I agree that this site is using cookies. You can find further informations
here
.
X
Login
My folder (
0
)
Home
About us
Home About us
Our history
Profile
Press & public relations
Friends
The library in figures
Exhibitions
Projects
Training, internships, careers
Films
Services & Information
Home Services & Information
Lending and interlibrary loans
Returns and renewals
Training and library tours
My Account
Library cards
New to the library?
Download Information
Opening hours
Learning spaces
PC, WLAN, copy, scan and print
Catalogs and collections
Home Catalogs and Collections
Rare books and manuscripts
Digital collections
Subject Areas
Our sites
Home Our sites
Central Library
Law Library (Juridicum)
BB Business and Economics (BB11)
BB Physics and Electrical Engineering
TB Engineering and Social Sciences
TB Economics and Nautical Sciences
TB Music
TB Art & Design
TB Bremerhaven
Contact the library
Home Contact the library
Staff Directory
Open access & publishing
Home Open access & publishing
Reference management: Citavi & RefWorks
Publishing documents
Open Access in Bremen
Show Desktop-Version
Toggle navigation
Jalaly Bidgoly, Amir
43
results:
Search for persons
X
Format
Online (43)
Mediatypes
Articles (Online) (35)
OpenAccess-fulltext (8)
Languages
english (36)
Sorted by: Relevance
Sorted by: Year
?
1
ASSOCIATE: A simulator for assessing soft security in the C..:
Narimani Zaman Abadi, Masoud
;
Jalaly Bidgoly, Amir
;
Farjami, Yaghoub
Computer Communications. 217 (2024) - p. 107-125 , 2024
Link:
https://doi.org/10.1016/..
?
2
Mining trauma care flows of patient cohorts:
Yari Eili, Mansoureh
;
Rezaeenour, Jalal
;
Jalaly Bidgoly, Amir
Intelligence-Based Medicine. 10 (2024) - p. 100150 , 2024
Link:
https://doi.org/10.1016/..
?
3
A comprehensive soft security model for Cognitive Internet ..:
Narimani Zaman Abadi, Masoud
;
Jalaly Bidgoly, Amir
;
Farjami, Yaghoub
.
Internet of Things. 23 (2023) - p. 100858 , 2023
Link:
https://doi.org/10.1016/..
?
4
A fair consensus model in blockchain based on computational..:
Mohsenzadeh, Ali
;
Jalaly Bidgoly, Amir
;
Farjami, Yaghoub
Expert Systems with Applications. 204 (2022) - p. 117578 , 2022
Link:
https://doi.org/10.1016/..
?
5
Multi-thread hierarchical deep model for context-aware sent..:
Keramatfar, Abdalsamad
;
Amirkhani, Hossein
;
Jalaly Bidgoly, Amir
Journal of Information Science. 49 (2021) 1 - p. 133-144 , 2021
Link:
https://doi.org/10.1177/..
?
6
Personalization of the collaborator recommendation system i..:
Roozbahani, Zahra
;
Rezaeenour, Jalal
;
Katanforoush, Ali
.
Expert Systems. 39 (2021) 5 - p. , 2021
Link:
https://doi.org/10.1111/..
?
7
A systematic survey on collaborator finding systems in scie..:
Roozbahani, Zahra
;
Rezaeenour, Jalal
;
Emamgholizadeh, Hanif
.
Knowledge and Information Systems. 62 (2020) 10 - p. 3837-3879 , 2020
Link:
https://doi.org/10.1007/..
?
8
A novel reward and penalty trust evaluation model based on ..:
Mohsenzadeh, Ali
;
Jalaly Bidgoly, Amir
;
Farjami, Yaghoub
Journal of Network and Computer Applications. 154 (2020) - p. 102533 , 2020
Link:
https://doi.org/10.1016/..
?
9
A survey on methods and challenges in EEG based authenticat..:
Jalaly Bidgoly, Amir
;
Jalaly Bidgoly, Hamed
;
Arezoumand, Zeynab
Computers & Security. 93 (2020) - p. 101788 , 2020
Link:
https://doi.org/10.1016/..
?
10
Benchmarking reputation systems: A quantitative verificatio..:
Jalaly Bidgoly, Amir
;
Tork Ladani, Behrouz
Computers in Human Behavior. 57 (2016) - p. 274-291 , 2016
Link:
https://doi.org/10.1016/..
?
11
SimGine: A simulation engine for stochastic discrete-event ..:
Khalili, Ali
;
Abdollahi Azgomi, Mohammad
;
Jalaly Bidgoly, Amir
SIMULATION. 89 (2013) 4 - p. 539-555 , 2013
Link:
https://doi.org/10.1177/..
?
12
Benchmarking robustness and privacy-preserving methods in f..:
Alebouyeh, Zeinab
;
Bidgoly, Amir Jalaly
Future Generation Computer Systems. 155 (2024) - p. 18-38 , 2024
Link:
https://doi.org/10.1016/..
?
13
Exploiting Deep Neural Networks as Covert Channels:
Pishbin, Hora Saadaat
;
Bidgoly, Amir Jalaly
IEEE Transactions on Dependable and Secure Computing. 21 (2024) 4 - p. 2115-2126 , 2024
Link:
https://doi.org/10.1109/..
?
14
Edge model: An efficient method to identify and reduce the ..:
shahraki, Mahdi
;
Bidgoly, Amir Jalaly
Future Generation Computer Systems. 157 (2024) - p. 459-468 , 2024
Link:
https://doi.org/10.1016/..
?
15
Robustness evaluation of trust and reputation systems using..:
Bidgoly, Amir Jalaly
;
Arabi, Fereshteh
Computers & Operations Research. 156 (2023) - p. 106250 , 2023
Link:
https://doi.org/10.1016/..
1-15