Hamid Reza Shahriari

Orcid: 0000-0002-2749-6355

According to our database1, Hamid Reza Shahriari authored at least 38 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
REACH: Robust Efficient Authentication for Crowdsensing-based Healthcare.
J. Supercomput., April, 2024

Improving Agents Trust in Service-Oriented Environment Based on Entropy Structure and Information Ethics Principles.
Int. J. Hum. Comput. Interact., January, 2024

2023
HAKECC: Highly efficient authentication and key agreement scheme based on ECDH for RFID in IOT environment.
J. Inf. Secur. Appl., August, 2023

A Secure and Efficient Scheme for Mutual Authentication for Integrity of Exchanged Data in IoMT.
Proceedings of the 28th International Computer Conference, Computer Society of Iran, 2023

2022
A Privacy Preserving IoT Data Marketplace Using IOTA Smart Contracts.
CoRR, 2022

Comment on "Provably secure biometric-based client-server secure communication over unreliable networks".
CoRR, 2022

2021
Neural software vulnerability analysis using rich intermediate graph representations of programs.
Inf. Sci., 2021

2020
Detecting application logic vulnerabilities via finding incompatibility between application design and implementation.
IET Softw., 2020

ANOVUL: Detection of logic vulnerabilities in annotated programs via data and control flow analysis.
IET Inf. Secur., 2020

2019
Athena: A framework to automatically generate security test oracle via extracting policies from source code and intended software behaviour.
Inf. Softw. Technol., 2019

2018
BotRevealer: Behavioral Detection of Botnets based on Botnet Life-cycle.
ISC Int. J. Inf. Secur., 2018

A Survey of Anomaly Detection Approaches in Internet of Things.
ISC Int. J. Inf. Secur., 2018

OPEXA: analyser assistant for detecting over-privileged extensions.
IET Inf. Secur., 2018

A Novel Approach for Detecting DGA-based Ransomwares.
Proceedings of the 15th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2018

Detecting Privacy Leaks in Android Apps using Inter-Component Information Flow Control Analysis.
Proceedings of the 15th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2018

2017
Dwarf Frankenstein is still in your memory: tiny code reuse attacks.
ISC Int. J. Inf. Secur., 2017

Seven Years of Software Vulnerabilities: The Ebb and Flow.
IEEE Secur. Priv., 2017

Coping with unfair ratings in reputation systems based on learning approach.
Enterp. Inf. Syst., 2017

Software Vulnerability Analysis and Discovery Using Machine-Learning and Data-Mining Techniques: A Survey.
ACM Comput. Surv., 2017

2016
Aggrandizing the beast's limbs: patulous code reuse attack on ARM architecture.
ISC Int. J. Inf. Secur., 2016

2entFOX: A framework for high survivable ransomwares detection.
Proceedings of the 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, 2016

2014
A hybrid approach for database intrusion detection at transaction and inter-transaction levels.
ISC Int. J. Inf. Secur., 2014

Tazhi: A novel technique for hunting trampoline gadgets of jump oriented programming (A class of code reuse attacks).
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014

Towards a process-oriented framework for improving trust and security in migration to cloud.
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014

Comparison-based agent partitioning with learning automata: A trust model for service-oriented environments.
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014

2013
Prediction of user's trustworthiness in web-based social networks via text mining.
ISC Int. J. Inf. Secur., 2013

A new method for occupational fraud detection in process aware information systems.
Proceedings of the 10th International ISC Conference on Information Security and Cryptology, 2013

2011
Compositional Approach to Quantify the Vulnerability of Computer Systems.
Comput. J., 2011

An Enhanced Method for Computation of Similarity between the Contexts in Trust Evaluation Using Weighted Ontology.
Proceedings of the IEEE 10th International Conference on Trust, 2011

A Method for Preserving Privacy in Published Multi-relational Social Networks.
Proceedings of the KMIS 2011, 2011

2010
Vulnerability analysis of networks to detect multiphase attacks using the actor-based language Rebeca.
Comput. Electr. Eng., 2010

Privacy Protection of Grid Service Requesters through Distributed Attribute Based Access Control Model.
Proceedings of the Advances in Grid and Pervasive Computing, 5th International Conference, 2010

2008
Topological Analysis of Multi-phase Attacks using Expert Systems.
J. Inf. Sci. Eng., 2008

2007
Vulnerability Take Grant (VTG): An efficient approach to analyze network vulnerabilities.
Comput. Secur., 2007

2006
RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks.
Comput. Secur., 2006

Using Description Logics for Network Vulnerability Analysis.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006

2005
Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks.
Proceedings of the Information Security Practice and Experience, 2005

Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG).
Proceedings of the Information and Communications Security, 7th International Conference, 2005


  Loading...