Publications

Google Scholar Google Scholar, Publons Publons, Scopus Scopus, DBLP DBLP, OrcID OrcID, Liknedin Liknedin, ResearchGate ResearchGate

Quick links: Journal papers, Conference papers, Persian journal papers, Persian conference papers,


Journal papers



[J27], Mohammadhadi Alaeiyan, Mehdi Alaeiyan, and Karrar Khudhair Obayes.
Machine Learning Predicts Graph Properties, Clique, Girth, and Independent Numbers.
In Discrete Mathematics, Algorithms and Applications, 2024.
10.1142/S1793830924501131. (ISI,IF 0.6, Q4).

[J26], Mehdi Alaeiyan, Karrar Khudhair Obayes, Mohammadhadi Alaeiyan.
Prediction Nullity of Graph using Machine Learning.
In Results in Nonlinear Analysis (RNA), 2023.
(Scopus Q3).

[J24], Mohammadhadi Alaeiyan, Saeed Parsa, and Vinod P.
Sober: Explores for invasive behaviour of malware.
In (Elsevier) Journal of Information Security and Applications, 2023.
10.1016/j.jisa.2023.103451, (ISI, IF 4.69, Q1)

[J25], Mehdi Alaeiyan, Muhammad Kamran Jamil, and Mohammadhadi Alaeiyan.
Perfect 2-Colorings of Cn × Cm.
In Journal of Algebra and Related Topics, 2023.
10.22124/JART.2023.18779.1250. (ISI, IF 0.29, Q4)

[J20], Mohammadhadi Alaeiyan, Saeed Parsa.
A hierarchical layer of atomic behavior for malicious behaviors prediction.
In (Springer) Journal of Computer Virology and Hacking Techniques, 2022.
10.1007/s11416-022-00422-5, (ISI, IF 4.21, Q1)

[J2], Mohammadhadi Alaeiyan, Saeed Parsa, Vinod P., Mauro Conti.
Detection of Algorithmically-Generated Domains: An adversarial machine learning approach.
In (Elsevier) Computer Communication, 160, 661-673, 2020.
10.1016/j.comcom.2020.04.033, (ISI, IF 3.066, Q1) [srouce code]

[J4], Mehdi Alaeiyan, Amirabbas Abedi, Mohammadhadi Alaeiyan
Perfect 3-colorings of the Johnson graph J(6, 3).
In Bulletin of the Iranian Mathematical Society, 1-10, 2020.
10.1007/s41980-019-00346-9, (ISI, IF 0.390, Q3).

[J17], Mohammadhadi Alaeiyan and Saeed Parsa
Analysis of disassembled executable codes by abstract interpretation.
In International Journal of Nonlinear Analysis and Applications, 10(1), 9-13, 2019.
10.22075/IJNAA.2019.4048, (ISI).

[J6], Mohammadhadi Alaeiyan, Ali Dehghantanha, Tooska Dargahi, Mauro Conti, Saeed Parsa.
A Multi-label Fuzzy Relevance Clustering system for Malware Attack Attribution in the Edge Layer of Cyber-Physical Networks.
In ACM Transactions on Cyber-Physical Systems (TCPS), 4(3), 1-22, 2020.
10.1145/3351881, (ISI)

[J1], Mohammadhadi Alaeiyan, Saeed Parsa, Mauro Conti.
Analysis and Classification of Context-based Malware Behavior.
In (Elsevier) Computer Communication, 136, 76-90, 2019.
10.1016/j.comcom.2019.01.003, (ISI, IF 3.066, Q1)

[J13], Mohammadhadi Alaeiyan and Amirabbas Abedi.
Perfect 3-colorings of the Johnson graphs J(4,2), J(5, 2), J(6, 2) and Petersen graph.
In ARS COMBINATORIA, 140, 199-213, 2018.
(ISI, IF 0.247, Q3)

[J3], Mohammadhadi Alaeiyan and Hamed Karami.
Perfect 2-colorings of the Platonic graphs.
In International Journal of Nonlinear Analysis and Applications, 8(2), 29-35, 2017.
10.22075/IJNAA.2016.455, (ISI)

[J7], Saeed Parsa and Mohammadhadi Alaeiyan.
A combination of curve fitting algorithms to collect a few training samples for function approximation.
In JOURNAL OF MATHEMATICS AND COMPUTER SCIENCE-JMCS, 17(3), 355-364, 2017.
10.22436/jmcs.017.03.02, (ISI)

[J18], Mohammadhadi Alaeiyan.
A Graph-Based Solution to University Timetabling.
In Turkish Journal of Engineering, Science and Technology, 1(3), 32-35, 2013.

[J19], Mohammadhadi Alaeiyan.
The edge-labeling and vertex-colors of Kn.
In (Springer) Mathematical Sciences a springeropen journal, 6(45), 2012.
10.1186/2251-7456-6-45, Online ISSN=2251-7456, Print ISSN=2008-1359.


Conference papers


[C6], Mohammadhadi Alaeiyan, Ali Hamedi, M.A. SoltanBeigi, AmirReza Parvahan, AmirAli Ghaedi
Enhancing Code Privacy: An Exploratory Implementation of Java DataFlow Obfuscation
In Proceedings of the 8th International Conference on Combinatorics, Cryptography, Computer Science and Computation
Tehran, Iran, November 15-16th 2023.

[C5], Hassan Naderi, Vinod P., Mauro Conti, Saeed Parsa, Mohammadhadi Alaeiyan.
Malware Signature Generation using by Locality Sensitive Hashing, [ppt][book][acceptance]
In Proceedings of the 2nd ISEA International Conference on Security & Privacy 2018
(ISEA ISAP 2018), MNIT, Jaipur, India, January 9-11, 2019.

[C4], Mohammadhadi Alaeiyan, Saeed Parsa.
Automatic loop detection in the Sequence of system calls.
In 2nd international conference on knowledge-based engineering and innovation, Tehran, Iran, 2015.


Persian journal papers



[J22], Seyed Ata S. Jafari, Mohammadhadi Alaeiyan, and Saeed Parsa
An automated approach to analysis and classification of Crypto-ransomwares’ family.[FA]
In Biannual Journal Monadi for Cyberspace Security (AFTA), 8(2), 75-88, 2020(1399).

[J9], Saeed Parsa, Mohammadhadi Alaeiyan
دسته بندی خانواده باج افزارهای رمزگذار با استفاده از پرونجاهای دام.
In پدافند الكترونيكي و سايبري – دانشگاه جامع امام حسين (ع), In press.

[J12], Saeed Parsa, Mohammadhadi Alaeiyan, SH.Sadeghnia.
تحلیل و شناسایی رفتارهای انتشاری کرم‌ها.
In پدافند غیرعامل – دانشگاه جامع امام حسين (ع), 10(1), 109-122, 2019(1398).

[J8], Saeed Parsa Hamidreza salehi, and Mohammadhadi Alaeiyan.
مبهم سازی کد به منظور جلوگیری از اجرای نمادین.
In پدافند الكترونيكي و سايبري – دانشگاه جامع امام حسين (ع), 6(1), 1-16, 2018(1397).

[J14], Saeed Parsa Hassan Saifi, and Mohammadhadi Alaeiyan.
ارائه یک رهیافت جدید مبتنی بر گراف وابستگی بین فراخوانی های سیستمی برای استخراج الگوهای رفتاری مخرب.
In پدافند الكترونيكي و سايبري – دانشگاه جامع امام حسين (ع), 4(3), 47-60, 2016(1395).

Persian conference papers


[C7], طه اخلاق‌پسندی و محمدهادی علائیان
تشخیص حملات: یک روش خصمانه یادگیری ماشین
In 7th International Conference on Combinatorics, Cryptography, Computer Science and Computation , Tehran, Iran, 2022.

[C6], طه اخلاق‌پسندی و محمدهادی علائیان
تشخیص بوها در کد با استفاده از روش های یادگیری عمیق
In 7th International Conference on Combinatorics, Cryptography, Computer Science and Computation , Tehran, Iran, 2022.

[C3], Hassan Naderi and Mohammadhadi Alaeiyan
تولید امضای بدافزارها با استفاده از خوشهبندی به روش درهمسازی حساس به محلیت
In International Conference on Combinatorics, Cryptography and Computation, Tehran, Iran, 2016.

[C2], Saeed Parsa and Mohammadhadi Alaeiyan
مبهم سازی کد با استفاده از تفسیر انتزاعی, [pdf]
In International Conference on Combinatorics, Cryptography and Computation, Tehran, Iran, 2016.

[C1], Hadi Salehi and Mohammadhadi Alaeiyan
ارائه یک فرا - معماری سامانه ای از سامانه ها مبتنی بر ارزیابی فازی, [pdf]
In International Conference on Combinatorics, Cryptography and Computation, Tehran, Iran, 2016.