BibTeX records: Mehdi Yousefi

download as .bib file

@article{DBLP:journals/access/GhashghaeiEQAY25,
  author       = {Farshad Rahimi Ghashghaei and
                  Nebrase Elmrabit and
                  Ayyaz{-}Ul{-}Haq Qureshi and
                  Adnan Akhunzada and
                  Mehdi Yousefi},
  title        = {Advanced Quantum Control With Ensemble Reinforcement Learning: {A}
                  Case Study on the {XY} Spin Chain},
  journal      = {{IEEE} Access},
  volume       = {13},
  pages        = {49514--49526},
  year         = {2025},
  url          = {https://doi.org/10.1109/ACCESS.2025.3551232},
  doi          = {10.1109/ACCESS.2025.3551232},
  timestamp    = {Tue, 08 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/GhashghaeiEQAY25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computers/GhashghaeiAEY25,
  author       = {Farshad Rahimi Ghashghaei and
                  Yussuf Ahmed and
                  Nebrase Elmrabit and
                  Mehdi Yousefi},
  title        = {Correction: Ghashghaei et al. Enhancing the Security of Classical
                  Communication with Post-Quantum Authenticated-Encryption Schemes for
                  the Quantum Key Distribution. Computers 2024, 13, 163},
  journal      = {Comput.},
  volume       = {14},
  number       = {2},
  pages        = {64},
  year         = {2025},
  url          = {https://doi.org/10.3390/computers14020064},
  doi          = {10.3390/COMPUTERS14020064},
  timestamp    = {Fri, 09 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computers/GhashghaeiAEY25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/JinGEAY24,
  author       = {Hyo Jung Jin and
                  Farshad Rahimi Ghashghaei and
                  Nebrase Elmrabit and
                  Yussuf Ahmed and
                  Mehdi Yousefi},
  title        = {Enhancing Sniffing Detection in IoT Home Wi-Fi Networks: An Ensemble
                  Learning Approach With Network Monitoring System {(NMS)}},
  journal      = {{IEEE} Access},
  volume       = {12},
  pages        = {86840--86853},
  year         = {2024},
  url          = {https://doi.org/10.1109/ACCESS.2024.3416095},
  doi          = {10.1109/ACCESS.2024.3416095},
  timestamp    = {Fri, 19 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/JinGEAY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computers/GhashghaeiAEY24,
  author       = {Farshad Rahimi Ghashghaei and
                  Yussuf Ahmed and
                  Nebrase Elmrabit and
                  Mehdi Yousefi},
  title        = {Enhancing the Security of Classical Communication with Post-Quantum
                  Authenticated-Encryption Schemes for the Quantum Key Distribution},
  journal      = {Comput.},
  volume       = {13},
  number       = {7},
  pages        = {163},
  year         = {2024},
  url          = {https://doi.org/10.3390/computers13070163},
  doi          = {10.3390/COMPUTERS13070163},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computers/GhashghaeiAEY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2404-09052,
  author       = {Yussuf Ahmed and
                  Micheal Ezealor and
                  Haitham H. Mahmoud and
                  Muhammad Ajmal Azad and
                  Mohamed Ben Farah and
                  Mehdi Yousefi},
  title        = {Enhancing Security Awareness Through Gamified Approaches},
  journal      = {CoRR},
  volume       = {abs/2404.09052},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2404.09052},
  doi          = {10.48550/ARXIV.2404.09052},
  eprinttype    = {arXiv},
  eprint       = {2404.09052},
  timestamp    = {Mon, 05 Jan 2026 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2404-09052.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computers/AbdulghaffarEY23,
  author       = {Khaled Abdulghaffar and
                  Nebrase Elmrabit and
                  Mehdi Yousefi},
  title        = {Enhancing Web Application Security through Automated Penetration Testing
                  with Multiple Vulnerability Scanners},
  journal      = {Comput.},
  volume       = {12},
  number       = {11},
  pages        = {235},
  year         = {2023},
  url          = {https://doi.org/10.3390/computers12110235},
  doi          = {10.3390/COMPUTERS12110235},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computers/AbdulghaffarEY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aci/FazaeliKVYASM21,
  author       = {Somayeh Fazaeli and
                  Taleb Khodaveisi and
                  Ali Khorsand Vakilzadeh and
                  Mehdi Yousefi and
                  Atousa Ariafar and
                  Mohsen Shokoohizadeh and
                  Saeed Mohammad{-}Pour},
  title        = {Development, Implementation, and User Evaluation of {COVID-19} Dashboard
                  in a Third-Level Hospital in Iran},
  journal      = {Appl. Clin. Inform.},
  volume       = {12},
  number       = {5},
  pages        = {1091--1100},
  year         = {2021},
  url          = {https://doi.org/10.1055/s-0041-1740188},
  doi          = {10.1055/S-0041-1740188},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aci/FazaeliKVYASM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computers/QureshiLYAM20,
  author       = {Ayyaz{-}Ul{-}Haq Qureshi and
                  Hadi Larijani and
                  Mehdi Yousefi and
                  Ahsan Adeel and
                  Nhamoinesu Mtetwa},
  title        = {An Adversarial Approach for Intrusion Detection Systems Using Jacobian
                  Saliency Map Attacks {(JSMA)} Algorithm},
  journal      = {Comput.},
  volume       = {9},
  number       = {3},
  pages        = {58},
  year         = {2020},
  url          = {https://doi.org/10.3390/computers9030058},
  doi          = {10.3390/COMPUTERS9030058},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/computers/QureshiLYAM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/QureshiLMYJ20,
  author       = {Ayyaz{-}Ul{-}Haq Qureshi and
                  Hadi Larijani and
                  Nhamoinesu Mtetwa and
                  Mehdi Yousefi and
                  Abbas Javed},
  title        = {An Adversarial Attack Detection Paradigm With Swarm Optimization},
  booktitle    = {2020 International Joint Conference on Neural Networks, {IJCNN} 2020,
                  Glasgow, United Kingdom, July 19-24, 2020},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/IJCNN48605.2020.9207627},
  doi          = {10.1109/IJCNN48605.2020.9207627},
  timestamp    = {Tue, 06 Oct 2020 15:44:04 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcnn/QureshiLMYJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ucet/HosseinzadehRYC20,
  author       = {Salaheddin Hosseinzadeh and
                  Naeem Ramzan and
                  Mehdi Yousefi and
                  Krystyna Curtis and
                  Hadi Larijani},
  title        = {Impact of Spreading Factor on LoRaWAN Propagation in a Metropolitan
                  Environment},
  booktitle    = {2020 International Conference on UK-China Emerging Technologies, {UCET}
                  2020, Glasgow, United Kingdom, August 20-21, 2020},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/UCET51115.2020.9205422},
  doi          = {10.1109/UCET51115.2020.9205422},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ucet/HosseinzadehRYC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/YousefiMZT18,
  author       = {Mehdi Yousefi and
                  Nhamo Mtetwa and
                  Yan Zhang and
                  Huaglory Tianfield},
  title        = {A Reinforcement Learning Approach for Attack Graph Analysis},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {212--217},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00041},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00041},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/YousefiMZT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/YousefiMZT17,
  author       = {Mehdi Yousefi and
                  Nhamo Mtetwa and
                  Yan Zhang and
                  Huaglory Tianfield},
  title        = {A novel approach for analysis of attack graph},
  booktitle    = {2017 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2017, Beijing, China, July 22-24, 2017},
  pages        = {7--12},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ISI.2017.8004866},
  doi          = {10.1109/ISI.2017.8004866},
  timestamp    = {Tue, 13 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/YousefiMZT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/MaleknejadYN07,
  author       = {Khosrow Maleknejad and
                  Mehdi Yousefi and
                  Kazem Nouri},
  title        = {Computational methods for integrals involving functions and Daubechies
                  wavelets},
  journal      = {Appl. Math. Comput.},
  volume       = {189},
  number       = {2},
  pages        = {1828--1840},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.amc.2006.12.064},
  doi          = {10.1016/J.AMC.2006.12.064},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amc/MaleknejadYN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/MaleknejadNY07,
  author       = {Khosrow Maleknejad and
                  Kazem Nouri and
                  Mehdi Yousefi},
  title        = {Discussion on convergence of Legendre polynomial for numerical solution
                  of integral equations},
  journal      = {Appl. Math. Comput.},
  volume       = {193},
  number       = {2},
  pages        = {335--339},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.amc.2007.03.062},
  doi          = {10.1016/J.AMC.2007.03.062},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amc/MaleknejadNY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/MaleknejadY06,
  author       = {Khosrow Maleknejad and
                  Mehdi Yousefi},
  title        = {Numerical solution of the integral equation of the second kind by
                  using wavelet bases of Hermite cubic splines},
  journal      = {Appl. Math. Comput.},
  volume       = {183},
  number       = {1},
  pages        = {134--141},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.amc.2006.05.104},
  doi          = {10.1016/J.AMC.2006.05.104},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amc/MaleknejadY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}