Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mona Taghavi is active.

Publication


Featured researches published by Mona Taghavi.


Journal of Network and Computer Applications | 2013

Review: An intrusion detection and prevention system in cloud computing: A systematic review

Ahmed Patel; Mona Taghavi; Kaveh Bakhtiyari; Joaquim Celestino Júnior

The distributed and open structure of cloud computing and services becomes an attractive target for potential cyber-attacks by intruders. The traditional Intrusion Detection and Prevention Systems (IDPS) are largely inefficient to be deployed in cloud computing environments due to their openness and specific essence. This paper surveys, explores and informs researchers about the latest developed IDPSs and alarm management techniques by providing a comprehensive taxonomy and investigating possible solutions to detect and prevent intrusions in cloud computing systems. Considering the desired characteristics of IDPS and cloud computing systems, a list of germane requirements is identified and four concepts of autonomic computing self-management, ontology, risk management, and fuzzy theory are leveraged to satisfy these requirements.


Library Hi Tech | 2011

Evaluation of cheating detection methods in academic writings

Ahmed Patel; Kaveh Bakhtiyari; Mona Taghavi

Purpose – This paper aims to focus on plagiarism and the consequences of anti‐plagiarism services such as Turnitin.com, iThenticate, and PlagiarismDetect.com in detecting the most recent cheatings in academic and other writings.Design/methodology/approach – The most important approach is plagiarism prevention and finding proper solutions for detecting more complex kinds of plagiarism through natural language processing and artificial intelligence self‐learning techniques.Findings – The research shows that most of the anti‐plagiarism services can be cracked through different methods and artificial intelligence techniques can help to improve the performance of the detection procedure.Research limitations/implications – Accessing entire data and plagiarism algorithms is not possible completely, so comparing is just based on the outputs from detection services. They may produce different results on the same inputs.Practical implications – Academic papers and web pages are increasing over time, and it is very ...


international conference on networks | 2012

BEE-C: A bio-inspired energy efficient cluster-based algorithm for data continuous dissemination in Wireless Sensor Networks

Antoniel da Silva Rego; Joaquim Celestino; André L. M. dos Santos; Eduardo Cerqueira; Ahmed Patel; Mona Taghavi

Wireless Sensor Network is a special type of ad hoc networks that show many challenges, mainly related to energy consumption of sensor nodes. This paper presents the BEE-C, a hierarchical routing algorithm bioinspired by the behavior of bees for Wireless Sensor Networks (WSN), which aims to save energy of sensor nodes. The BEE-C is based on the LEACH (Low Energy Adaptive Clustering Hierarchy) protocol and LEACH-C (LEACH Centered) protocol, which are two well known protocols for WSN in the literature. The BEE-C is applied to sensor networks with continuous data dissemination. The results show gains on BEE-C compared to LEACH and LEACH-C.


CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security | 2012

Taxonomy and proposed architecture of intrusion detection and prevention systems for cloud computing

Ahmed Patel; Mona Taghavi; Kaveh Bakhtiyari; Joaquim Celestino Júnior

The distributed and open structure of cloud computing and services becomes an attractive target for potential cyber-attacks by intruders. The traditional Intrusion Detection and Prevention Systems (IDPS) are deemed largely inefficient to be deployed in cloud computing environments due to their openness, dynamicity and virtualization in offered services. This paper surveys and explores the possible solutions to detect and prevent intrusions in cloud computing systems by providing a comprehensive taxonomy of existing IDPS. It discusses the key features of IDPS that are challenging and crucial for choosing the right security measures for designing an IDPS. The paper further reviews the current state of the art of developed IDPSs for cloud computing which uses advanced techniques in overcoming the challenges imposed by cloud computing requirements for more resilient, effective and efficient IDPSs, abbreviated as CIPDS.


Journal of Science and Technology Policy Management | 2014

Planning for sustainable development in the emerging information societies

Mona Taghavi; Kaveh Bakhtiyari; Hamed Taghavi; Vahhab Olyaee Attar; Aini Hussain

Purpose – This research work aims to investigate the recent status of the information and communication technology (ICT) services industry in Iran. It proposes a systemic applicable approach at policymaking level and appropriate strategic planning steps to enlighten developing countries toward achieving their target objectives of an information society. Design/methodology/approach – Largely based on existing literature and usage statistics in ICT services, global technology trends and results from a survey to obtain consistent and up-to-date information about current issues of ICT services in the public and private sectors in Iran. Findings – This study elaborates on all issues, points and best practices relevant to the ICT services industry in Iran which is addressed by recommending some documented policies. Research limitations/implications – Majority of the experts who attended the workshop and responded to the questionnaire were service consumers rather than service providers. Practical implications –...


asian conference on intelligent information and database systems | 2014

Implementation of Emotional-Aware Computer Systems Using Typical Input Devices

Kaveh Bakhtiyari; Mona Taghavi; Hafizah Husain

Emotions play an important role in human interactions. Human Emotions Recognition HER - Affective Computing is an innovative method for detecting users emotions to determine proper responses and recommendations in Human-Computer Interaction HCI. This paper discusses an intelligent approach to recognize human emotions by using the usual input devices such as keyboard, mouse and touch screen displays. This research is compared with the other usual methods like processing the facial expressions, human voice, body gestures and digital signal processing in Electroencephalography EEG machines for an emotional-aware system. The Emotional Intelligence system is trained in a supervised mode by Artificial Neural Network ANN and Support Vector Machine SVM techniques. The result shows 93.20% in accuracy which is around 5% more than the existing methods. It is a significant contribution to show new directions of future research in this topical area of emotion recognition, which is useful in recommender systems.


International Journal of Digital Crime and Forensics | 2011

Two Methods for Active Detection and Prevention of Sophisticated ARP-Poisoning Man-in-the-Middle Attacks on Switched Ethernet LANs

Kenan Kalajdzic; Ahmed Patel; Mona Taghavi

In this paper we describe two novel methods for active detection and prevention of ARPpoisoning-based Man-in-the-Middle (MitM) attacks on switched Ethernet LANs. As a stateless and inherently insecure protocol, ARP has been used as a relatively simple means to launch Denial-of-Service (DoS) and MitM attacks on local networks and multiple solutions have been proposed to detect and prevent these types of attacks. MitM attacks are particularly dangerous, because they allow an attacker to monitor network traffic and break the integrity of data being sent over the network. We introduce backward compatible techniques to prevent ARP poisoning and deal with sophisticated stealth MitM programs.


Information Management & Computer Security | 2011

Design of secure and trustworthy mobile agent‐based e‐marketplace system

Ahmed Patel; Wei Qi; Mona Taghavi

Purpose – Mobile agent‐based e‐marketplace is one type of business application that has been developed as a flexible and efficient approach to help companies or corporations to extend their businesses to outreach larger markets without regional and continental boundaries. However, every distributed system is unable to avoid the security problems due to the open internet environment. Mobile agent‐based e‐marketplaces are no exception. Thus, the security of mobile agents is a crucial factor in the design of mobile agent‐based e‐marketplaces. To overcome this kind of problem, the purpose of this paper is to design and implement a framework and system of secure and trustworthy mobile agent based e‐marketplace.Design/methodology/approach – This paper presents the system design for the system implementation based on the designed framework. It includes three major aspects: the design issues, system design and development environment and tools for system implementation. The system architecture, use case diagram a...


ieee conference on open systems | 2011

Web base project management system for development of ICT project outsourced by Iranian government

Mona Taghavi; Ahmed Patel; Hamed Taghavi

With the unprecedented growing of outsourcing ICT projects by the Iranian government, there is a critical need for proper execution and monitoring of these projects. It is proposed that a web-based project management system be put in place to improve efficiency and effectiveness of management processes and speed up decision making. Based on the information flow between various units involved in the complete life-cycle of ICT project management, a functional model and system architecture with various underlying structures has been designed. The functional model contains two sub-systems: process management and information service. The proposed system structure is based on a four-layer client-server computing model. As a part of any publically available ICT system through the Internet, it has to be made secure and protected against all sorts of cybercrime. It is envisaged that this system can bring efficiency in managing the projects as well as improve decision making and increase the overall management process with total accounting and management transparency.


Journal of Information Technology Research | 2011

Design of an Integrated Project Management Information System for Large Scale Public Projects: Iranian Case Study

Mona Taghavi; Ahmed Patel; Hamed Taghavi

Due to the unprecedented growth of outsourcing ICT projects by the Iranian government, a critical need exists for the proper execution and monitoring of these projects. In this paper, the authors propose a web-based project management system to improve the efficiency and effectiveness of the management processes and accelerate decision making. Based on the requirements and information flow between various units involved in the complete life-cycle of ICT project management, a functional model and system architecture with various underlying structures has been designed. The functional model contains two sub-systems: process management and information service. The proposed system structure is based on a four-layer client-server computing model. As a part of a publically available ICT system, it must be secure against cybercrime activities. This system can bring efficiency in managing the projects, improve decision making, and increase the overall management process with total accounting and management transparency. The proposed system overcomes the problems associated with a central system and traditional management processes, as is currently the case in Iran.

Collaboration


Dive into the Mona Taghavi's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Kaveh Bakhtiyari

University of Duisburg-Essen

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Hafizah Husain

National University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Wei Qi

National University of Malaysia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Abdullah Mohd Zin

National University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Aini Hussain

National University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Edgar Scavino

National University of Malaysia

View shared research outputs
Top Co-Authors

Avatar

Kenan Kalajdzic

National University of Malaysia

View shared research outputs
Researchain Logo
Decentralizing Knowledge