Mehran S. Fallah

According to our database1, Mehran S. Fallah authored at least 29 papers between 2002 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Monitorable hyperproperties of nonterminating systems.
J. Log. Algebraic Methods Program., 2022

2019
On the Properties of Epistemic and Temporal Epistemic Logics of Authentication.
Informatica (Slovenia), 2019

2018
On transparent value-sensitive run-time monitoring for information flow policies.
Comput. Lang. Syst. Struct., 2018

A Reactive Defense Against Bandwidth Attacks Using Learning Automata.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Static Checking for Multiple Start of Threads in a Type-Safe Multithreaded Java.
J. Object Technol., 2017

S-Restricted Compositions Revisited.
Discret. Math. Theor. Comput. Sci., 2017

A Bayesian Game of Whitewashing in Reputation Systems.
Comput. J., 2017

Run-Time Verification for Observational Determinism Using Dynamic Program Slicing.
Proceedings of the Information Security - 20th International Conference, 2017

2016
Rewriting-Based Enforcement of Noninterference in Programs with Observable Intermediate Values.
J. Univers. Comput. Sci., 2016

Specification and static enforcement of scheduler-independent noninterference in a middleweight Java.
Comput. Lang. Syst. Struct., 2016

How Powerful Are Run-Time Monitors with Static Information?
Comput. J., 2016

A Type System for Quantified Information-Flow Security in Java-Like Languages.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
A nonmonotonic modal authorization logic for pervasive computing.
Secur. Commun. Networks, 2015

Automated type-based analysis of injective agreement in the presence of compromised principals.
J. Log. Algebraic Methods Program., 2015

2014
Typing secure implementation of authentication protocols in environments with compromised principals.
Secur. Commun. Networks, 2014

TDPF: a traceback-based distributed packet filter to mitigate spoofed DDoS attacks.
Secur. Commun. Networks, 2014

2013
Noninterference in a predicative polymorphic calculus for access control.
Comput. Lang. Syst. Struct., 2013

2011
A Game-based Sybil-resistant Strategy for Reputation Systems in Self-organizing MANETs.
Comput. J., 2011

A Logical View of Nonmonotonicity in Access Control.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

A distributed client-puzzle mechanism to mitigate bandwidth attacks.
Proceedings of the 5th International Conference on Network and System Security, 2011

Reconstructing security types for automated policy enforcement in FABLE.
Proceedings of the 5th International Conference on Network and System Security, 2011

Is Cryptyc Able to Detect Insider Attacks?
Proceedings of the Formal Aspects of Security and Trust - 8th International Workshop, 2011

2010
A Puzzle-Based Defense Strategy Against Flooding Attacks Using Game Theory.
IEEE Trans. Dependable Secur. Comput., 2010

2009
A secure credit-based cooperation stimulating mechanism for MANETs using hash chains.
Future Gener. Comput. Syst., 2009

2007
Service Availability in Concurrent Systems - Part II: Analysis and Case Studies Using HSIP.
Comput. J., 2007

Service Availability in Concurrent Systems - Part I: A Theory of Hierarchical Services of Interacting Processes.
Comput. J., 2007

Stimulating Cooperation in MANETs Using Game Theory.
Proceedings of the World Congress on Engineering, 2007

2004
A Framework for the Analysis of Denial of Service Attacks.
Comput. J., 2004

2002
A measure of resilience against denial of service attacks in computer networks.
Comput. Syst. Sci. Eng., 2002


  Loading...