• Shameli-Sendi, A., Jarraya, Y., Migault, D., Pourzandi, M. and Cheriet, M., 2019. Firewall rule set composition and decomposition. U.S. Patent Application 16/488,469.
  • Jarraya, Y., Shameli-Sendi, A., Fekih-Ahmed, M., Pourzandi, M., & Cheriet, M. (2019). U.S. Patent No. 10,439,984. Washington, DC: U.S. Patent and Trademark Office.
  • Shameli-Sendi, A., 2021. Understanding Linux kernel vulnerabilities. Journal of Computer Virology and Hacking Techniques
  • Moradi, N., Shameli-Sendi, A. and Khajouei, A., 2021. A Scalable Stateful Approach for Virtual Security Functions Orchestration. IEEE Transactions on Parallel & Distributed Systems, 32 (6), pp. 1383-1394
  • Khodayarseresht, E. and Shameli-Sendi, A., 2020. Reducing Energy and Carbon Cost of Cloud Data Centers through Optimal Virtual Machine Placement algorithms and an Automatic Servers Scale Controller Model. Journal of Soft Computing and Information Technology, 9(4), pp.83-98.
  • Shameli-Sendi, A., 2020. An efficient security data-driven approach for implementing risk assessment. Journal of Information Security and Applications, 54, p.102593.
  • Bagheri, S. and Shameli-Sendi, A., 2020. Dynamic Firewall Decomposition and Composition in the Cloud. IEEE Transactions on Information Forensics and Security, 15, pp.3526-3539.
  • Jabbarifar, M., Shameli-Sendi, A. and Kemme, B., 2019. A scalable network-aware framework for cloud monitoring orchestration. Journal of Network and Computer Applications, 113, pp.1-14.
  • Shameli-Sendi, A., Louafi, H., He, W. and Cheriet, M., 2018. Dynamic optimal countermeasure selection for intrusion response system. IEEE Transactions on Dependable and Secure Computing, 15(5), pp.755-770.
  • Shameli-Sendi, A., Dagenais, M. and Wang, L., 2018. Realtime intrusion risk assessment model based on attack and service dependency graphs. Computer Communications, 116, pp.253-272.
  • Shameli-Sendi, A., Jarraya, Y., Pourzandi, M. and Cheriet, M., 2016. Efficient provisioning of security service function chaining using network security defense patterns. IEEE Transactions on Services Computing, 12(4), 534-549.
  • Shameli-Sendi, A., Aghababaei-Barzegar, R. and Cheriet, M., 2016. Taxonomy of information security risk assessment (ISRA). Computers & Security, 57, pp.14-30.
  • Shameli-Sendi, A., Pourzandi, M., Fekih-Ahmed, M. and Cheriet, M., 2015. Taxonomy of distributed denial of service mitigation approaches for cloud computing. Journal of Network and Computer Applications, 58, pp.165-179.
  • Jabbarifar, M., Dagenais, M. and Shameli-Sendi, A., 2015. Online incremental clock synchronization. Journal of Network and Systems Management, 23(4), pp.1034-1066.
  • Shameli-Sendi, A. and Dagenais, M., 2015. Orcef: Online response cost evaluation framework for intrusion response system. Journal of Network and Computer Applications, 55, pp.89-107.
  • Shameli-Sendi, A., Cheriet, M. and Hamou-Lhadj, A., 2014. Taxonomy of intrusion risk assessment and response system. Computers & Security, 45, pp.1-16.
  • Shameli-Sendi, A. and Dagenais, M., 2014. ARITO: Cyber-attack response system using accurate risk impact tolerance. International journal of information security, 13(4), pp.367-390.
  • Shameli-Sendi, A., Desfossez, J., Dagenais, M. and Jabbarifar, M., 2013. A retroactive-burst framework for automated intrusion response system. Journal of Computer Networks and communications, 2013.
  • Shameli-Sendi, A., Jabbarifar, M., Dagenais, M. and Shajari, M., 2012. System health monitoring using a novel method: security unified process. Journal of Computer Networks and Communications, 2012.
  • Shameli-Sendi, A., Dagenais, M., Jabbarifar, M. and Couture, M., 2012. Real time intrusion prediction based on optimized alerts with hidden Markov model. Journal of networks, 7(2), p.311.
  • Shameli-Sendi, A., Shajari, M., Hassanabadi, M., Jabbarifar, M. and Dagenais, M., 2012. Fuzzy multi-criteria decision-making for information security risk assessment. The Open Cybernetics & Systemics Journal, 6(1).
  • Shameli-Sendi, A., Ezzati-Jivan, N., Jabbarifar, M. and Dagenais, M., 2012. Intrusion response systems: survey and taxonomy. Int. J. Comput. Sci. Netw. Secur, 12(1), pp.1-14.
  • Jabbarifar, M., Shameli-Sendi, A., Sadighian, A., Jivan, N.E. and Dagenais, M., 2010. A reliable and efficient time synchronization protocol for heterogeneous wireless sensor network. Wireless Sensor Network, 2(12), p.910.