Mehdi Kharrazi

Orcid: 0000-0002-1773-8314

According to our database1, Mehdi Kharrazi authored at least 25 papers between 2003 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Blue-Pill Oxpecker: A VMI Platform for Transactional Modification.
IEEE Trans. Cloud Comput., 2023

2022
VulSlicer: Vulnerability detection through code slicing.
J. Syst. Softw., 2022

2020
Improving real-world vulnerability characterization with vulnerable slices.
Proceedings of the PROMISE '20: 16th International Conference on Predictive Models and Data Analytics in Software Engineering, 2020

2019
Inferring API Correct Usage Rules: A Tree-based Approach.
Proceedings of the 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2019

2018
LDMBL: An architecture for reducing code duplication in heavyweight binary instrumentations.
Softw. Pract. Exp., 2018

An Anomaly-based Botnet Detection Approach for Identifying Stealthy Botnets.
CoRR, 2018

2016
Partov: a network simulation and emulation tool.
J. Simulation, 2016

2015
A composite-metric based path selection technique for the Tor anonymity network.
J. Syst. Softw., 2015

2014
Back to Static Analysis for Kernel-Level Rootkit Detection.
IEEE Trans. Inf. Forensics Secur., 2014

2013
Payload Attribution via Character Dependent Multi-Bloom Filters.
IEEE Trans. Inf. Forensics Secur., 2013

2012
Improving a Computer Networks Course Using the Partov Simulation Engine.
IEEE Trans. Educ., 2012

2010
2Ploc: Preserving Privacy in Location-based Services.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Passive Worm and Malware Detection in Peer-to-Peer Networks.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

2007
Towards real-time performance monitoring for encrypted traffic.
Proceedings of the 2007 SIGCOMM Workshop on Internet Network Management, 2007

2006
Improving Steganalysis by Fusion Techniques: A Case Study with Image Steganography.
Trans. Data Hiding Multim. Secur., 2006

Performance study of common image steganography and steganalysis techniques.
J. Electronic Imaging, 2006

Cover Selection for Steganographic Embedding.
Proceedings of the International Conference on Image Processing, 2006

2005
Data Masking: A New Approach for Steganography?
J. VLSI Signal Process., 2005

Image Steganalysis with Binary Similarity Measures.
EURASIP J. Adv. Signal Process., 2005

Benchmarking steganographic and steganalysis techniques.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

PSteg: steganographic embedding through patching.
Proceedings of the 2005 IEEE International Conference on Acoustics, 2005

2004
Blind source camera identification.
Proceedings of the 2004 International Conference on Image Processing, 2004

Nabs: A System for Detecting Resource Abuses via Characterization of Flow Content Type.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004

2003
ODISSEA: A Peer-to-Peer Architecture for Scalable Web Search and Information Retrieval.
Proceedings of the Twelfth International World Wide Web Conference - Posters, 2003

Image Steganography and Steganalysis: Concepts and Practice.
Proceedings of the Digital Watermarking, Second International Workshop, 2003


  Loading...