Morteza Noferesti

Orcid: 0009-0000-5507-1461

According to our database1, Morteza Noferesti authored at least 13 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A two-tiered framework for anomaly classification in IoT networks utilizing CNN-BiLSTM model.
Softw. Impacts, 2024

Enhancing empirical software performance engineering research with kernel-level events: A comprehensive system tracing approach.
J. Syst. Softw., 2024

Toward Adaptive Tracing: Efficient System Behavior Analysis using Language Models.
Proceedings of the 2024 ACM/IEEE 44th International Conference on Software Engineering: New Ideas and Emerging Results, 2024

2023
EMD-SCS: A Dynamic Behavioral Approach for Early Malware Detection with Sonification of System Call Sequences.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

PASD: A Performance Analysis Approach Through the Statistical Debugging of Kernel Events.
Proceedings of the 23rd IEEE International Working Conference on Source Code Analysis and Manipulation, 2023

CNN-BiLSTM-Based Classification of RPL Attacks in IoT Smart Grid Networks (Industry Track).
Proceedings of the 24th International Middleware Conference Industrial Track, 2023

2020
ACoPE: An adaptive semi-supervised learning approach for complex-policy enforcement in high-bandwidth networks.
Comput. Networks, 2020

2019
Inline high-bandwidth network analysis using a robust stream clustering algorithm.
IET Inf. Secur., 2019

DSCA: an inline and adaptive application identification approach in encrypted network traffic.
Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, 2019

2017
HB<sup>2</sup>DS: A behavior-driven high-bandwidth network mining system.
J. Syst. Softw., 2017

2012
Correctness Verification in Database Outsourcing: A Trust-Based Fake Tuples Approach.
Proceedings of the Information Systems Security, 8th International Conference, 2012

Database as a Service: Towards a Unified Solution for Security Requirements.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012

2011
A Signature-Based Approach of Correctness Assurance in Data Outsourcing Scenarios.
Proceedings of the Information Systems Security - 7th International Conference, 2011


  Loading...