Rasool Jalili

Orcid: 0000-0002-9853-1955

According to our database1, Rasool Jalili authored at least 103 papers between 1994 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Mal2GCN: a robust malware detection approach using deep graph convolutional networks with non-negative weights.
J. Comput. Virol. Hacking Tech., 2024

HODA: Hardness-Oriented Detection of Model Extraction Attacks.
IEEE Trans. Inf. Forensics Secur., 2024

2023
GraphOS: Towards Oblivious Graph Processing.
Proc. VLDB Endow., 2023

2022
RAD: A Statistical Mechanism Based on Behavioral Analysis for DDoS Attack Countermeasure.
IEEE Trans. Inf. Forensics Secur., 2022

Multi-User Dynamic Searchable Symmetric Encryption with Corrupted Participants.
IACR Cryptol. ePrint Arch., 2022

2021
Adversarial Network Traffic: Towards Evaluating the Robustness of Deep-Learning-Based Network Traffic Classification.
IEEE Trans. Netw. Serv. Manag., 2021

AWA: Adversarial Website Adaptation.
IEEE Trans. Inf. Forensics Secur., 2021

Hardness of Samples Is All You Need: Protecting Deep Learning Models Using Hardness of Samples.
CoRR, 2021

2020
Adversarial Network Traffic: Toward Evaluating the Robustness of Deep Learning Based Network Traffic Classification.
CoRR, 2020

ACoPE: An adaptive semi-supervised learning approach for complex-policy enforcement in high-bandwidth networks.
Comput. Networks, 2020

2019
SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing.
ISC Int. J. Inf. Secur., 2019

Inline high-bandwidth network analysis using a robust stream clustering algorithm.
IET Inf. Secur., 2019

DSCA: an inline and adaptive application identification approach in encrypted network traffic.
Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, 2019

2018
Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version).
ISC Int. J. Inf. Secur., 2018

New Constructions for Forward and Backward Private Symmetric Searchable Encryption.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
HB<sup>2</sup>DS: A behavior-driven high-bandwidth network mining system.
J. Syst. Softw., 2017

Statistical Disclosure: Improved, Extended, and Resisted.
CoRR, 2017

Enforcing Access Control Policies over Data Stored on Untrusted Server.
Proceedings of the 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2017

2016
Uncertainty in Trust: A Risk-Aware Approach.
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2016

An efficient statistical zero-knowledge authentication protocol for smart cards.
Int. J. Comput. Math., 2016

Efficient Lattice-based Authenticated Encryption: A Practice-Oriented Provable Security Approach.
IACR Cryptol. ePrint Arch., 2016

TIRIAC: A trust-driven risk-aware access control framework for Grid environments.
Future Gener. Comput. Syst., 2016

Access control aware data retrieval for secret sharing based database outsourcing.
Distributed Parallel Databases, 2016

XABA: A zero-knowledge anomaly-based behavioral analysis method to detect insider threats.
Proceedings of the 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, 2016

2015
On Constrained Implementation of Lattice-Based Cryptographic Primitives and Schemes on Smart Cards.
ACM Trans. Embed. Comput. Syst., 2015

(<i>t</i>, <i>k</i>)-Hypergraph anonymization: an approach for secure data publishing.
Secur. Commun. Networks, 2015

A collusion mitigation scheme for reputation systems.
ISC Int. J. Inf. Secur., 2015

Security and searchability in secret sharing-based data outsourcing.
Int. J. Inf. Sec., 2015

FORSAKES: A forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes.
Adv. Math. Commun., 2015

2014
Implementation and Comparison of Lattice-based Identification Protocols on Smart Cards and Microcontrollers.
IACR Cryptol. ePrint Arch., 2014

Mid-defense: Mitigating protocol-level attacks in TOR using indistinguishability obfuscation.
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014

Web driven alert verification.
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014

Random data and key generation evaluation of some commercial tokens and smart cards.
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014

2013
An Algebraic Theory of Epistemic Processes.
J. Univers. Comput. Sci., 2013

Efficient Statistical Zero-Knowledge Authentication Protocols for Smart Cards Secure Against Active & Concurrent Quantum Attacks.
IACR Cryptol. ePrint Arch., 2013

A Comprehensive Approach to Abusing Locality in Shared Web Hosting Servers.
Proceedings of the 12th IEEE International Conference on Trust, 2013

An efficient and provably-secure coercion-resistant e-voting protocol.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

Chaos-based selective key (CSK) Cryptosystem: A new direction to secure VPN.
Proceedings of the 10th International ISC Conference on Information Security and Cryptology, 2013

Minimal assumptions to achieve privacy in e-voting protocols.
Proceedings of the 10th International ISC Conference on Information Security and Cryptology, 2013

A UC-Secure Authenticated Contributory Group Key Exchange Protocol Based on Discrete Logarithm.
Proceedings of the Information Systems Security - 9th International Conference, 2013

Alert Correlation Algorithms: A Survey and Taxonomy.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

2012
Cooperative security administration in multi-security-domain environments using a variant of deontic logic.
Sci. Iran., 2012

Two novel server-side attacks against log file in Shared Web Hosting servers.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

Correctness Verification in Database Outsourcing: A Trust-Based Fake Tuples Approach.
Proceedings of the Information Systems Security, 8th International Conference, 2012

AS5: A Secure Searchable Secret Sharing Scheme for Privacy Preserving Database Outsourcing.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012

k-Anonymity-Based Horizontal Fragmentation to Preserve Privacy in Data Outsourcing.
Proceedings of the Data and Applications Security and Privacy XXVI, 2012

Database as a Service: Towards a Unified Solution for Security Requirements.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012

Uncertainty in Probabilistic Trust Models.
Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, 2012

2011
Separating indexes from data: a distributed scheme for secure database outsourcing.
ISC Int. J. Inf. Secur., 2011

Milder Definitions of Computational Approximability: The Case of Zero-Knowledge Protocols.
IACR Cryptol. ePrint Arch., 2011

Access control enforcement on outsourced data ensuring privacy of access control policies.
Proceedings of the 2011 International Conference on High Performance Computing & Simulation, 2011

A Signature-Based Approach of Correctness Assurance in Data Outsourcing Scenarios.
Proceedings of the Information Systems Security - 7th International Conference, 2011

2010
GTHBAC: A Generalized Temporal History Based Access Control Model.
Telecommun. Syst., 2010

Editorial.
ISC Int. J. Inf. Secur., 2010

Multi-level authorisation model and framework for distributed semantic-aware environments.
IET Inf. Secur., 2010

Vulnerability analysis of networks to detect multiphase attacks using the actor-based language Rebeca.
Comput. Electr. Eng., 2010

2Ploc: Preserving Privacy in Location-based Services.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Specification of History Based Constraints for Access Control in Conceptual Level.
Proceedings of the Information Systems Security - 6th International Conference, 2010

2009
DRAPS: A Framework for Dynamic Reconfigurable Protocol Stacks.
J. Inf. Sci. Eng., 2009

Double Voting Problem of Some Anonymous E-Voting Schemes.
J. Inf. Sci. Eng., 2009

Editorial.
ISC Int. J. Inf. Secur., 2009

A semantic-based access control mechanism using semantic technologies.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

AFMAP: Anonymous Forward-Secure Mutual Authentication Protocols for RFID Systems.
Proceedings of the Third International Conference on Emerging Security Information, 2009

A Temporal Description Logic Based Access Control Model for Expressing History Constrained Policies in Semantic Web.
Proceedings of the POLICY 2009, 2009

Handling Context in a Semantic-Based Access Control Framework.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
Topological Analysis of Multi-phase Attacks using Expert Systems.
J. Inf. Sci. Eng., 2008

A Context-Aware Mandatory Access Control Model for Multilevel Security Environments.
Proceedings of the Computer Safety, 2008

A Logic for Multi-domain Authorization Considering Administrators.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008

A Semantic aware Access Control model with real time constraints on history of accesses.
Proceedings of the International Multiconference on Computer Science and Information Technology, 2008

FLMAP: A fast lightweight mutual authentication protocol for RFID systems.
Proceedings of the 16th International Conference on Networks, 2008

Trust Inference in Web-Based Social Networks Using Resistive Networks.
Proceedings of the Third International Conference on Internet and Web Applications and Services, 2008

Protecting Location Privacy through a Graph-Based Location Representation and a Robust Obfuscation Technique.
Proceedings of the Information Security and Cryptology, 2008

A Formalism for Recongurability Analysis in Distributed Non-Blocking Components.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

CEBAC: A Decentralized Cooperation Enforcement Based Access Control Framework in MANETs.
Proceedings of the Advances in Computer Science and Engineering, 2008

A Temporal Semantic-Based Access Control Model.
Proceedings of the Advances in Computer Science and Engineering, 2008

A Robust and Efficient SIP Authentication Scheme.
Proceedings of the Advances in Computer Science and Engineering, 2008

A Dynamic Mandatory Access Control Model.
Proceedings of the Advances in Computer Science and Engineering, 2008

A Semantic-Aware Ontology-Based Trust Model for Pervasive Computing Environments.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008

Self-reconfiguration in Highly Available Pervasive Computing Systems.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008

PTO: A Trust Ontology for Pervasive Environments.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Vulnerability Take Grant (VTG): An efficient approach to analyze network vulnerabilities.
Comput. Secur., 2007

Vulnerability Analysis in VGBPS Using Prolog.
Proceedings of the International Symposium on Fundamentals of Software Engineering, 2007

Design and Implementation of a Dynamic-Reconfigurable Architecture for Protocol Stack.
Proceedings of the International Symposium on Fundamentals of Software Engineering, 2007

Formalizing Compatibility and Substitutability in Communication Protocols Using I/O-Constraint Automata.
Proceedings of the International Symposium on Fundamentals of Software Engineering, 2007

Improved User Identity Confidentiality for UMTS Mobile Networks.
Proceedings of the Fourth European Conference on Universal Multiservice Networks (ECUMN 2007), 2007

A Dynamic-Reconfigurable Architecture for Protocol Stacks of Networked Systems.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

Conflict Detection and Resolution in Context-Aware Authorization.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

Trust-Based User-Role Assignment in Role-Based Access Control.
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007

Enhancing Role-Based Access Control Model through Fuzzy Relations.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

Separation of Duty in Role-Based Access Control Model through Fuzzy Relations.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2006
RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks.
Comput. Secur., 2006

Security Enhancement for a Low Computation Cost User Authentication Scheme.
Proceedings of the SECRYPT 2006, 2006

Using Description Logics for Network Vulnerability Analysis.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006

Context-Aware Provisional Access Control.
Proceedings of the Information Systems Security, Second International Conference, 2006

An Access Control Framework for Pervasive Computing Environments.
Proceedings of the 2006 International Conference on Pervasive Systems & Computing, 2006

An Architecture for a Context-aware Service Broker in Ubiquitous Computing Environments.
Proceedings of the 2006 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2006), 2006

2005
On Validity Assurance of Dynamic Reconfiguration for Component-based Programs.
Proceedings of the First IPM International Workshop on Foundations of Software Engineering, 2005

Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks.
Proceedings of the Information Security Practice and Experience, 2005

Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG).
Proceedings of the Information and Communications Security, 7th International Conference, 2005

2002
Specification and Verification of Security Policies in Firewalls.
Proceedings of the EurAsia-ICT 2002: Information and Communication Technology, 2002

1995
Using directed graphs to describe entity dependency in stable distributed persistent stores.
Proceedings of the 28th Annual Hawaii International Conference on System Sciences (HICSS-28), 1995

1994
Operating system support for object dependencies in persistent object stores.
Proceedings of WORDS '94. The First Workshop on Object-Oriented Real-Time Dependable Systems, 1994

Hardware Support for Stability in a Persistent Architecture.
Proceedings of the Persistent Object Systems, 1994


  Loading...