Hamid Reza Shahriari
Orcid: 0000-0002-2749-6355
According to our database1,
Hamid Reza Shahriari
authored at least 40 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
J. Supercomput., April, 2024
Improving Agents Trust in Service-Oriented Environment Based on Entropy Structure and Information Ethics Principles.
Int. J. Hum. Comput. Interact., January, 2024
CryptojackingTrap: An Evasion Resilient Nature-Inspired Algorithm to Detect Cryptojacking Malware.
IEEE Trans. Inf. Forensics Secur., 2024
Demo - Unmasking the Unseen: CryptojackingTrap, the Most Resilient Evasion-Proof Cryptojacking Malware Detection Algorithm.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2024
2023
HAKECC: Highly efficient authentication and key agreement scheme based on ECDH for RFID in IOT environment.
J. Inf. Secur. Appl., August, 2023
A Secure and Efficient Scheme for Mutual Authentication for Integrity of Exchanged Data in IoMT.
Proceedings of the 28th International Computer Conference, Computer Society of Iran, 2023
2022
Comment on "Provably secure biometric-based client-server secure communication over unreliable networks".
CoRR, 2022
2021
Neural software vulnerability analysis using rich intermediate graph representations of programs.
Inf. Sci., 2021
2020
Detecting application logic vulnerabilities via finding incompatibility between application design and implementation.
IET Softw., 2020
ANOVUL: Detection of logic vulnerabilities in annotated programs via data and control flow analysis.
IET Inf. Secur., 2020
2019
Athena: A framework to automatically generate security test oracle via extracting policies from source code and intended software behaviour.
Inf. Softw. Technol., 2019
2018
ISC Int. J. Inf. Secur., 2018
ISC Int. J. Inf. Secur., 2018
IET Inf. Secur., 2018
Proceedings of the 15th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2018
Detecting Privacy Leaks in Android Apps using Inter-Component Information Flow Control Analysis.
Proceedings of the 15th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2018
2017
ISC Int. J. Inf. Secur., 2017
Enterp. Inf. Syst., 2017
Software Vulnerability Analysis and Discovery Using Machine-Learning and Data-Mining Techniques: A Survey.
ACM Comput. Surv., 2017
2016
ISC Int. J. Inf. Secur., 2016
Proceedings of the 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, 2016
2014
A hybrid approach for database intrusion detection at transaction and inter-transaction levels.
ISC Int. J. Inf. Secur., 2014
Tazhi: A novel technique for hunting trampoline gadgets of jump oriented programming (A class of code reuse attacks).
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014
Towards a process-oriented framework for improving trust and security in migration to cloud.
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014
Comparison-based agent partitioning with learning automata: A trust model for service-oriented environments.
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014
2013
ISC Int. J. Inf. Secur., 2013
Proceedings of the 10th International ISC Conference on Information Security and Cryptology, 2013
2011
Comput. J., 2011
An Enhanced Method for Computation of Similarity between the Contexts in Trust Evaluation Using Weighted Ontology.
Proceedings of the IEEE 10th International Conference on Trust, 2011
A Method for Preserving Privacy in Published Multi-relational Social Networks.
Proceedings of the KMIS 2011, 2011
2010
Vulnerability analysis of networks to detect multiphase attacks using the actor-based language Rebeca.
Comput. Electr. Eng., 2010
Privacy Protection of Grid Service Requesters through Distributed Attribute Based Access Control Model.
Proceedings of the Advances in Grid and Pervasive Computing, 5th International Conference, 2010
2008
J. Inf. Sci. Eng., 2008
2007
Vulnerability Take Grant (VTG): An efficient approach to analyze network vulnerabilities.
Comput. Secur., 2007
2006
RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks.
Comput. Secur., 2006
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006
2005
Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks.
Proceedings of the Information Security Practice and Experience, 2005
Proceedings of the Information and Communications Security, 7th International Conference, 2005