Seyedakbar Mostafavi

Seyedakbar Mostafavi
Yazd University · Department of Computer Engineering

PhD

About

52
Publications
27,060
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
450
Citations
Introduction
Additional affiliations
September 2010 - September 2016
Amirkabir University of Technology
Position
  • Research Assistant

Publications

Publications (52)
Article
Description: The Internet of Things (IoT) has emerged as a rapidly growing technology that enables seamless connectivity between a wide variety of devices. However, with this increased connectivity comes an increased risk of cyber-attacks. In the recent years, the development of intrusion detection systems (IDSs) has become critical for ensuring th...
Article
Full-text available
Fog computing is a developing paradigm for bringing cloud computing capabilities closer to end-users. Fog computing plays an important role in improving resource utilization and decreasing delay for internet of things (IoT) applications. At the same time, it faces many challenges, including challenges related to energy consumption, scheduling and r...
Article
Full-text available
Distributed denial of service (DDoS) attacks represent a significant cybersecurity challenge, posing a critical risk to computer networks. Developing an effective defense mechanism against these attacks is crucial but challenging, given their diverse attack types, network and computing platform heterogeneity, and complex communication protocols. Mo...
Article
Full-text available
To provide the most relevant answers to the user’s query in the shortest time, search engines require quick data retrieval mechanism. One of the factors affecting the speed of data retrieval is how the load is distributed among the servers. The mechanism of load distribution between servers and consequently the performance of the search engine is a...
Article
Full-text available
Special conditions of wireless sensor networks, such as energy limitation, make it essential to accelerate the convergence of algorithms in this field, especially in the distributed compressive sensing (DCS) scenarios, which have a complex reconstruction phase. This paper presents a DCS reconstruction algorithm that provides a higher convergence ra...
Article
Full-text available
In the distributed infrastructure of fog computing, fog nodes (FNs) can process user requests locally. In order to reduce the delay and response time of a user's requests, incoming requests must be evenly distributed among FNs. For this purpose, in this paper, we propose a blind load-balancing algorithm (BLBA) to improve the load distribution in th...
Article
Full-text available
Unmanned Aerial Vehicles (UAVs) have recently attracted attention in military areas as well as a wide range of commercial and civilian applications. With UAVs equipped with advanced transmitters and sensors, and with high mobility and flexibility in deployment, they have gained a special place in the field of information technology. Since there are...
Article
Full-text available
Service availability plays a vital role on computer networks, against 8 which Distributed Denial of Service (DDoS) attacks are an increasingly grow9 ing threat each year. Machine Learning (ML) is a promising approach widely 10 used for DDoS detection, which obtains satisfactory results for pre-known at11 tacks. However, they are almost incapable of...
Article
Full-text available
Due to the limited resources of Internet of Things (IoT) nodes, routing protocols for these networks should be designed in such a way that not only reduce the packet loss rate and transmission delay, but also to utilize the network resources efficiently. In an emergency, routing of emergency data on these networks requires a significant reduction i...
Article
Full-text available
Devices in the Internet of Things (IoT) have resource constraints in terms of energy, computing power, and memory that make them vulnerable to some security attacks. Due to the increasing volume of multimedia content, lightweight encryption algorithms have been developed to allow IoT nodes to communicate securely with the least computational comple...
Article
Full-text available
Device-to-device (D2D) communication is a dramatic departure from the conventional cellular architecture as it allows for user equipment (UE) in a cellular network to act as transmission relays without the involvement of network infrastructure, effectively realizing a co-existing massive ad-hoc network. While a hybrid D2D-cellular architecture can...
Article
اشیای هوشمند بر بستر اینترنت اشیا به یکدیگر متصل شده و اطلاعات را در محیط های ناهمگن بین یکدیگر مبادله می کنند. داده های متنوع در اینترنت اشیا از محیط های ناهمگن به سمت شبکه فرستاده می شود. تعدد پروتکل ها، میزان ارسال بسته ها، حساسیت بسته ها نسبت به تاخیر و اتلاف نیازمند کیفیت خدمات متنوع می باشند. برای اینکه بتوان کیفیت خدمات را به صورت موثر در مح...
Article
Full-text available
Today's intelligent computing environments, including the Internet of Things (IoT), Cloud Computing (CC), Fog Computing (FC), and Edge Computing (EC), allow many organizations worldwide to optimize their resource allocation regarding the quality of service and energy consumption. Due to the acute conditions of utilizing resources by users and the r...
Article
Full-text available
Software Defined Networks (SDNs) have accelerated and simplified the management, configuration and error detection in today's networking systems. However, SDN is prone to some new security threats, the most important of which is its vulnerability to a new generation of Distributed Denial of Service (DDoS) attack in which fake packets target random...
Conference Paper
Full-text available
با افزایش وسایل هوشمند مختلف در زندگی، اینترنت اشیاء به طور چشم‌گیری رشد داشته است از طرفی با افزایش ارتباط بین این دستگاه‌ها و نیاز به مقیاس‌پذیری و قابلیت انعطاف در شبکه اینترنت اشیاء، فناوری جدیدی به نام شبکه¬های نرمافزار محور برای حل چالش‌های مختلف در اینترنت اشیاء پیشنهاد شده است. هر چند شبکه¬‌های نرم‌افزار محور بسیاری از مشکلات اینترنت اشیا ر...
Article
Full-text available
Network function virtualization (NFV) is a promising paradigm for network service provisioning which decouples the network functions from the physical infrastructure, allowing to deploy the virtualized network functions (VNF) as modular software components over commodity servers. In this architecture, service function chaining (SFC) creates an appl...
Conference Paper
Full-text available
Security is one of the challenges of wireless mesh networks. Intrusion detection systems detect attacks by monitoring traffic flow. This paper introduces the support vector machines method for intrusion detection. In fact, duplicate and irrelevant variables in the data affect the intrusion detection system and reduce the accuracy and increase the d...
Article
Full-text available
Using a massive number of coordinated and distributed machines, botnets have become one of the most sophisticated cyber threats. However, software defined networking leads to more effective mitigation approaches by providing a flexible and dynamic way to control the network. Existing botnet detection approaches fail to detect unknown botnet threats...
Preprint
Full-text available
Internet of Things (IoT) coordinates billions of smart devices that can communicate with each other with little or without human intercession. IoT advances play a vital part in improving numerous real-life smart applications which could make improvement in the quality of life. On the other hand, the crosscutting nature of IoT frameworks and the mul...
Preprint
Full-text available
Recently, software defined networks (SDN) is a new form for networking that has the potential to have a major impact on Internet technology. Key aspect of SDN include, disassociating the data plane from control plane. The control plane consists of one or more controllers which are considered as the brain of SDN network. A centralized controller suf...
Preprint
Full-text available
Today's intelligent computing environments, including Internet of Things, cloud computing and fog computing, allow many organizations around the world to optimize their resource allocation regarding time and energy consumption. Due to the sensitive conditions of utilizing resources by users and the real-time nature of the data, a comprehensive and...
Article
Full-text available
The Cloud is a new computing paradigm that has experienced exponential growth in recent years. Therefore, success in the cloud services industry can be a challenge, as satisfying both cloud service users and providers is challenging. Cloud users expect to receive a higher service quality with the lowest possible prices. On the other hand, cloud ser...
Article
Full-text available
Double auctions are considered to be effective price-scheduling mechanisms to resolve cloud resource allocation and service pricing problems. Most of the classical double auction models use price-based mechanisms in which determination of the winner is based on the prices offered by the agents in the market. In cloud ecosystems, the services offere...
Article
Full-text available
With the increasing and elastic demand for cloud resources, finding an optimal task scheduling mechanism become a challenge for cloud service providers. Due to the time-varying nature of resource demands in length and processing over time and dynamics and heterogeneity of cloud resources, existing myopic task scheduling solutions intended to maximi...
Article
Full-text available
The IoT contains millions of heterogeneous smart objects that are connected together through the Internet platform. These heterogeneous smart objects deal with different protocols, technologies and resources, therefore each of them requires diverse security services in heterogeneous environments. Therefore, providing security services in heterogene...
Conference Paper
Full-text available
The software Defined Networks, by separating the data plane and control plane of the network, have made a drastic change to the scope of computer networks. Although this separation has accelerated and simplified the management, configuration and error detection, it has also caused some new security problems. One of these problems is the Vulnerabili...
Article
Full-text available
Reinforcement learning (RL) is a new research area practical in the internet of things (IoT) where it addresses a broad and relevant task through about making decisions. RL enables interaction of devices and with the environment through a probabilistic approach using the response from its own actions and experiences. RL permits the machine and soft...
Article
Full-text available
In Mobile Ad Hoc Networks (MANETs), lack of a fixed infrastructure, dynamic network topology, device mobility and data communication over wireless channels make the multi-hop routing a very challenging task. Due to mission-critical applications of MANET, dealing with these challenges through the design of a Quality of Service (QoS)-assured protocol...
Article
Full-text available
Energy efficient resource management is critical for prolonging the lifetime of wireless sensor networks (WSNs). Clustering of sensor nodes with the aim of distributing the traffic loads in the network is a proven approach for balanced energy consumption in WSN. The main body of literature in this topic can be classified as hierarchical and distanc...
Article
Full-text available
Software-Defined Networking (SDN) is a viable approach for management of large and extensive networks with flexible quality of service requirements and huge data traffic. Due to the central role of SDN controllers in traffic engineering and performance of software-defined networks on one hand, and diversity of available SDN controllers on the other...
Article
Full-text available
Fog computing is a promising computing paradigm that extends cloud computing to the edge of networks where it provides services closer to users characterized by closer proximity to end-users and bigger geographical distribution, local resource pooling, latency reduction and backbone bandwidth savings. Fog computing supports vertically-isolated, lat...
Article
Full-text available
Edge computing is a promising paradigm where resource processing is close to the edge of the Internet. Due to an increasing number of devices forming an interconnected network of devices in the Internet of Things (IoT) leading a huge amounts of data are produced. Internet traffic usage has been significantly increased over the years. In this paper,...
Preprint
With the apperance of cloud computing, users receive computing resources according to pay as you go of cloud service provider. An optimized scheduling approach for mapping all the tasks to the resources is an essential problem due to the limitations and dynamics of resources for requests which vary during the time. This solution may lead to improve...
Preprint
Energy efficient resource management is critical for prolonging the lifetime of wireless sensor networks (WSN). Clustering of sensor nodes with the aim of distributing the traffic loads in the network is a proven approach for balanced energy consumption in WSN. The main body of literature in this topic can be classified as hierarchical and distance...
Article
Full-text available
یکپارچگی عمودی و ویژگی‌های اینترنت اشیاء ازجمله ناهمگونی نیاز‌مندی‌ها، ارتباطات، داده‌ها و تجهیزات، پیچیدگی و وسعت این شبکه منجر به بروز مشکلاتی مانند دشواری مدیریت شبکه، عدم پویایی، افزونگی منابع و افزایش هزینه‌ها می‌شود. شبکه‌های نرم‌افزارمحور با فراهم نمودن یک واحد مدیریت به‌صورت منطقی متمرکز و یک دید جامع برای تصمیم‌گیری‌ها موجب افزایش انعطاف‌پ...
Article
Full-text available
One of the current issues in the peer-to-peer streaming systems is to supply sufficient upload bandwidth for continuous streaming of high-quality video channels. The helpers as upload bandwidth boosters can improve the streaming capacity of system, so that the imbalance of upload bandwidth between different video channel overlays is compensated. Wi...
Article
Full-text available
Video traffic offloading through the helper peers can significantly alleviate the server workload and enhance users' quality of experience. In this paper, the complex interactions of a number of helpers seeking to trade their bandwidth surplus in a peer-to-peer market are studied using non-cooperative game theory and double auction. In particular,...
Article
Full-text available
With the dramatic growth of Internet video streaming applications, resource provisioning for video streaming systems to satisfy their upload bandwidth deficit is a challenging task. The design of incentive mechanisms for taking advantage of unused upload capability of helper peers is proven to be a viable, cost-effective solution for this problem....
Article
Full-text available
In Peer-to-Peer (P2P) multichannel live streaming, helper peers with surplus bandwidth resources act as micro-servers to compensate the server deficiencies in balancing the resources between different channel overlays. With deployment of helper level between server and peers, optimizing the user/helper topology becomes a challenging task since appl...

Network

Cited By