Mohammad Ali Hadavi

According to our database1, Mohammad Ali Hadavi authored at least 20 papers between 2008 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
SecureKV: Secure Searchable Outsourcing of Key-Value Databases to the Public Cloud.
ISC Int. J. Inf. Secur., 2022

Bypassing Web Application Firewalls Using Deep Reinforcement Learning.
ISC Int. J. Inf. Secur., 2022

2021
IDOT: Black-Box Detection of Access Control Violations in Web Applications.
ISC Int. J. Inf. Secur., 2021

Using Deep Reinforcement Learning to Evade Web Application Firewalls.
Proceedings of the 18th International ISC Conference on Information Security and Cryptology, 2021

2019
A Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing.
ISC Int. J. Inf. Secur., 2019

Threat Extraction in IoT-Based Systems Focusing on Smart Cities.
Proceedings of the 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2019

2018
Threat Extraction Method Based on UML Software Description.
Proceedings of the 15th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2018

Software Security Analysis Based on the Principle of Defense-in-Depth.
Proceedings of the 15th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2018

2017
WAVE: Black Box Detection of XSS, CSRF and Information Leakage Vulnerabilities.
Proceedings of the 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2017

2016
Access control aware data retrieval for secret sharing based database outsourcing.
Distributed Parallel Databases, 2016

2015
(<i>t</i>, <i>k</i>)-Hypergraph anonymization: an approach for secure data publishing.
Secur. Commun. Networks, 2015

Security and searchability in secret sharing-based data outsourcing.
Int. J. Inf. Sec., 2015

2012
Correctness Verification in Database Outsourcing: A Trust-Based Fake Tuples Approach.
Proceedings of the Information Systems Security, 8th International Conference, 2012

AS5: A Secure Searchable Secret Sharing Scheme for Privacy Preserving Database Outsourcing.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012

k-Anonymity-Based Horizontal Fragmentation to Preserve Privacy in Data Outsourcing.
Proceedings of the Data and Applications Security and Privacy XXVI, 2012

Database as a Service: Towards a Unified Solution for Security Requirements.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012

2011
Separating indexes from data: a distributed scheme for secure database outsourcing.
ISC Int. J. Inf. Secur., 2011

Access control enforcement on outsourced data ensuring privacy of access control policies.
Proceedings of the 2011 International Conference on High Performance Computing & Simulation, 2011

A Signature-Based Approach of Correctness Assurance in Data Outsourcing Scenarios.
Proceedings of the Information Systems Security - 7th International Conference, 2011

2008
Software Security; A Vulnerability Activity Revisit.
Proceedings of the The Third International Conference on Availability, 2008


  Loading...