default search action
Shahram Shah-Heydari
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Orion S. E. Cardenas-Ritzert, Jody C. Vogeler, Shahram Shah-Heydari, Patrick A. Fekety, Melinda Laituri, Melissa McHale:
Automated Geospatial Approach for Assessing SDG Indicator 11.3.1: A Multi-Level Evaluation of Urban Land Use Expansion across Africa. ISPRS Int. J. Geo Inf. 13(7): 226 (2024) - [j17]Shahram Shah-Heydari, Jody C. Vogeler, Orion S. E. Cardenas-Ritzert, Steven K. Filippelli, Melissa McHale, Melinda Laituri:
Multi-Tier Land Use and Land Cover Mapping Framework and Its Application in Urbanization Analysis in Three African Countries. Remote. Sens. 16(14): 2677 (2024) - [j16]Ulya Sabeel, Shahram Shah-Heydari, Khalil El-Khatib, Khalid Elgazzar:
Unknown, Atypical and Polymorphic Network Intrusion Detection: A Systematic Survey. IEEE Trans. Netw. Serv. Manag. 21(1): 1190-1212 (2024) - [c34]Sara Taghavi Motlagh, Amin Ibrahim, Shahram Shah-Heydari, Khalil El-Khatib:
Multi-Objective Optimization for Managing Disruption Risk in SDN. DRCN 2024: 1-8 - 2023
- [c33]Ali Hassan, Shahram Shah-Heydari:
Enterprise Application Outage Prediction Using XGBoost and LSTM. CNSM 2023: 1-5 - [c32]Ulya Sabeel, Shahram Shah-Heydari, Khalil El-Khatib, Khalid Elgazzar:
Analyzing the Quality of Synthetic Adversarial Cyberattacks. CNSM 2023: 1-5 - [c31]Fateme Mazloomi, Shahram Shah-Heydari, Khalil El-Khatib:
Trust-based Knowledge Sharing Among Federated Learning Servers in Vehicular Edge Computing. DIVANet 2023: 9-15 - 2022
- [j15]Saeed A. Astaneh, Shahram Shah-Heydari, Sara Taghavi Motlagh, Alireza Izaddoost:
Trade-offs between Risk and Operational Cost in SDN Failure Recovery Plan. Future Internet 14(9): 263 (2022) - [c30]Ali Hassan, Shahram Shah-Heydari:
TCP Congestion Avoidance in Data Centres using Reinforcement Learning. ICACT 2022: 306-311 - 2021
- [j14]Ali Akbar Nasiri, Farnaz Derakhshan, Shahram Shah-Heydari:
Distributed Virtual Network Embedding for Software-Defined Networks Using Multiagent Systems. IEEE Access 9: 12027-12043 (2021) - [j13]Ulya Sabeel, Shahram Shah-Heydari, Khalid Elgazzar, Khalil El-Khatib:
Building an Intrusion Detection System to Detect Atypical Cyberattack Flows. IEEE Access 9: 94352-94370 (2021) - [j12]Ibtihal Ellawindy, Shahram Shah-Heydari:
Crowdsourcing Framework for QoE-Aware SD-WAN. Future Internet 13(8): 209 (2021) - [j11]Ravi Chauhan, Ulya Sabeel, Alireza Izaddoost, Shahram Shah-Heydari:
Polymorphic Adversarial Cyberattacks Using WGAN. J. Cybersecur. Priv. 1(4): 767-792 (2021) - [c29]Ulya Sabeel, Shahram Shah-Heydari, Khalid Elgazzar, Khalil El-Khatib:
CVAE-AN: Atypical Attack Flow Detection Using Incremental Adversarial Learning. GLOBECOM 2021: 1-6 - [c28]Ali Hassan, Shahram Shah-Heydari:
TCP Congestion Avoidance in Data Centres using Reinforcement Learning. ICACT 2021: 306-311 - 2020
- [c27]Ravi Chauhan, Shahram Shah-Heydari:
Polymorphic Adversarial DDoS attack on IDS using GAN. ISNCC 2020: 1-6
2010 – 2019
- 2019
- [j10]Ramiro Liscano, Nadra Ben Otman, Shahram Shah-Heydari, Dixit Sharma:
Fixed node assisted collection tree protocol for mobile wireless sensor networks. Int. J. Sens. Networks 31(3): 133-144 (2019) - [c26]Ibtihal Ellawindy, Shahram Shah-Heydari:
QoE-Aware Real-Time Multimedia Streaming in SD-WANs. NetSoft 2019: 66-71 - [c25]Ulya Sabeel, Shahram Shah-Heydari, Harsh Mohanka, Yasmine Bendhaou, Khalid Elgazzar, Khalil El-Khatib:
Evaluation of Deep Learning in Detecting Unknown Network Attacks. SmartNets 2019: 1-6 - 2018
- [j9]Ali A. Haghighi, Shahram Shah-Heydari, Shahram Shahbazpanahi:
Dynamic QoS-Aware Resource Assignment in Cloud-Based Content-Delivery Networks. IEEE Access 6: 2298-2309 (2018) - [j8]Ali A. Haghighi, Shahram Shahbazpanahi, Shahram Shah-Heydari:
Stochastic QoE-Aware Optimization in Cloud-Based Content Delivery Networks. IEEE Access 6: 32662-32672 (2018) - 2017
- [j7]Alireza Izaddoost, Shahram Shah-Heydari:
Risk-adaptive strategic network protection in disaster scenarios. J. Commun. Networks 19(5): 509-520 (2017) - [j6]Eduardo Luengo, Shahram Shah-Heydari, Khalil El-Khatib:
SDN-based wireless user management system. Telecommun. Syst. 65(4): 755-769 (2017) - [c24]Ali A. Haghighi, Shahram Shah-Heydari, Shahram ShahbazPanahi:
MDP modeling of resource provisioning in virtualized content-delivery networks. ICNP 2017: 1-6 - [c23]Nadra Ben Ottman, Ramiro Liscano, Shahram Shah-Heydari:
An analysis of the Collection Tree Protocol (CTP) in mobile sensing environments. PIMRC 2017: 1-7 - 2016
- [j5]Saeed A. Astaneh, Shahram Shah-Heydari:
Optimization of SDN Flow Operations in Multi-Failure Restoration Scenarios. IEEE Trans. Netw. Serv. Manag. 13(3): 421-432 (2016) - 2015
- [c22]Saeed A. Astaneh, Shahram Shah-Heydari:
Multi-failure restoration with minimal flow operations in software defined networks. DRCN 2015: 263-266 - [c21]Eduardo Luengo, Christopher Weber, Shahram Shah-Heydari, Khalil El-Khatib:
Design and Implementation of a Software-Defined Integrated Wired-Wireless Network Testbed. MobiWac 2015: 47-52 - 2014
- [j4]Alireza Izaddoost, Shahram Shah-Heydari:
Enhancing network service survivability in large-scale failure scenarios. J. Commun. Networks 16(5): 534-547 (2014) - [c20]Alireza Izaddoost, Shahram Shah-Heydari:
Topology-based Proactive Network Protection in Large-scale Failure Scenarios. FNC/MobiSPC 2014: 111-117 - [c19]Alireza Izaddoost, Shahram Shah-Heydari:
Proactive risk mitigation for communication network resilience in disaster scenarios. WoWMoM 2014: 1-4 - 2013
- [c18]Abdullah Alshehri, Shahram Shah-Heydari:
Predictive Filtering for Adjacency-Based Localization in MANET. DCOSS 2013: 448-453 - [c17]Dixit Sharma, Ramiro Liscano, Shahram Shah-Heydari:
Enhancing Collection Tree Protocol for Mobile Wireless Sensor Networks. EUSPN/ICTH 2013: 416-423 - 2012
- [c16]Alireza Izaddoost, Shahram Shah-Heydari:
A probabilistic model for network survivability in large scale failure scenarios. CCECE 2012: 1-5 - [c15]Md. Mustafizur Rahman, Shahram Shah-Heydari:
A self-healing approach for LTE Evolved Packet Core. CCECE 2012: 1-5 - [c14]Md. Mustafizur Rahman, Shahram Shah-Heydari:
Performance evaluation of LTE EPC self-healing solutions. GLOBECOM Workshops 2012: 813-817 - [c13]Alireza Izaddoost, Shahram Shah-Heydari:
Preventive network protection in probabilistic large-scale failure scenarios. GLOBECOM Workshops 2012: 858-862 - [c12]Z. M. Faizul Islam, Mitchell Romanuik, Shahram Shah-Heydari, Mazda Salmanian:
OLSR-based coarse localization in tactical MANET situational awareness systems. ICC 2012: 6494-6498 - 2011
- [c11]Shahram Heydari, Walid Rjaibi, Khalil El-Khatib, Julie Thorpe:
Privacy and security of smart grid communication. CASCON 2011: 345-346 - [c10]Dixit Sharma, Ramiro Liscano, Shahram Shah-Heydari:
Collector Tree Protocol (CTP) performance in mobile Wireless Sensor Networks. CCECE 2011: 1548-1552 - [c9]Anand Dersingh, Z. M. Faizul Islam, Shahram Shah-Heydari, Md. Mustafizur Rahman:
OLSR-based Topology Discovery for Mobile Situational Awareness Systems. ANT/MobiWIS 2011: 418-425 - 2010
- [c8]Shahram Shah-Heydari, Supreet Singh Baweja:
Lightweight reliable overlay multicasting in large-scale P2P networks. C3S2E 2010: 10-16 - [c7]Shahram Heydari, Miguel Vargas Martin, Walid Rjaibi, Xiaodong Lin:
Emerging trends in network forensics. CASCON 2010: 389-390
2000 – 2009
- 2009
- [j3]Shahram Shah-Heydari, Oliver W. W. Yang:
Heuristic algorithms for designing self-repairing protection trees in mesh networks. Comput. Networks 53(14): 2537-2551 (2009) - [c6]Bijan Bassiri, Shahram Shah-Heydari:
Network survivability in large-scale regional failure scenarios. C3S2E 2009: 83-87 - [c5]Khalil El-Khatib, Walid Rjaibi, Shahram Heydari, Miguel Vargas Martin:
Workshop on cybersecurity: security and privacy in the 21st century. CASCON 2009: 366 - 2007
- [c4]Shahram Shah-Heydari, Oliver W. W. Yang:
Performance study of multiple link failure restorability of shared protection trees. BROADNETS 2007: 594-600 - [c3]Shahram Shah-Heydari, Oliver W. W. Yang:
Performance study of self-repairing unicast hierarchical protection trees in mesh networks. BROADNETS 2007: 611-620 - 2004
- [j2]Shahram Shah-Heydari, Oliver Yang:
Hierarchical Protection Tree Scheme for Failure Recovery in Mesh Networks. Photonic Netw. Commun. 7(2): 145-159 (2004) - [c2]Shahram Shah-Heydari, Oliver W. W. Yang:
Multiple failure analysis with restoration paths matrix. GLOBECOM 2004: 2098-2102 - [c1]Shahram Shah-Heydari, Wail Mardini, Oliver W. W. Yang:
Theoretical analysis of restorability of Hamiltonian protection cycles in random mesh networks. ISCC 2004: 921-926 - 2000
- [j1]Shahram Shah-Heydari, Tho Le-Ngoc:
MMPP models for multimedia traffic. Telecommun. Syst. 15(3-4): 273-293 (2000)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-23 19:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint