of …, 2015
2015
The system can't perform the operation now. Try again later.
Articles 1–8