Mohammad Ghasemigol

Mohammad Ghasemigol
University of Birjand · Department of Computer Engineering

PhD in Computer Engineering

About

37
Publications
15,372
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
441
Citations
Citations since 2016
21 Research Items
393 Citations
2016201720182019202020212022020406080100
2016201720182019202020212022020406080100
2016201720182019202020212022020406080100
2016201720182019202020212022020406080100
Introduction
I received the Ph.D. degree in Computer Engineering from Ferdowsi University of Mashhad (FUM). Then, I have joined the Department of Computer Engineering at the University of Birjand in fall 2016. November 2014 to July 2015, I was with the Department of Computer Science and Engineering, University of North Texas, as a visiting research scholar. My research interests include network security, intrusion detection and response systems, alert management, data mining, and optimization problems.
Additional affiliations
November 2014 - February 2015
Ferdowsi University Of Mashhad
Position
  • Research Assistant

Publications

Publications (37)
Article
Full-text available
Alopecia Areata (AA) is characterised by an autoimmune response to hair follicles (HFs) and its exact pathobiology remains unclear. The current study aims to look into the molecular changes in the skin of AA patients as well as the potential underlying molecular mechanisms of AA in order to identify potential candidates for early detection and trea...
Article
Full-text available
Multiple sclerosis (MS) is an inflammatory disease of the central nervous system (CNS). Dysregulated immune responses have been implicated in MS development. Growing evidence has indicated that inhibitory immune checkpoint molecules can substantially regulate immune responses and maintain immune tolerance. V-domain Ig suppressor of T cell activatio...
Preprint
Full-text available
Cardiovascular disease is one of the most challenging diseases in middle-aged and older people, which causes high mortality. Coronary artery disease (CAD) is known as a common cardiovascular disease. A standard clinical tool for diagnosing CAD is angiography. The main challenges are dangerous side effects and high angiography costs. Today, the deve...
Article
Full-text available
Cardiovascular disease is one of the most challenging diseases in middle-aged and older people, which causes high mortality. Coronary artery disease (CAD) is known as a common cardiovascular disease. A standard clinical tool for diagnosing CAD is angiography. The main challenges are dangerous side effects and high angiography costs. Today, the deve...
Article
Wireless sensor network (WSN) is an applied technology widely used in various areas. According to the WSN limitations, they usually face many types of attacks. The sinkhole is the most popular and dangerous attack in the routing of WSN. There are many approaches to counter sinkhole attacks in the literature. The mobile agent methods generate better...
Preprint
Full-text available
Traditional bulk sequencing methods are limited to measuring the average signal in a group of cells, potentially masking heterogeneity, and rare populations. The single-cell resolution, however, enhances our understanding of complex biological systems and diseases, such as cancer, the immune system, and chronic diseases. However, the single-cell te...
Article
Full-text available
The coronavirus disease-2019 (COVID-19) pandemic has caused an enormous loss of lives. Various clinical trials of vaccines and drugs are being conducted worldwide; nevertheless, as of today, no effective drug exists for COVID-19. The identification of key genes and pathways in this disease may lead to finding potential drug targets and biomarkers....
Article
Full-text available
One of the most common and critical destructive attacks on the victim system is the advanced persistent threat (APT)-attack. An APT attacker can achieve its hostile goal through obtaining information and gaining financial benefits from the infrastructure of a network. One of the solutions to detect a unanimous APT attack is using network traffic. D...
Preprint
Full-text available
One of the most common and important destructive attacks on the victim system is Advanced Persistent Threat (APT)-attack. The APT attacker can achieve his hostile goals by obtaining information and gaining financial benefits regarding the infrastructure of a network. One of the solutions to detect a secret APT attack is using network traffic. Due t...
Preprint
Full-text available
One of the most common and important destructive attacks on the victim system is Advanced Persistent Threats (APT)-attack. The APT attacker can achieve his hostile goals by obtaining information and gaining financial benefits regarding the infrastructure of a network. One of the solutions to detect a secret APT attack is using network traffic. Due...
Preprint
Fraud detection is an important topic that applies to various enterprises such as banking and financial sectors, insurance, government agencies, law enforcement, and more. Fraud attempts have been risen remarkably in current years, shaping fraud detection an essential topic for research. One of the main challenges in fraud detection is acquiring fr...
Article
Full-text available
Heart disease is one of the most common diseases in middle-aged citizens. Among the vast number of heart diseases, coronary artery disease (CAD) is considered as a common cardiovascular disease with a high death rate. The most popular tool for diagnosing CAD is the use of medical imaging, e.g., angiography. However, angiography is known for being c...
Preprint
Full-text available
Heart disease is one of the most common diseases in middle-aged citizens. Among the vast number of heart diseases, coronary artery disease (CAD) is considered a common cardiovascular disease with a high death rate. The most popular tool for diagnosing CAD is the use of medical imaging, e.g., angiography. However, angiography is known for being cost...
Preprint
Full-text available
Heart disease is one of the most common diseases in middle-aged citizens. Among the vast number of heart diseases, the coronary artery disease (CAD) is considered as a common cardiovascular disease with a high death rate. The most popular tool for diagnosing CAD is the use of medical imaging, e.g., angiography. However, angiography is known for bei...
Article
Full-text available
Wireless sensor networks (WSNs) include large-scale sensor nodes that are densely distributed over a geographical region that is completely randomized for monitoring, identifying, and analyzing physical events. The crucial challenge in wireless sensor networks is the very high dependence of the sensor nodes on limited battery power to exchange info...
Chapter
Cloud Computing is the most important solution to extend Information Technology's (IT) capabilities. However, Cloud is still vulnerable to a variety of threats and attacks that affects the growth of cloud computing in recent years. Therefore, the security concerns should be considered to improve the assurance of required security for the cloud cust...
Chapter
Cloud infrastructure consists of different components such as servers, storage, network, management and deployment software, and platform virtualization. Therefore, the cloud infrastructure security is the most important part in cloud security and any attacks to the cloud infrastructure will cause a large amount of service disruption. In this chapt...
Article
Full-text available
The use of acoustic emission (AE) technique for damage diagnostic is typically challenging due to difficulties associated with discrimination of events that occur during different stages of damage that take place in a material or a structure. In this study, an unsupervised kernel fuzzy c-means pattern recognition analysis and the principal componen...
Article
Full-text available
There are several characteristics in computer networks, which play important roles in determining the level of network security. These characteristics known as security metrics can be applied for security quantification in computer networks. Most of the researches on this area has focused on defining the new security metrics to improve the quantifi...
Article
Intrusion response system (IRS) is one of the most important components in the network security solution that selects appropriate countermeasures to handle the intrusion alerts. Recently, many techniques have been proposed in designing an automated IRS. However, one of the big challenges in intrusion response system which is not considered in the l...
Article
Full-text available
Insider threat is a great challenge for most organizations in today’s digital world. It has received substantial research attention as a significant source of information security threat that could cause more financial losses and damages than any other threats. However, designing an effective monitoring and detection framework is a very challenging...
Article
Forecasting future attacks is a big challenge for network administrators because future is generally unknown. Nevertheless, some information about the future can help us make better decisions in present time. Attack graph is the most well-known tool for risk assessment and attack prediction. However, it only provides static information about probab...
Conference Paper
Insider threat is one of the greatest concerns for the information security system that could cause greater financial losses and damages than any other attacks. Recently many studies have been proposed to monitor and detect the insider attacks. However, implementing an effective detection system is a very challenging task. In this paper, we investi...
Article
Anomaly detection is an important challenge in wireless sensor networks (WSNs) for fault diagnosis and intrusion detection applications. Sensor nodes are usually designed to be small and inexpensive, so they have limited capabilities, such as limited computational power, memory and energy. This paper presents novel light-weight distributed anomaly...
Article
With the rapid size and complexity growth of computer networks, network supervisors are now facing a new problem, which is to analyze and manage the large amounts of security alerts that can be generated by security devices. Alert correlation systems attempt to solve this problem by finding the similarity and causality relationships between raw ale...
Conference Paper
With the development of computer networks, security devices produce a large volume of low-level alerts. Analysis and management of these intrusion alerts is troublesome and time consuming task for network supervisors and intrusion response systems. The alert correlation methods find similarity and causality relationships between raw alerts to reduc...
Article
This paper presents a new hierarchical tree approach to clustering fuzzy data, namely extensional tree (ET) clustering algorithm. It defines a dendrogram over fuzzy data and using a new distance between fuzzy numbers based on α-cuts. The present work is based on hierarchical clustering algorithm unlike existing methods which improve FCM to support...
Article
This paper presents a novel approach to describe the normal behavior of computer networks (as used in IDS) based on Support Vector Data Description (SVDD). In the proposed method we find a minimal hyper-ellipse around the normal objects in the input space. Hyper-ellipse can be expanded in high dimensional space (ESVDD) or to be used as a preprocess...
Article
Full-text available
This paper presents a novel approach to cluster Fuzzy numbers using hierarchical method to be called (FHCA). In this approach a Dendrogram is drawn over fuzzy numbers until we could cluster fuzzy numbers using hierarchical cluster tree with inconsistency coefficient or other useful measures. All the similar previous methods extended FCM (Fuzzy Clus...
Article
Full-text available
This paper presents a novel approach to eliminate the effect of noisy samples from the learning step of Support Vector Data Description (SVDD) method. SVDD is a popular kernel method which tries to fit a hypersphere around the target object and can obtain more flexible and more accurate data descriptions by using proper kernel functions. Nonetheles...
Conference Paper
This paper presents a new approach in data description for intrusion detection based on Support Vector Data Description (SVDD). The SVDD is a well-known kernel method which tries to fit a hypersphere around the target objects and more precise boundary is depending on using proper kernel functions. In the proposed method we find a minimal hyperellip...
Conference Paper
Full-text available
This paper presents a novel Boundary-based approach in one-class classification that is inspired by support vector data description (SVDD). The SVDD is a popular kernel method which tries to fit a hypersphere around the target objects and of course more precise boundary is relied on selecting proper parameters for the kernel functions. Even with a...
Conference Paper
Full-text available
This paper presents a new approach to clustering fuzzy data, called Extensional Tree (ET) clustering algorithm by defining a dendrogram over fuzzy data and using a new metric between fuzzy numbers based on α-cuts. All the similar previous methods extended FCM to support fuzzy data. The present work is based on hierarchical clustering algorithm to c...
Article
Full-text available
In this paper we will implement a new version of master-worker architecture that improves the previous ones. The common Master-Worker paradigm consists of two entities: a master and multiple workers. The master is responsible for decomposing the problem into small tasks and managing them until all tasks are completed. Therefore, the master should e...
Conference Paper
Full-text available
This paper presents a new approach to cluster Fuzzy number using hierarchical method namely Fuzzy Linkage (FL). In this way a Dendrogram is drawn over fuzzy numbers until we could cluster fuzzy numbers using hierarchical cluster tree with inconsistency coefficient or other useful measure. Almost, similar methods extended FCM (Fuzzy Clustering Metho...

Network

Cited By