Bahman Rashidi

Orcid: 0000-0001-8817-0757

Affiliations:
  • Virginia Commonwealth University, Richmond, VA, USA


According to our database1, Bahman Rashidi authored at least 23 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Models of Applied Privacy (MAP): A Persona Based Approach to Threat Modeling.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

2021
CARAF: Crypto Agility Risk Assessment Framework.
J. Cybersecur., 2021

2019
Multi-View Permission Risk Notification for Smartphone System.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2019

2018
Android User Privacy Preserving Through Crowdsourcing.
IEEE Trans. Inf. Forensics Secur., 2018

A scalable and flexible DDoS mitigation system using network function virtualization.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

HoneyV: A virtualized honeynet system based on network softwarization.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

2017
A Collaborative DDoS Defence Framework Using Network Function Virtualization.
IEEE Trans. Inf. Forensics Secur., 2017

Android resource usage risk assessment using hidden Markov model and online learning.
Comput. Secur., 2017

DroidVisor: An Android secure application recommendation system.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

Dynamic DDoS Defense Resource Allocation using Network Function Virtualization.
Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2017

Android malicious application detection using support vector machine and active learning.
Proceedings of the 13th International Conference on Network and Service Management, 2017

2016
Android fine-grained permission control system with real-time expert recommendations.
Pervasive Mob. Comput., 2016

BotTracer: Bot user detection using clustering method in RecDroid.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

Android Permission Recommendation Using Transitive Bayesian Inference Model.
Proceedings of the Computer Security - ESORICS 2016, 2016

VFence: A Defense against Distributed Denial of Service Attacks Using Network Function Virtualization.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

CoFence: A collaborative DDoS defence using network function virtualization.
Proceedings of the 12th International Conference on Network and Service Management, 2016

XDroid: An Android permission control using Hidden Markov chain and online learning.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2015
A Survey of Android Security Threats and Defenses.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2015

Disincentivizing Malicious Users in RecDroid Using Bayesian Game Model.
J. Internet Serv. Inf. Secur., 2015

Demo: RecDroid: An Android Resource Access Permission Recommendation System.
Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2015

Dude, ask the experts!: Android resource access permission recommendation with RecDroid.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

A game-theoretic model for defending against malicious users in RecDroid.
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015

2014
RecDroid: a resource access permission control portal and recommendation service for smartphone users.
Proceedings of the ACM MobiCom Workshop on Security and Privacy in Mobile Environments, 2014


  Loading...