مقالات ارائه شده در مجلات

انگلیسی

  1. , Haleh Amintoosi , حمیدرضا شهریاری , REACH: Robust Efficient Authentication for Crowdsensing-based Healthcare, Journal of Supercomputing, Volume (80), No (6), Year (2024-4), Pages (8434-8468)
  2. Fatemeh Farhadi , Mohammad Allahbakhsh , Ali Maghsoudi , , Haleh Amintoosi , DiMo: discovery of microRNA motifs using deep learning and motif embedding, Briefings in Bioinformatics, Volume (24), No (3), Year (2023-5)
  3. زهرا میر , Mohammad Allahbakhsh , علی مقصودی , Haleh Amintoosi , A Taxonomy for RNA Motif Discovery, Journal of Computer and Knowledge Engineering, Year (2022-12)
  4. , Haleh Amintoosi , , On the Suitability of Improved TrustChain for Smartphones, ISeCure, Volume (14), No (3), Year (2022-10), Pages (33-42)
  5. Mohammad Allahbakhsh , Haleh Amintoosi , Sharing Reputation Data Across Online Communities, IEEE Internet Computing, Volume (26), No (4), Year (2022-7), Pages (60-67)
  6. Haleh Amintoosi , , Mohammad Shojafar , Saru Kumari , Mamoun Alazab , Slight: A lightweight authentication scheme for smart healthcare services, Computers and Electrical Engineering, Volume (99), Year (2022-4), Pages (107803-107811)
  7. Haleh Amintoosi , , Saru Kumari , Sachin Kumar , Chien-Ming Chen , TAMA: Three-Factor Authentication for Multi-server Architecture, Human-centric Computing and Information Sciences, Volume (11), Year (2021-10), Pages (1-1)
  8. Haleh Amintoosi , , Saru Kumari , feng Jun , Sachin Kumar , Joel J. P. C. Rodrigues , Secure and Authenticated Data Access and Sharing Model for Smart Wearable Systems, IEEE Internet of Things Journal, Volume (9), No (7), Year (2021-1), Pages (5368-5379)
  9. Fuqdan A. Al-Ibraheemi , Sattar Al-Ibraheemi , Haleh Amintoosi , A hybrid method of genetic algorithm and support vector machine for DNS tunneling detection, International Journal of Electrical and Computer Engineering-IJECE, Volume (11), No (2), Year (2021-4), Pages (1666-1674)
  10. , Haleh Amintoosi , Saru kumari , On the Security of “Secure and Lightweight Authentication with Key Agreement for Smart Wearable Systems”, Wireless Personal Communications, Volume (120), No (1), Year (2021-9), Pages (1-8)
  11. Mohammad Allahbakhsh , Haleh Amintoosi , Behshid Behkamal , Amin Beheshti , Elisa Bertino , SCiMet: Stable, sCalable and reliable Metric-based framework for quality assessment in collaborative content generation systems, Journal of Informetrics, Volume (15), No (2), Year (2021-5), Pages (101127-101127)
  12. , Haleh Amintoosi , SK Hafizul Islam , Mostafa Farhadi Moghadam , A provably secure and lightweight authentication scheme for Internet of Drones for smart city surveillance, Journal of Systems Architecture, Volume (115), Year (2020-12)
  13. Mushtaq Talb Tally , Haleh Amintoosi , A hybrid method of genetic algorithm and support vector machine for intrusion detection, International Journal of Electrical and Computer Engineering-IJECE, Volume (11), No (1), Year (2021-2)
  14. Haleh Amintoosi , Masood Niazi Torshiz , Yahya Forghani , Sara Alinejad , An efficient storage-optimizing tick data clustering model, Turkish Journal of Electrical Engineering and Computer Sciences, Volume (28), No (5), Year (2020-9), Pages (2657-2669)
  15. , Haleh Amintoosi , sara Kumari , A provably secure ECC-based roaming authentication scheme for global mobility networks, Journal of Information Security and Applications, Volume (54), Year (2020-10), Pages (102588-102600)
  16. Mohammad Allahbakhsh , Haleh Amintoosi , Behshid Behkamal , Salil S. Kanhere , Elisa Bertino , AQA: An Adaptive Quality Assessment Framework for Online Review Systems, IEEE Transactions on Services Computing, Volume (15), No (3), Year (2020-1), Pages (1486-1497)
  17. Mohammad Allahbakhsh , Haleh Amintoosi , Alexander Ignjatovic , Elisa Bertino , A Trust-Based Experience-Aware Framework for Integrating Fuzzy Recommendations, IEEE Transactions on Services Computing, Volume (15), No (2), Year (2019-1), Pages (698-709)
  18. , Haleh Amintoosi , Secure communication in CloudIoT through design of a lightweight authentication and session key agreement scheme, International Journal of Communication Systems, Volume (36), No (1), Year (2020-2)
  19. مسعود نیازی ترشیز , Azadeh Salehi Esfaji , Haleh Amintoosi , Enhanced Schemes for Data Fragmentation, Allocation, and Replication in Distributed Database Systems, Computer Systems Science and Engineering, Volume (35), No (2), Year (2020-3), Pages (99-112)
  20. , Haleh Amintoosi , Perfect forward secrecy via an ECC-based authentication scheme for SIP in VoIP, Journal of Supercomputing, Volume (76), No (4), Year (2019-11), Pages (3086-3104)
  21. , Haleh Amintoosi , DNS Tunneling Detection Method Based on Multilabel Support Vector Machine, Security and Communication Networks, Volume (2018), No (1), Year (2018-1), Pages (1-9)
  22. Masood Niazi Torshiz , Haleh Amintoosi , Collusion-resistant Worker Selection in Social Crowdsensing Systems, Journal of Computer and Knowledge Engineering, Volume (1), No (1), Year (2017-2), Pages (9-20)
  23. Mohammad Hossein Yaghmaee Moghaddam , M. B. Menhaj , Haleh Amintoosi , A fuzzy extension to the blue active queue management algorithm, مهندسی برق و الکترونیک ایران, Volume (1), No (3), Year (2005-2), Pages (3-15)
  24. Haleh Amintoosi , Salil S. Kanhere , Mohammad Allahbakhsh , Trust-based privacy-aware participant selection in social participatory sensing, Journal of Information Security and Applications, Volume (20), No (1), Year (2015-2), Pages (11-25)
  25. Haleh Amintoosi , Salil S. Kanhere , A Reputation Framework for Social Participatory Sensing Systems, Mobile Networks and Applications, Volume (19), No (1), Year (2014-2), Pages (88-100)
  26. Mohammad Hossein Yaghmaee Moghaddam , Mohammad Bagher Menhaj , Haleh Amintoosi , Design and performance evaluation of a fuzzy based traffic conditioner for differentiated services, Computer Networks, Volume (47), No (6), Year (2005-4), Pages (847-869)

مقالات ارایه شده در کنفرانس

انگلیسی

  1. فاطمه فرهادی , Mohammad Allahbakhsh , Haleh Amintoosi , , Decoding MicroRNA Motifs: A Time Series Approach using Hidden Markov Models , 13th International Conference on Computer and Knowledge Engineering (ICCKE 2023) , 2023-11-01
  2. Haleh Amintoosi , , Improved TrustChain for Lightweight Devices , 12th International Conference on Computer and Knowledge Engineering , 2022-12-15
  3. , Haleh Amintoosi , Mohammad Allahbakhsh , An Iterative Model for Quality Assessment in Collaborative Content Generation Systems , The 2nd International Workshop on AI-enabled Process Automation , 2021-11-22
  4. , Haleh Amintoosi , موید الوحاح , 2Line Defense Ontology-Based Trust Management Model , 4TH INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATION , 2021-02-20
  5. , Haleh Amintoosi , نصور باقری , Lightweight Authentication for Remote Healthcare Systems in Cloud-IoT , 10th International Conference on Computer and Knowledge Engineering (ICCKE , 2020-10-29
  6. , Haleh Amintoosi , Seyed Amin Hosseini Seno , A Systematic Literature Review on Blockchain-based Solutions for IoT Security , The International Conference on Contemporary Issues In Data Science , 2019-03-05
  7. Haleh Amintoosi , , A Novel Provably-Secure ECC-based Authentication and Key Management Protocol for Telecare Medical Information Systems , 9th International Conference on Computer and Knowledge Engineering , 2019-10-24
  8. Haleh Amintoosi , , FUMBOT: Design, Implementation and Detectoin , OIC-CERT 9TH GENERAL MEETING AND ANNUAL CONFERENCE 2018 , 2018-11-26
  9. Haleh Amintoosi , محمد اله بخش , سلیل کانهیر , الکساندر ایگناتویچ , Trust and Privacy Challenges in Social Participatory Networks , Sixth Australasian Symposium on Service Research and Innovation (ASSRI’17) , 2017-10-19
  10. Haleh Amintoosi , محمد اله بخش , سلیل کانهیر , A Game-Theoretic Approach to Quality Improvement in Crowdsourcing Tasks , Australian Symposium on Service Research and Innovation , 2017-10-19
  11. Haleh Amintoosi , , A Survey on Participant Recruitment in Crowdsensing Systems , 2016 6th International Conference on Computer and Knowledge Engineering (ICCKE) , 2016-10-20
  12. Haleh Amintoosi , Mohammad Allahbakhsh , Salil S. Kanhere , Masood Niazi Torshiz , Trust Assessment in Social Participatory Networks , 3rd International Conference on Computer and Knowledge Engineering , 2013-10-31
  13. Haleh Amintoosi , Salil S. Kanhere , Masood Niazi Torshiz , A socially-aware incentive scheme for social participatory sensing , 2015 IEEE Tenth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP) , 2015-05-07
  14. Haleh Amintoosi , Salil S. Kanhere , Privacy-aware Trust-based Recruitment in Social Participatory Sensing , Mobile and Ubiquitous Systems: Computing, Networking, and Services , 2013-12-02
  15. Haleh Amintoosi , Salil S. Kanhere , A Trust Framework for Social Participatory Sensing Systems , Mobile and Ubiquitous Systems: Computing, Networking, and Services , 2012-12-12
  16. Haleh Amintoosi , Salil S. Kanhere , A Trust-Based Recruitment Framework for Multi-hop Social Participatory Sensing , IEEE International Conference on Distributed Computing in Sensor Systems , 2013-05-21