Farzaneh Abazari
Farzaneh Abazari
University of Saskatchewan
Verified email at
Cited by
Cited by
MOWS: multi-objective workflow scheduling in cloud computing based on heuristic algorithm
F Abazari, M Analoui, H Takabi, S Fu
Simulation Modelling Practice and Theory 93, 119-132, 2019
Security, privacy, and digital forensics in the cloud
L Chen, H Takabi, NA Le-Khac
John Wiley & Sons, 2019
Effect of anti-malware software on infectious nodes in cloud environment
F Abazari, M Analoui, H Takabi
Computers & Security 58, 139-148, 2016
Exploring the effects of virtual machine placement on the transmission of infections in cloud
F Abazari, M Analoui
7'th International Symposium on Telecommunications (IST'2014), 278-282, 2014
Multi-objective response to co-resident attacks in cloud environment
F Abazari, M Analoui, H Takabi
International Journal of Information and Communication Technology Research 9 …, 2017
Cryptanalysis with Ternary Difference: Applied to BlockCipher PRESENT
F Abazari, B Sadeghiyan
International Journal of Information and Electronics Engineering 2 (3), 441, 2012
Optimal response to computer network threats
F Abazari, A Madani, H Gharaee
8th International Symposium on Telecommunications (IST), 729-734, 2016
Origin Attribution of RSA Public Keys
E Branca, F Abazari, R Rivera Carranza, N Stakhanova
Security and Privacy in Communication Networks, 374--396, 2021
Towards a functional and trustful web-based information sharing center
SN Khajeddin, A Madani, H Gharaee, F Abazari
2019 5th International Conference on Web Research (ICWR), 252-257, 2019
Dataset characteristics for reliable code authorship attribution
F Abazari, E Branca, N Ridley, N Stakhanova, M Dalla Preda
IEEE Transactions on Dependable and Secure Computing 20 (1), 506-521, 2021
Language and platform independent attribution of heterogeneous code
F Abazari, E Branca, E Novikova, N Stakhanova
International Conference on Security and Privacy in Communication Systems …, 2022
AndroClonium: Bytecode-level code clone detection for obfuscated Android apps
A Foroughipour, N Stakhanova, F Abazari, B Sistany
IFIP International Conference on ICT Systems Security and Privacy Protection …, 2022
Teaching software‐defined network security through malicious tenant detection
F Abazari, F Esposito, H Takabi, H Hosseinvand, T Pecorella
Internet Technology Letters 2 (6), e131, 2019
Atmsec: A secure protocol for atm machines
Z Ghafari, F Abazari, M Analoui
Second Computer Science Conference on Computer and Information Technology, 2014
Security Enhancement in Open-Source Healthcare Developer Network using Graph Theory
M Fasanghari, HS Cheraghchi, F Abazari, F Pouladi
International Journal of Information and Communication Technology Research …, 2021
Automated offense Prioritization for SIEM using Probabilistic Machine Learning Models
MA Khan, A Azim, F Abazari, F Eargle, J Gardiner
SIEM+: Harnessing Machine Learning for Advanced Anomaly Detection in Cybersecurity Software
A Page, F Abazari, F Eargle, A Azim, J Gardiner
QR-SACP: Quantitative Risk-Based Situational Awareness Calculation and Projection Through Threat Information Sharing
M Safarzadehvahed, F Abazari, F Shabani
Information Security Practice and Experience: 18th International Conference …, 2023
Hacking and Countermeasures in the Cloud
F Abazari, H Takabi, M Analoui
Security, Privacy, and Digital Forensics in the Cloud, 2019
The system can't perform the operation now. Try again later.
Articles 1–19