Behrouz Tork Ladani

Orcid: 0000-0003-2280-8839

According to our database1, Behrouz Tork Ladani authored at least 59 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Privacy, reputation, and incentive provision for vehicular social networks.
J. Reliab. Intell. Environ., December, 2023

Maaker: A framework for detecting and defeating evasion techniques in Android malware.
J. Inf. Secur. Appl., November, 2023

A model-based framework for inter-app Vulnerability analysis of Android applications.
Softw. Pract. Exp., April, 2023

Privacy, trust, and secure rewarding in mobile crowd-sensing based spectrum monitoring.
J. Ambient Intell. Humaniz. Comput., 2023

A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware.
ISC Int. J. Inf. Secur., 2023

2022
A semi real dataset of Meta-Alerts for APT attack detection.
Dataset, May, 2022

Efficient Secure Pattern Matching With Malicious Adversaries.
IEEE Trans. Dependable Secur. Comput., 2022

Adaptive cost-sensitive stance classification model for rumor detection in social networks.
Soc. Netw. Anal. Min., 2022

Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System.
ISC Int. J. Inf. Secur., 2022

Light-Weight Privacy-Preserving Data Aggregation Protocols in Smart Grid Metering Networks.
ISC Int. J. Inf. Secur., 2022

SANT: Static Analysis of Native Threads for Security Vetting of Android Applications.
ISC Int. J. Inf. Secur., 2022

A Model-Based Approach for Representing Data Sharing Mechanism in Android Applications.
Proceedings of the 27th International Computer Conference, Computer Society of Iran, 2022

2021
Android malware dynamic evasions.
Dataset, June, 2021

Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware.
ISC Int. J. Inf. Secur., 2021

MEGDroid: A model-driven event generation framework for dynamic android malware analysis.
Inf. Softw. Technol., 2021

Soft rumor control in social networks: Modeling and analysis.
Eng. Appl. Artif. Intell., 2021

A machine learning approach for detecting and categorizing evasion sources in Android malware.
Proceedings of the 18th International ISC Conference on Information Security and Cryptology, 2021

2020
A Model for Social Communication Network in Mobile Instant Messaging Systems.
IEEE Trans. Comput. Soc. Syst., 2020

Interdependency Analysis in Security Investment against Strategic Attacks.
Inf. Syst. Frontiers, 2020

Secure parameterized pattern matching.
Inf. Sci., 2020

Model checking of robustness properties in trust and reputation systems.
Future Gener. Comput. Syst., 2020

Alerts Correlation and Causal Analysis for APT Based Cyber Attack Detection.
IEEE Access, 2020

Enhancing Monkey to trigger malicious payloads in Android malware.
Proceedings of the 17th International ISC Conference on Information Security and Cryptology, 2020

2019
VAnDroid: A framework for vulnerability analysis of Android applications using a model-driven reverse engineering technique.
Softw. Pract. Exp., 2019

Interdependent Security Game Design over Constrained Linear Influence Networks.
ISC Int. J. Inf. Secur., 2019

Modeling trust and reputation systems in hostile environments.
Future Gener. Comput. Syst., 2019

2017
An automatic test case generator for evaluating implementation of access control policies.
ISC Int. J. Inf. Secur., 2017

Information sharing vs. privacy: A game theoretic analysis.
Expert Syst. Appl., 2017

A Formal Model for Security Analysis of Trust and Reputation systems.
Proceedings of the 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2017

2016
Modeling and Quantitative Verification of Trust Systems Against Malicious Attackers.
Comput. J., 2016

Benchmarking reputation systems: A quantitative verification approach.
Comput. Hum. Behav., 2016

Automated program repair using genetic programming and model checking.
Appl. Intell., 2016

2015
Security Analysis and Strengthening of an RFID Lightweight Authentication Protocol Suitable for VANETs.
Wirel. Pers. Commun., 2015

GGRA: a grouped gossip-based reputation aggregation algorithm.
ISC Int. J. Inf. Secur., 2015

Gossip-based data aggregation in hostile environments.
Comput. Commun., 2015

Modelling and Quantitative Verification of Reputation Systems Against Malicious Attackers.
Comput. J., 2015

2014
DDoS attack detection in IEEE 802.16 based networks.
Wirel. Networks, 2014

Randomized gossip algorithms under attack.
Int. J. Inf. Sec., 2014

DoS and port scan attack detection in high speed networks.
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014

2013
GTrust: a group based trust model.
ISC Int. J. Inf. Secur., 2013

Structural Weights in Ontology Matching.
CoRR, 2013

Quantitative verification of beta reputation system using PRISM probabilistic model checker.
Proceedings of the 10th International ISC Conference on Information Security and Cryptology, 2013

2011
A model for specification, composition and verification of access control policies and its application to web services.
ISC Int. J. Inf. Secur., 2011

An Entropy Based Approach for DDoS Attack Detection in IEEE 802.16 Based Networks.
Proceedings of the Advances in Information and Computer Security, 2011

A Context-Aware Reputation-Based Model of Trust for Open Multi-agent Environments.
Proceedings of the Advances in Artificial Intelligence, 2011

2010
Anonymity and security for autonomous mobile agents.
IET Inf. Secur., 2010

An auction method for resource allocation in computational grids.
Future Gener. Comput. Syst., 2010

Liveness Verification in TRSs Using Tree Automata and Termination Analysis.
Comput. Informatics, 2010

Adaptive Similarity Aggregation Method for Ontology Matching.
Proceedings of the Fourth UKSim European Symposium on Computer Modeling and Simulation, 2010

Toward a software development methodology for anonymity applications.
Proceedings of the 2010 EDBT/ICDT Workshops, Lausanne, Switzerland, March 22-26, 2010, 2010

2009
A Novel Particle Swarm Optimization Approach for Grid Job Scheduling.
Proceedings of the Information Systems, Technology and Management, 2009

A conceptual framework for specification, analysis, and design of anonymity services.
Proceedings of the 2009 EDBT/ICDT Workshops, Saint-Petersburg, Russia, March 22, 2009, 2009

A continuous double auction method for resource allocation in computational grids.
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Scheduling, 2009

2008
A New Approach for Scoring Relevant Documents by Applying a Farsi Stemming Method in Persian Web Search Engines.
Proceedings of the Advances in Computer Science and Engineering, 2008

2007
Comparing Negotiation Strategies Based on Offers.
Proceedings of the Applications of Data Mining in E-Business and Finance, 2007

Measuring of Strategies' Similarity in Automated Negotiation.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

A Dynamic Reconfigurable Web Service Composition Framework Using Reo Coordination Language.
Proceedings of the Fifth IEEE European Conference on Web Services (ECOWS 2007), 2007

2006
Specification and Implementation of Multi-Agent Organizations.
Proceedings of the WEBIST 2006, 2006

2005
Passive Testing - A Constrained Invariant Checking Approach.
Proceedings of the Testing of Communicating Systems, 2005


  Loading...