Morteza Amini

Orcid: 0000-0001-7269-779X

According to our database1, Morteza Amini authored at least 57 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

2006
2008
2010
2012
2014
2016
2018
2020
2022
2024
0
1
2
3
4
5
6
7
8
9
10
2
1
7
1
5
1
2
3
4
2
1
2
1
1
1
1
1
1
1
3
9
5
1
1

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Mole: Efficient Crash Reproduction in Android Applications With Enforcing Necessary UI Events.
IEEE Trans. Software Eng., August, 2024

Genomic data analysis using a two stage expectation propagation algorithm for analysis of sparse Bayesian high-dimensional instrumental variables regression.
Commun. Stat. Simul. Comput., May, 2024

Activity Recognition Protection for IoT Trigger-Action Platforms.
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024

2023
hhsmm: an R package for hidden hybrid Markov/semi-Markov models.
Comput. Stat., September, 2023

2021
A compiler for multi-key homomorphic signatures for Turing machines.
Theor. Comput. Sci., 2021

Big knowledge-based semantic correlation for detecting slow and low-level advanced persistent threats.
J. Big Data, 2021

Selection of the best minimal repair systems for Weibull lifetime distribution: A Bayesian approach.
Commun. Stat. Simul. Comput., 2021

Diagnosis of Alzheimer's Disease Severity with fMRI Images Using Robust Multitask Feature Extraction Method and Convolutional Neural Network (CNN).
Comput. Math. Methods Medicine, 2021

Diagnosis of Alzheimer's Disease by Time-Dependent Power Spectrum Descriptors and Convolutional Neural Network Using EEG Signal.
Comput. Math. Methods Medicine, 2021

Single and Combined Neuroimaging Techniques for Alzheimer's Disease Detection.
Comput. Intell. Neurosci., 2021

Integrity Checking for Aggregate Queries.
IEEE Access, 2021

2020
Efficient verification of parallel matrix multiplication in public cloud: the MapReduce case.
J. Big Data, 2020

2019
Purpose-Based Privacy Preserving Access Control for Secure Service Provision and Composition.
IEEE Trans. Serv. Comput., 2019

Multiparameter estimation, lower bound on quantum Fisher information, and non-Markovianity witnesses of noisy two-qubit systems.
Quantum Inf. Process., 2019

An access and inference control model for time series databases.
Future Gener. Comput. Syst., 2019

A semantic-based correlation approach for detecting hybrid and low-level APTs.
Future Gener. Comput. Syst., 2019

Improving the prediction performance of the LASSO by subtracting the additive structural noises.
Comput. Stat., 2019

Detecting malicious applications using system services request behavior.
Proceedings of the MobiQuitous 2019, 2019

2018
Multi-join query optimization in bucket-based encrypted databases using an enhanced ant colony optimization algorithm.
Distributed Parallel Databases, 2018

2017
Nonparametric estimation of the entropy using a ranked set sample.
Commun. Stat. Simul. Comput., 2017

Android Malware Detection using Markov Chain Model of Application Behaviors in Requesting System Services.
CoRR, 2017

Enhancing Accuracy of Android Malware Detection using Intent Instrumentation.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

2016
Optimal Design for Step-Stress Accelerated Test with Random Discrete Stress Elevating Times Based on Gamma Degradation Process.
Qual. Reliab. Eng. Int., 2016

Preventing database schema extraction by error message handling.
Inf. Syst., 2016

Failure Inference and Optimization for Step Stress Model Based on Bivariate Wiener Model.
Commun. Stat. Simul. Comput., 2016

Fine-grained access control for hybrid mobile applications in Android using restricted paths.
Proceedings of the 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, 2016

2015
Optimal partial ridge estimation in restricted semiparametric regression models.
J. Multivar. Anal., 2015

A combination of semantic and attribute-based access control model for virtual organizations.
ISC Int. J. Inf. Secur., 2015

Pooled parametric inference for minimal repair systems.
Comput. Stat., 2015

RTECA: Real time episode correlation algorithm for multi-step attack scenarios detection.
Comput. Secur., 2015

2013
A semantic-aware role-based access control model for pervasive computing environments.
ISC Int. J. Inf. Secur., 2013

Nonparametric meta-analysis of independent samples of records.
Comput. Stat. Data Anal., 2013

2012
Cooperative security administration in multi-security-domain environments using a variant of deontic logic.
Sci. Iran., 2012

2010
GTHBAC: A Generalized Temporal History Based Access Control Model.
Telecommun. Syst., 2010

Multi-level authorisation model and framework for distributed semantic-aware environments.
IET Inf. Secur., 2010

Specification of History Based Constraints for Access Control in Conceptual Level.
Proceedings of the Information Systems Security - 6th International Conference, 2010

2009
CAMAC: a context-aware mandatory access control model.
ISC Int. J. Inf. Secur., 2009

A semantic-based access control mechanism using semantic technologies.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009

A Temporal Description Logic Based Access Control Model for Expressing History Constrained Policies in Semantic Web.
Proceedings of the POLICY 2009, 2009

Handling Context in a Semantic-Based Access Control Framework.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
A Context-Aware Mandatory Access Control Model for Multilevel Security Environments.
Proceedings of the Computer Safety, 2008

A Logic for Multi-domain Authorization Considering Administrators.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008

A Semantic aware Access Control model with real time constraints on history of accesses.
Proceedings of the International Multiconference on Computer Science and Information Technology, 2008

Trust Inference in Web-Based Social Networks Using Resistive Networks.
Proceedings of the Third International Conference on Internet and Web Applications and Services, 2008

Protecting Location Privacy through a Graph-Based Location Representation and a Robust Obfuscation Technique.
Proceedings of the Information Security and Cryptology, 2008

A Temporal Semantic-Based Access Control Model.
Proceedings of the Advances in Computer Science and Engineering, 2008

A Dynamic Mandatory Access Control Model.
Proceedings of the Advances in Computer Science and Engineering, 2008

A Semantic-Aware Ontology-Based Trust Model for Pervasive Computing Environments.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008

PTO: A Trust Ontology for Pervasive Environments.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
A Context-Aware Access Control Model for Pervasive Computing Environments.
Proceedings of the 2007 International Conference on Intelligent Pervasive Computing, 2007

Conflict Detection and Resolution in Context-Aware Authorization.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

Trust-Based User-Role Assignment in Role-Based Access Control.
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007

Enhancing Role-Based Access Control Model through Fuzzy Relations.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

Separation of Duty in Role-Based Access Control Model through Fuzzy Relations.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2006
RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks.
Comput. Secur., 2006

Context-Aware Provisional Access Control.
Proceedings of the Information Systems Security, Second International Conference, 2006

2005
Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks.
Proceedings of the Information Security Practice and Experience, 2005


  Loading...