Behrouz Tork Ladani
Orcid: 0000-0003-2280-8839
According to our database1,
Behrouz Tork Ladani
authored at least 60 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
On csauthors.net:
Bibliography
2024
Autom. Softw. Eng., November, 2024
2023
J. Reliab. Intell. Environ., December, 2023
Maaker: A framework for detecting and defeating evasion techniques in Android malware.
J. Inf. Secur. Appl., November, 2023
A model-based framework for inter-app Vulnerability analysis of Android applications.
Softw. Pract. Exp., April, 2023
Privacy, trust, and secure rewarding in mobile crowd-sensing based spectrum monitoring.
J. Ambient Intell. Humaniz. Comput., 2023
A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware.
ISC Int. J. Inf. Secur., 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
Adaptive cost-sensitive stance classification model for rumor detection in social networks.
Soc. Netw. Anal. Min., 2022
Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System.
ISC Int. J. Inf. Secur., 2022
Light-Weight Privacy-Preserving Data Aggregation Protocols in Smart Grid Metering Networks.
ISC Int. J. Inf. Secur., 2022
SANT: Static Analysis of Native Threads for Security Vetting of Android Applications.
ISC Int. J. Inf. Secur., 2022
A Model-Based Approach for Representing Data Sharing Mechanism in Android Applications.
Proceedings of the 27th International Computer Conference, Computer Society of Iran, 2022
2021
ISC Int. J. Inf. Secur., 2021
MEGDroid: A model-driven event generation framework for dynamic android malware analysis.
Inf. Softw. Technol., 2021
Eng. Appl. Artif. Intell., 2021
A machine learning approach for detecting and categorizing evasion sources in Android malware.
Proceedings of the 18th International ISC Conference on Information Security and Cryptology, 2021
2020
IEEE Trans. Comput. Soc. Syst., 2020
Inf. Syst. Frontiers, 2020
Future Gener. Comput. Syst., 2020
IEEE Access, 2020
Proceedings of the 17th International ISC Conference on Information Security and Cryptology, 2020
2019
VAnDroid: A framework for vulnerability analysis of Android applications using a model-driven reverse engineering technique.
Softw. Pract. Exp., 2019
ISC Int. J. Inf. Secur., 2019
Future Gener. Comput. Syst., 2019
2017
An automatic test case generator for evaluating implementation of access control policies.
ISC Int. J. Inf. Secur., 2017
Proceedings of the 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2017
2016
Comput. J., 2016
Comput. Hum. Behav., 2016
Appl. Intell., 2016
2015
Security Analysis and Strengthening of an RFID Lightweight Authentication Protocol Suitable for VANETs.
Wirel. Pers. Commun., 2015
ISC Int. J. Inf. Secur., 2015
Modelling and Quantitative Verification of Reputation Systems Against Malicious Attackers.
Comput. J., 2015
2014
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014
2013
Quantitative verification of beta reputation system using PRISM probabilistic model checker.
Proceedings of the 10th International ISC Conference on Information Security and Cryptology, 2013
2011
A model for specification, composition and verification of access control policies and its application to web services.
ISC Int. J. Inf. Secur., 2011
Proceedings of the Advances in Information and Computer Security, 2011
Proceedings of the Advances in Artificial Intelligence, 2011
2010
Future Gener. Comput. Syst., 2010
Comput. Informatics, 2010
Proceedings of the Fourth UKSim European Symposium on Computer Modeling and Simulation, 2010
Proceedings of the 2010 EDBT/ICDT Workshops, Lausanne, Switzerland, March 22-26, 2010, 2010
2009
Proceedings of the Information Systems, Technology and Management, 2009
A conceptual framework for specification, analysis, and design of anonymity services.
Proceedings of the 2009 EDBT/ICDT Workshops, Saint-Petersburg, Russia, March 22, 2009, 2009
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Scheduling, 2009
2008
A New Approach for Scoring Relevant Documents by Applying a Farsi Stemming Method in Persian Web Search Engines.
Proceedings of the Advances in Computer Science and Engineering, 2008
2007
Proceedings of the Applications of Data Mining in E-Business and Finance, 2007
Measuring of Strategies' Similarity in Automated Negotiation.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007
A Dynamic Reconfigurable Web Service Composition Framework Using Reo Coordination Language.
Proceedings of the Fifth IEEE European Conference on Web Services (ECOWS 2007), 2007
2006
Specification and Implementation of Multi-Agent Organizations.
Proceedings of the WEBIST 2006, 2006
2005
Proceedings of the Testing of Communicating Systems, 2005