Reza M. Parizi

According to our database1, Reza M. Parizi authored at least 54 papers between 2007 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2020
Sidechain technologies in blockchain networks: An examination and state-of-the-art review.
J. Network and Computer Applications, 2020

P4-to-blockchain: A secure blockchain-enabled packet parser for software defined networking.
Comput. Secur., 2020

Blockchain smart contracts formalization: Approaches and challenges to address vulnerabilities.
Comput. Secur., 2020

An improved two-hidden-layer extreme learning machine for malware hunting.
Comput. Secur., 2020

2019
Fuzzy pattern tree for edge malware detection and categorization in IoT.
Journal of Systems Architecture - Embedded Systems Design, 2019

Fog data analytics: A taxonomy and process model.
J. Network and Computer Applications, 2019

Cyber Kill Chain-Based Taxonomy of Advanced Persistent Threat Actors: Analogy of Tactics, Techniques, and Procedures.
JIPS, 2019

Blockchain Applications in Power Systems: A Bibliometric Analysis.
CoRR, 2019

Blockchain-enabled Authentication Handover with Efficient Privacy Protection in SDN-based 5G Networks.
CoRR, 2019

A Deep and Scalable Unsupervised Machine Learning System for Cyber-Attack Detection in Large-Scale Smart Grids.
IEEE Access, 2019

Blockchain Applications for Industry 4.0 and Industrial IoT: A Review.
IEEE Access, 2019

Data Protection with SMSD Labware.
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019

Guideline-Based Approach for IoT Home Application Development.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019

Data Sharing and Privacy for Patient IoT Devices Using Blockchain.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019

Integrating Privacy Enhancing Techniques into Blockchains Using Sidechains.
Proceedings of the 2019 IEEE Canadian Conference of Electrical and Computer Engineering, 2019

A Blockchain-based Framework for Detecting Malicious Mobile Applications in App Stores.
Proceedings of the 2019 IEEE Canadian Conference of Electrical and Computer Engineering, 2019

BlockIPFS - Blockchain-Enabled Interplanetary File System for Forensic and Trusted Data Traceability.
Proceedings of the IEEE International Conference on Blockchain, 2019

E^2 C-Chain: A Two-Stage Incentive Education Employment and Skill Certification Blockchain.
Proceedings of the IEEE International Conference on Blockchain, 2019

Private Cloud Storage Forensics: Seafile as a Case Study.
Proceedings of the Handbook of Big Data and IoT Security, 2019

Forensic Investigation of Cross Platform Massively Multiplayer Online Games: Minecraft as a Case Study.
Proceedings of the Handbook of Big Data and IoT Security, 2019

Security in Online Games: Current Implementations and Challenges.
Proceedings of the Handbook of Big Data and IoT Security, 2019

Distributed Filesystem Forensics: Ceph as a Case Study.
Proceedings of the Handbook of Big Data and IoT Security, 2019

A Cyber Kill Chain Based Analysis of Remote Access Trojans.
Proceedings of the Handbook of Big Data and IoT Security, 2019

Big Data Forensics: Hadoop Distributed File Systems as a Case Study.
Proceedings of the Handbook of Big Data and IoT Security, 2019

2018
Component-Driven Development in Modern Virtual Assistants: A Mapping Study.
JSW, 2018

Microservices as an Evolutionary Architecture of Component-Based Development: A Think-aloud Study.
CoRR, 2018

Towards Better Ocular Recognition for Secure Real-World Applications.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Smart Contract Programming Languages on Blockchains: An Empirical Evaluation of Usability and Security.
Proceedings of the Blockchain - ICBC 2018, 2018

Bias-aware guidelines and fairness-preserving Taxonomy in software engineering education.
Proceedings of the IEEE Frontiers in Education Conference, 2018

Authentic Learning Secure Software Development (SSD) in Computing Education.
Proceedings of the IEEE Frontiers in Education Conference, 2018

Measuring Team Members' Contributions in Software Engineering Projects using Git-driven Technology.
Proceedings of the IEEE Frontiers in Education Conference, 2018

On the Understanding of Gamification in Blockchain Systems.
Proceedings of the 6th International Conference on Future Internet of Things and Cloud Workshops, 2018

OWASP Risk Analysis Driven Security Requirements Specification for Secure Android Mobile Software Development.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

Benchmark Requirements for Assessing Software Security Vulnerability Testing Tools.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

CyberPDF: Smart and Secure Coordinate-based Automated Health PDF Data Batch Extraction.
Proceedings of the Third IEEE/ACM International Conference on Connected Health: Applications, 2018

Empirical vulnerability analysis of automated smart contracts security testing on blockchains.
Proceedings of the 28th Annual International Conference on Computer Science and Software Engineering, 2018

2017
RAMBUTANS: automatic AOP-specific test generation tool.
STTT, 2017

Sustainability in intelligent building environments using weighted priority scheduling algorithm.
JAISE, 2017

Secure and quality-of-service-supported service-oriented architecture for mobile cloud handoff process.
Comput. Secur., 2017

2016
Functional and non-functional requirements prioritization: empirical evaluation of IPA, AHP-based, and HAM-based approaches.
Soft Comput., 2016

Cost optimization approaches for scientific workflow scheduling in cloud and grid computing: A review, classifications, and open issues.
Journal of Systems and Software, 2016

On the gamification of human-centric traceability tasks in software testing and coding.
Proceedings of the 14th IEEE International Conference on Software Engineering Research, 2016

2015
Automated test generation technique for aspectual features in AspectJ.
Inf. Softw. Technol., 2015

The impact of inadequate and dysfunctional training on Agile transformation process: A Grounded Theory study.
Inf. Softw. Technol., 2015

A test-to-code traceability method using .NET custom attributes.
Proceedings of the 2015 Conference on research in adaptive and convergent systems, 2015

Towards Gamification in Software Traceability: Between Test and Code Artifacts.
Proceedings of the ICSOFT-EA 2015, 2015

2014
Achievements and Challenges in State-of-the-Art Software Traceability Between Test and Code Artifacts.
IEEE Trans. Reliability, 2014

2013
Aspect-Oriented Program Testing: An Annotated Bibliography.
JSW, 2013

On the Current Measurement Practices in Agile Software Development
CoRR, 2013

2011
Empirical evaluation of the fault detection effectiveness and test effort efficiency of the automated AOP testing approaches.
Inf. Softw. Technol., 2011

2010
Towards Automated Monitoring and Forecasting of Probabilistic Quality Properties in Open Source Software (OSS): A Striking Hybrid Approach.
Proceedings of the Eighth ACIS International Conference on Software Engineering Research, 2010

2009
Towards a Framework for Automated Random Testing of Aspect-Oriented Programs.
Proceedings of the 18th International Conference on Software Engineering and Data Engineering (SEDE-2009), 2009

2008
An Ensemble of Complexity Metrics for BPEL Web Processes.
Proceedings of the Ninth ACIS International Conference on Software Engineering, 2008

2007
A Survey on Aspect-Oriented Testing Approaches.
Proceedings of the Selected Papers of the Fifth International Conference on, 2007


  Loading...