Morteza Amini
Orcid: 0000-0001-7269-779X
According to our database1,
Morteza Amini
authored at least 57 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2006
2008
2010
2012
2014
2016
2018
2020
2022
2024
0
1
2
3
4
5
6
7
8
9
10
2
1
7
1
5
1
2
3
4
2
1
2
1
1
1
1
1
1
1
3
9
5
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Mole: Efficient Crash Reproduction in Android Applications With Enforcing Necessary UI Events.
IEEE Trans. Software Eng., August, 2024
Genomic data analysis using a two stage expectation propagation algorithm for analysis of sparse Bayesian high-dimensional instrumental variables regression.
Commun. Stat. Simul. Comput., May, 2024
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024
2023
Comput. Stat., September, 2023
2021
Theor. Comput. Sci., 2021
Big knowledge-based semantic correlation for detecting slow and low-level advanced persistent threats.
J. Big Data, 2021
Selection of the best minimal repair systems for Weibull lifetime distribution: A Bayesian approach.
Commun. Stat. Simul. Comput., 2021
Diagnosis of Alzheimer's Disease Severity with fMRI Images Using Robust Multitask Feature Extraction Method and Convolutional Neural Network (CNN).
Comput. Math. Methods Medicine, 2021
Diagnosis of Alzheimer's Disease by Time-Dependent Power Spectrum Descriptors and Convolutional Neural Network Using EEG Signal.
Comput. Math. Methods Medicine, 2021
Comput. Intell. Neurosci., 2021
2020
Efficient verification of parallel matrix multiplication in public cloud: the MapReduce case.
J. Big Data, 2020
2019
Purpose-Based Privacy Preserving Access Control for Secure Service Provision and Composition.
IEEE Trans. Serv. Comput., 2019
Multiparameter estimation, lower bound on quantum Fisher information, and non-Markovianity witnesses of noisy two-qubit systems.
Quantum Inf. Process., 2019
Future Gener. Comput. Syst., 2019
Future Gener. Comput. Syst., 2019
Improving the prediction performance of the LASSO by subtracting the additive structural noises.
Comput. Stat., 2019
Proceedings of the MobiQuitous 2019, 2019
2018
Multi-join query optimization in bucket-based encrypted databases using an enhanced ant colony optimization algorithm.
Distributed Parallel Databases, 2018
2017
Commun. Stat. Simul. Comput., 2017
Android Malware Detection using Markov Chain Model of Application Behaviors in Requesting System Services.
CoRR, 2017
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
2016
Optimal Design for Step-Stress Accelerated Test with Random Discrete Stress Elevating Times Based on Gamma Degradation Process.
Qual. Reliab. Eng. Int., 2016
Failure Inference and Optimization for Step Stress Model Based on Bivariate Wiener Model.
Commun. Stat. Simul. Comput., 2016
Fine-grained access control for hybrid mobile applications in Android using restricted paths.
Proceedings of the 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, 2016
2015
J. Multivar. Anal., 2015
A combination of semantic and attribute-based access control model for virtual organizations.
ISC Int. J. Inf. Secur., 2015
RTECA: Real time episode correlation algorithm for multi-step attack scenarios detection.
Comput. Secur., 2015
2013
A semantic-aware role-based access control model for pervasive computing environments.
ISC Int. J. Inf. Secur., 2013
Comput. Stat. Data Anal., 2013
2012
Cooperative security administration in multi-security-domain environments using a variant of deontic logic.
Sci. Iran., 2012
2010
Telecommun. Syst., 2010
Multi-level authorisation model and framework for distributed semantic-aware environments.
IET Inf. Secur., 2010
Proceedings of the Information Systems Security - 6th International Conference, 2010
2009
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009
A Temporal Description Logic Based Access Control Model for Expressing History Constrained Policies in Semantic Web.
Proceedings of the POLICY 2009, 2009
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009
2008
Proceedings of the Computer Safety, 2008
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008
A Semantic aware Access Control model with real time constraints on history of accesses.
Proceedings of the International Multiconference on Computer Science and Information Technology, 2008
Proceedings of the Third International Conference on Internet and Web Applications and Services, 2008
Protecting Location Privacy through a Graph-Based Location Representation and a Robust Obfuscation Technique.
Proceedings of the Information Security and Cryptology, 2008
Proceedings of the Advances in Computer Science and Engineering, 2008
Proceedings of the Advances in Computer Science and Engineering, 2008
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
2007
Proceedings of the 2007 International Conference on Intelligent Pervasive Computing, 2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007
Proceedings of the Third International Symposium on Information Assurance and Security, 2007
Proceedings of the Third International Symposium on Information Assurance and Security, 2007
2006
RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks.
Comput. Secur., 2006
Proceedings of the Information Systems Security, Second International Conference, 2006
2005
Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks.
Proceedings of the Information Security Practice and Experience, 2005