Morteza Amini

According to our database1, Morteza Amini authored at least 31 papers between 2005 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Multi-join query optimization in bucket-based encrypted databases using an enhanced ant colony optimization algorithm.
Distributed and Parallel Databases, 2018

2017
Nonparametric estimation of the entropy using a ranked set sample.
Communications in Statistics - Simulation and Computation, 2017

Android Malware Detection using Markov Chain Model of Application Behaviors in Requesting System Services.
CoRR, 2017

Enhancing Accuracy of Android Malware Detection using Intent Instrumentation.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

2016
Optimal Design for Step-Stress Accelerated Test with Random Discrete Stress Elevating Times Based on Gamma Degradation Process.
Quality and Reliability Eng. Int., 2016

Preventing database schema extraction by error message handling.
Inf. Syst., 2016

Failure Inference and Optimization for Step Stress Model Based on Bivariate Wiener Model.
Communications in Statistics - Simulation and Computation, 2016

2015
Optimal partial ridge estimation in restricted semiparametric regression models.
J. Multivariate Analysis, 2015

RTECA: Real time episode correlation algorithm for multi-step attack scenarios detection.
Computers & Security, 2015

2013
Nonparametric meta-analysis of independent samples of records.
Computational Statistics & Data Analysis, 2013

2010
GTHBAC: A Generalized Temporal History Based Access Control Model.
Telecommunication Systems, 2010

Multi-level authorisation model and framework for distributed semantic-aware environments.
IET Information Security, 2010

Specification of History Based Constraints for Access Control in Conceptual Level.
Proceedings of the Information Systems Security - 6th International Conference, 2010

2009
A semantic-based access control mechanism using semantic technologies.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

A Temporal Description Logic Based Access Control Model for Expressing History Constrained Policies in Semantic Web.
Proceedings of the POLICY 2009, 2009

Handling Context in a Semantic-Based Access Control Framework.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
A Context-Aware Mandatory Access Control Model for Multilevel Security Environments.
Proceedings of the Computer Safety, 2008

A Logic for Multi-domain Authorization Considering Administrators.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008

A Semantic aware Access Control model with real time constraints on history of accesses.
Proceedings of the International Multiconference on Computer Science and Information Technology, 2008

Trust Inference in Web-Based Social Networks Using Resistive Networks.
Proceedings of the Third International Conference on Internet and Web Applications and Services, 2008

Protecting Location Privacy through a Graph-Based Location Representation and a Robust Obfuscation Technique.
Proceedings of the Information Security and Cryptology, 2008

A Semantic-Aware Ontology-Based Trust Model for Pervasive Computing Environments.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008

PTO: A Trust Ontology for Pervasive Environments.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
A Context-Aware Access Control Model for Pervasive Computing Environments.
Proceedings of the 2007 International Conference on Intelligent Pervasive Computing, 2007

Conflict Detection and Resolution in Context-Aware Authorization.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

Trust-Based User-Role Assignment in Role-Based Access Control.
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007

Enhancing Role-Based Access Control Model through Fuzzy Relations.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

Separation of Duty in Role-Based Access Control Model through Fuzzy Relations.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2006
RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks.
Computers & Security, 2006

Context-Aware Provisional Access Control.
Proceedings of the Information Systems Security, Second International Conference, 2006

2005
Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks.
Proceedings of the Information Security Practice and Experience, 2005


  Loading...