Mehran S. Fallah

According to our database1, Mehran S. Fallah authored at least 27 papers between 2002 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




On transparent value-sensitive run-time monitoring for information flow policies.
Computer Languages, Systems & Structures, 2018

A Reactive Defense Against Bandwidth Attacks Using Learning Automata.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

Static Checking for Multiple Start of Threads in a Type-Safe Multithreaded Java.
Journal of Object Technology, 2017

S-Restricted Compositions Revisited.
Discrete Mathematics & Theoretical Computer Science, 2017

A Bayesian Game of Whitewashing in Reputation Systems.
Comput. J., 2017

Run-Time Verification for Observational Determinism Using Dynamic Program Slicing.
Proceedings of the Information Security - 20th International Conference, 2017

Rewriting-Based Enforcement of Noninterference in Programs with Observable Intermediate Values.
J. UCS, 2016

Specification and static enforcement of scheduler-independent noninterference in a middleweight Java.
Computer Languages, Systems & Structures, 2016

How Powerful Are Run-Time Monitors with Static Information?
Comput. J., 2016

A Type System for Quantified Information-Flow Security in Java-Like Languages.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

A nonmonotonic modal authorization logic for pervasive computing.
Security and Communication Networks, 2015

Automated type-based analysis of injective agreement in the presence of compromised principals.
J. Log. Algebr. Meth. Program., 2015

Typing secure implementation of authentication protocols in environments with compromised principals.
Security and Communication Networks, 2014

TDPF: a traceback-based distributed packet filter to mitigate spoofed DDoS attacks.
Security and Communication Networks, 2014

Noninterference in a predicative polymorphic calculus for access control.
Computer Languages, Systems & Structures, 2013

A Game-based Sybil-resistant Strategy for Reputation Systems in Self-organizing MANETs.
Comput. J., 2011

A Logical View of Nonmonotonicity in Access Control.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

A distributed client-puzzle mechanism to mitigate bandwidth attacks.
Proceedings of the 5th International Conference on Network and System Security, 2011

Reconstructing security types for automated policy enforcement in FABLE.
Proceedings of the 5th International Conference on Network and System Security, 2011

Is Cryptyc Able to Detect Insider Attacks?
Proceedings of the Formal Aspects of Security and Trust - 8th International Workshop, 2011

A Puzzle-Based Defense Strategy Against Flooding Attacks Using Game Theory.
IEEE Trans. Dependable Sec. Comput., 2010

A secure credit-based cooperation stimulating mechanism for MANETs using hash chains.
Future Generation Comp. Syst., 2009

Service Availability in Concurrent Systems - Part II: Analysis and Case Studies Using HSIP.
Comput. J., 2007

Service Availability in Concurrent Systems - Part I: A Theory of Hierarchical Services of Interacting Processes.
Comput. J., 2007

Stimulating Cooperation in MANETs Using Game Theory.
Proceedings of the World Congress on Engineering, 2007

A Framework for the Analysis of Denial of Service Attacks.
Comput. J., 2004

A measure of resilience against denial of service attacks in computer networks.
Comput. Syst. Sci. Eng., 2002