Login / Signup
Reza Fotohi
ORCID
Publication Activity (10 Years)
Years Active: 2017-2024
Publications (10 Years): 44
Top Topics
Artificial Immune
Lightweight
Wireless Sensor Networks
Deep Learning
Top Venues
CoRR
J. Supercomput.
Wirel. Pers. Commun.
Int. J. Commun. Syst.
</>
Publications
</>
Bahman Varastan
,
Shahram Jamali
,
Reza Fotohi
Hardening of the Internet of Things by using an intrusion detection system based on deep learning.
Clust. Comput.
27 (3) (2024)
Reza Fotohi
,
Fereidoon Shams Aliee
,
Bahar J. Farahani
Decentralized and robust privacy-preserving model using blockchain-enabled Federated Deep Learning in intelligent enterprises.
Appl. Soft Comput.
161 (2024)
Reza Fotohi
,
Masoud Abdan
,
Sanaz Ghasemi
A Self-Adaptive Intrusion Detection System for Securing UAV-to-UAV Communications Based on the Human Immune System in UAV Networks.
J. Grid Comput.
20 (3) (2022)
Hossein Pakdel
,
Mohsen Jahanshahi
,
Reza Fotohi
An Approach to Environmental Monitoring in Sparse Linear Wireless Sensor Networks for Energy Conservation Using Dual Sinks.
Wirel. Pers. Commun.
126 (1) (2022)
Amin Khansoltani
,
Shahram Jamali
,
Reza Fotohi
A Request Redirection Algorithm in Content Delivery Network: Using PROMETHEE Approach.
Wirel. Pers. Commun.
126 (2) (2022)
Yaser Ebazadeh
,
Reza Fotohi
A reliable and secure method for network-layer attack discovery and elimination in mobile ad-hoc networks based on a probabilistic threshold.
Secur. Priv.
5 (1) (2022)
Samane Asgari
,
Shahram Jamali
,
Reza Fotohi
,
Mahdi Nooshyar
Performance-aware placement and chaining scheme for virtualized network functions: a particle swarm optimization approach.
J. Supercomput.
77 (11) (2021)
Seyed Meysam Zarei
,
Reza Fotohi
Defense against flooding attacks using probabilistic thresholds in the internet of things ecosystem.
Secur. Priv.
4 (3) (2021)
Hossein Pakdel
,
Reza Fotohi
A firefly algorithm for power management in wireless sensor networks (WSNs).
CoRR
(2021)
Shahram Jamali
,
Mir Mahmoud Talebi
,
Reza Fotohi
Congestion control in high-speed networks using the probabilistic estimation approach.
CoRR
(2021)
Hossein Pakdel
,
Reza Fotohi
A firefly algorithm for power management in wireless sensor networks (WSNs).
J. Supercomput.
77 (9) (2021)
Reza Fotohi
,
Hossein Pakdel
A Lightweight and Scalable Physical Layer Attack Detection Mechanism for the Internet of Things (IoT) Using Hybrid Security Schema.
Wirel. Pers. Commun.
119 (4) (2021)
Maryam Faraji-Biregani
,
Reza Fotohi
Secure communication between UAVs using a method based on smart agents in unmanned aerial vehicles.
J. Supercomput.
77 (5) (2021)
Marzieh Masoumi
,
Ahmad Keshavarz
,
Reza Fotohi
File fragment recognition based on content and statistical features.
CoRR
(2021)
Samane Asgari
,
Shahram Jamali
,
Reza Fotohi
,
Mahdi Nooshyar
Performance-aware placement and chaining scheme for virtualized network functions: a particle swarm optimization approach.
CoRR
(2021)
Mina Zaminkar
,
Fatemeh Sarkohaki
,
Reza Fotohi
A method based on encryption and node rating for securing the RPL protocol communications in the IoT ecosystem.
Int. J. Commun. Syst.
34 (3) (2021)
Reza Fotohi
,
Hossein Pakdel
A Lightweight and Scalable Physical Layer Attack Detection Mechanism for the Internet of Things (IoT) Using Hybrid Security Schema.
CoRR
(2021)
Monir Shaker
,
Fereidoon Shams Aliee
,
Reza Fotohi
Online rating system development using blockchain-based distributed ledger technology.
CoRR
(2021)
Reza Fotohi
,
Fereidoon Shams Aliee
Securing communication between things using blockchain technology based on authentication and SHA-256 to improving scalability in large-scale IoT.
Comput. Networks
197 (2021)
Seyed Meysam Zarei
,
Reza Fotohi
Defense against flooding attacks using probabilistic thresholds in the internet of things ecosystem.
CoRR
(2021)
Shahram Jamali
,
Mir Mahmoud Talebi
,
Reza Fotohi
Congestion control in high-speed networks using the probabilistic estimation approach.
Int. J. Commun. Syst.
34 (7) (2021)
Mahzad Mahdavisharif
,
Shahram Jamali
,
Reza Fotohi
Big Data-Aware Intrusion Detection System in Communication Networks: a Deep Learning Approach.
J. Grid Comput.
19 (4) (2021)
Monir Shaker
,
Fereidoon Shams Aliee
,
Reza Fotohi
Online rating system development using blockchain-based distributed ledger technology.
Wirel. Networks
27 (3) (2021)
Marzieh Masoumi
,
Ahmad Keshavarz
,
Reza Fotohi
File fragment recognition based on content and statistical features.
Multim. Tools Appl.
80 (12) (2021)
Mina Zaminkar
,
Fatemeh Sarkohaki
,
Reza Fotohi
A method based on encryption and node rating for securing the RPL protocol communications in the IoT ecosystem.
CoRR
(2020)
Fatemeh Sarkohaki
,
Reza Fotohi
,
Vahab Ashrafian
An Efficient Routing Protocol in Mobile Ad-hoc Networks by using Artificial Immune System.
CoRR
(2020)
Mina Zaminkar
,
Reza Fotohi
SoS-RPL: Securing Internet of Things Against Sinkhole Attack Using RPL Protocol-Based Node Rating and Ranking Mechanism.
Wirel. Pers. Commun.
114 (2) (2020)
Behnam Seyedi
,
Reza Fotohi
NIASHPT: a novel intelligent agent-based strategy using hello packet table (HPT) function for trust Internet of Things.
J. Supercomput.
76 (9) (2020)
Reza Fotohi
Securing of Unmanned Aerial Systems (UAS) against security threats using human immune system.
CoRR
(2020)
Mina Zaminkar
,
Reza Fotohi
SoS-RPL: Securing Internet of Things Against Sinkhole Attack Using RPL Protocol-Based Node Rating and Ranking Mechanism.
CoRR
(2020)
Reza Fotohi
,
Yaser Ebazadeh
,
Mohammad Seyyar Geshlag
A New Approach for Improvement Security against DoS Attacks in Vehicular Ad-hoc Network.
CoRR
(2020)
Reza Fotohi
,
Eslam Nazemi
,
Fereidoon Shams Aliee
An agent-based self-protective method to secure communication between UAVs in unmanned aerial vehicle networks.
Veh. Commun.
26 (2020)
Reza Fotohi
,
Somayyeh Firoozi Bari
A novel countermeasure technique to protect WSN against denial-of-sleep attacks using firefly and Hopfield neural network (HNN) algorithms.
CoRR
(2020)
Reza Fotohi
,
Somayyeh Firoozi Bari
,
Mehdi Yusefi
Securing Wireless Sensor Networks Against Denial-of-Sleep Attacks Using RSA Cryptography Algorithm and Interlock Protocol.
Int. J. Commun. Syst.
33 (4) (2020)
Maryam Faraji-Biregani
,
Reza Fotohi
Secure communication between UAVs using a method based on smart agents in unmanned aerial vehicles.
CoRR
(2020)
Reza Fotohi
,
Eslam Nazemi
,
Fereidoon Shams Aliee
An agent-based self-protective method to secure communication between UAVs in unmanned aerial vehicle networks.
CoRR
(2020)
Shahram Behzad
,
Reza Fotohi
,
Jaber Hosseini Balov
,
Mohammad Javad Rabipour
An Artificial Immune Based Approach for Detection and Isolation Misbehavior Attacks in Wireless Networks.
CoRR
(2020)
Kobra Mabodi
,
Mehdi Yusefi
,
Shahram Zandiyan
,
Leili Irankhah
,
Reza Fotohi
Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication.
CoRR
(2020)
Reza Fotohi
,
Somayyeh Firoozi Bari
A novel countermeasure technique to protect WSN against denial-of-sleep attacks using firefly and Hopfield neural network (HNN) algorithms.
J. Supercomput.
76 (9) (2020)
Reza Fotohi
,
Somayyeh Firoozi Bari
,
Mehdi Yusefi
Securing Wireless Sensor Networks Against Denial-of-Sleep Attacks Using RSA Cryptography Algorithm and Interlock Protocol.
CoRR
(2020)
Kobra Mabodi
,
Mehdi Yusefi
,
Shahram Zandiyan
,
Leili Irankhah
,
Reza Fotohi
Multi-level trust-based intelligence schema for securing of internet of things (IoT) against security threats using cryptographic authentication.
J. Supercomput.
76 (9) (2020)
Reza Fotohi
Securing of Unmanned Aerial Systems (UAS) against security threats using human immune system.
Reliab. Eng. Syst. Saf.
193 (2020)
Shahram Behzad
,
Reza Fotohi
,
Jaber Hosseini Balov
,
Mohammad Javad Rabipour
An Artificial Immune Based Approach for Detection and Isolation Misbehavior Attacks in Wireless Networks.
J. Comput.
13 (6) (2018)
Shahram Jamali
,
Reza Fotohi
DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system.
J. Supercomput.
73 (12) (2017)