Hassan Takabi

According to our database1, Hassan Takabi authored at least 56 papers between 2007 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Automatic Extraction of Access Control Policies from Natural Language Documents.
IEEE Trans. Dependable Secur. Comput., 2020

2019
MOWS: Multi-objective workflow scheduling in cloud computing based on heuristic algorithm.
Simul. Model. Pract. Theory, 2019

Teaching software-defined network security through malicious tenant detection.
Internet Technol. Lett., 2019

Automated extraction of attributes from natural language attribute-based access control (ABAC) Policies.
Cybersecur., 2019

Communication-efficient private distance calculation based on oblivious transfer extensions.
Comput. Secur., 2019

On Effectiveness of Adversarial Examples and Defenses for Malware Classification.
Proceedings of the Security and Privacy in Communication Networks, 2019

A Nature-Inspired Framework for Optimal Mining of Attribute-Based Access Control Policies.
Proceedings of the Security and Privacy in Communication Networks, 2019

Towards an Automated Extraction of ABAC Constraints from Natural Language Policies.
Proceedings of the ICT Systems Security and Privacy Protection, 2019

Deep Neural Networks Classification over Encrypted Data.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

2018
Privacy-preserving Machine Learning as a Service.
Proc. Priv. Enhancing Technol., 2018

A Deep Learning Approach for Extracting Attributes of ABAC Policies.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

Prediction of human error using eye movements patterns for unintentional insider threat detection.
Proceedings of the IEEE 4th International Conference on Identity, 2018

2017
CryptoDL: Deep Neural Networks over Encrypted Data.
CoRR, 2017

Towards a Top-down Policy Engineering Framework for Attribute-based Access Control.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

Identification of Access Control Policy Sentences from Natural Language Policy Documents.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

When Do Changes Induce Software Vulnerabilities?
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017

Insider Threat Mitigation Using Moving Target Defense and Deception.
Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30, 2017

Privacy-preserving Machine Learning in Cloud.
Proceedings of the 9th Cloud Computing Security Workshop, 2017

A Multi-Modal Neuro-Physiological Study of Malicious Insider Threats.
Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30, 2017

2016
Inside the Mind of the Insider: Towards Insider Threat Detection Using Psychophysiological Signals.
J. Internet Serv. Inf. Secur., 2016

A foresight model for intrusion response management.
Comput. Secur., 2016

A comprehensive approach for network attack forecasting.
Comput. Secur., 2016

Effect of anti-malware software on infectious nodes in cloud environment.
Comput. Secur., 2016

Better Privacy Indicators: A New Approach to Quantification of Privacy Policies.
Proceedings of the Workshop on Privacy Indicators, 2016

Message from STPSA 2016 Workshop Organizers.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Differentially Private Distributed Data Analysis.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

Brain Computer Interface (BCI) Applications: Privacy Threats and Countermeasures.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

If You Can't Measure It, You Can't Manage It: Towards Quantification of Privacy Policies.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

Firewall for brain: Towards a privacy preserving ecosystem for BCI applications.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

Top Manager's Perspectives on Cyberinsurance Risk Management for Reducing Cybersecurity Risks.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

2015
DLLMiner: structural mining for malware detection.
Secur. Commun. Networks, 2015

Toward an Insider Threat Detection Framework Using Honey Permissions.
J. Internet Serv. Inf. Secur., 2015

Automatic Top-Down Role Engineering Framework Using Natural Language Processing Techniques.
Proceedings of the Information Security Theory and Practice, 2015

Towards an Automatic Top-down Role Engineering Approach Using Natural Language Processing Techniques.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

Towards a General Framework for Optimal Role Mining: A Constraint Satisfaction Approach.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

Towards Insider Threat Detection Using Psychophysiological Signals.
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015

2014
Exploiting Users' Inconsistent Preferences in Online Social Networks to Discover Private Friendship Links.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

Venue attacks in location-based social networks.
Proceedings of the 1st ACM SIGSPATIAL International Workshop on Privacy in Geographic Information Collection and Analysis, 2014

Privacy aware access control for data sharing in cloud computing environments.
Proceedings of the Second International Workshop on Security in Cloud Computing, 2014

2012
Semantic-based policy management for cloud computing environments.
Int. J. Cloud Comput., 2012

Policy Management as a Service: An Approach to Manage Policy Heterogeneity in Cloud Computing Environment.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

2011
Analysing security and privacy issues of using e-mail address as identity.
Int. J. Inf. Priv. Secur. Integr., 2011

DCDIDP: A distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011

Towards active detection of identity clone attacks on online social networks.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

Exploring reactive access control.
Proceedings of the International Conference on Human Factors in Computing Systems, 2011

2010
Security and Privacy Challenges in Cloud Computing Environments.
IEEE Secur. Priv., 2010

Security and Privacy Risks of Using E-mail Address as an Identity.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

StateMiner: an efficient similarity-based approach for optimal mining of role hierarchy.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments.
Proceedings of the Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

Exploring reactive access control.
Proceedings of the 28th International Conference on Human Factors in Computing Systems, 2010

2009
An architecture for specification and enforcement of temporal access control constraints using OWL.
Proceedings of the 6th ACM Workshop On Secure Web Services, 2009

A collaborative k-anonymity approach for location privacy in location-based services.
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009

2008
Integrating Delegation with the Formal Core RBAC Model.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
Trust-Based User-Role Assignment in Role-Based Access Control.
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007

Enhancing Role-Based Access Control Model through Fuzzy Relations.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

Separation of Duty in Role-Based Access Control Model through Fuzzy Relations.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007


  Loading...