Rasool Jalili
Orcid: 0000-0002-9853-1955
According to our database1,
Rasool Jalili
authored at least 103 papers
between 1994 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Mal2GCN: a robust malware detection approach using deep graph convolutional networks with non-negative weights.
J. Comput. Virol. Hacking Tech., 2024
IEEE Trans. Inf. Forensics Secur., 2024
2023
IEEE Trans. Dependable Secur. Comput., 2023
2022
RAD: A Statistical Mechanism Based on Behavioral Analysis for DDoS Attack Countermeasure.
IEEE Trans. Inf. Forensics Secur., 2022
2021
Adversarial Network Traffic: Towards Evaluating the Robustness of Deep-Learning-Based Network Traffic Classification.
IEEE Trans. Netw. Serv. Manag., 2021
Hardness of Samples Is All You Need: Protecting Deep Learning Models Using Hardness of Samples.
CoRR, 2021
2020
Adversarial Network Traffic: Toward Evaluating the Robustness of Deep Learning Based Network Traffic Classification.
CoRR, 2020
ACoPE: An adaptive semi-supervised learning approach for complex-policy enforcement in high-bandwidth networks.
Comput. Networks, 2020
2019
SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing.
ISC Int. J. Inf. Secur., 2019
IET Inf. Secur., 2019
DSCA: an inline and adaptive application identification approach in encrypted network traffic.
Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, 2019
2018
ISC Int. J. Inf. Secur., 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
J. Syst. Softw., 2017
Proceedings of the 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2017
2016
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2016
Int. J. Comput. Math., 2016
Efficient Lattice-based Authenticated Encryption: A Practice-Oriented Provable Security Approach.
IACR Cryptol. ePrint Arch., 2016
Future Gener. Comput. Syst., 2016
Distributed Parallel Databases, 2016
XABA: A zero-knowledge anomaly-based behavioral analysis method to detect insider threats.
Proceedings of the 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, 2016
2015
On Constrained Implementation of Lattice-Based Cryptographic Primitives and Schemes on Smart Cards.
ACM Trans. Embed. Comput. Syst., 2015
(<i>t</i>, <i>k</i>)-Hypergraph anonymization: an approach for secure data publishing.
Secur. Commun. Networks, 2015
Int. J. Inf. Sec., 2015
FORSAKES: A forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes.
Adv. Math. Commun., 2015
2014
Implementation and Comparison of Lattice-based Identification Protocols on Smart Cards and Microcontrollers.
IACR Cryptol. ePrint Arch., 2014
Mid-defense: Mitigating protocol-level attacks in TOR using indistinguishability obfuscation.
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014
Proceedings of the 11th International ISC Conference on Information Security and Cryptology, 2014
2013
Efficient Statistical Zero-Knowledge Authentication Protocols for Smart Cards Secure Against Active & Concurrent Quantum Attacks.
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013
Proceedings of the 10th International ISC Conference on Information Security and Cryptology, 2013
Proceedings of the 10th International ISC Conference on Information Security and Cryptology, 2013
A UC-Secure Authenticated Contributory Group Key Exchange Protocol Based on Discrete Logarithm.
Proceedings of the Information Systems Security - 9th International Conference, 2013
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013
2012
Cooperative security administration in multi-security-domain environments using a variant of deontic logic.
Sci. Iran., 2012
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012
Correctness Verification in Database Outsourcing: A Trust-Based Fake Tuples Approach.
Proceedings of the Information Systems Security, 8th International Conference, 2012
AS5: A Secure Searchable Secret Sharing Scheme for Privacy Preserving Database Outsourcing.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012
Proceedings of the Data and Applications Security and Privacy XXVI, 2012
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012
Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, 2012
2011
ISC Int. J. Inf. Secur., 2011
Milder Definitions of Computational Approximability: The Case of Zero-Knowledge Protocols.
IACR Cryptol. ePrint Arch., 2011
Access control enforcement on outsourced data ensuring privacy of access control policies.
Proceedings of the 2011 International Conference on High Performance Computing & Simulation, 2011
Proceedings of the Information Systems Security - 7th International Conference, 2011
2010
Telecommun. Syst., 2010
Multi-level authorisation model and framework for distributed semantic-aware environments.
IET Inf. Secur., 2010
Vulnerability analysis of networks to detect multiphase attacks using the actor-based language Rebeca.
Comput. Electr. Eng., 2010
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Proceedings of the Information Systems Security - 6th International Conference, 2010
2009
J. Inf. Sci. Eng., 2009
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009
Proceedings of the Third International Conference on Emerging Security Information, 2009
A Temporal Description Logic Based Access Control Model for Expressing History Constrained Policies in Semantic Web.
Proceedings of the POLICY 2009, 2009
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009
2008
J. Inf. Sci. Eng., 2008
Proceedings of the Computer Safety, 2008
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008
A Semantic aware Access Control model with real time constraints on history of accesses.
Proceedings of the International Multiconference on Computer Science and Information Technology, 2008
Proceedings of the 16th International Conference on Networks, 2008
Proceedings of the Third International Conference on Internet and Web Applications and Services, 2008
Protecting Location Privacy through a Graph-Based Location Representation and a Robust Obfuscation Technique.
Proceedings of the Information Security and Cryptology, 2008
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008
CEBAC: A Decentralized Cooperation Enforcement Based Access Control Framework in MANETs.
Proceedings of the Advances in Computer Science and Engineering, 2008
Proceedings of the Advances in Computer Science and Engineering, 2008
Proceedings of the Advances in Computer Science and Engineering, 2008
Proceedings of the Advances in Computer Science and Engineering, 2008
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
2007
Vulnerability Take Grant (VTG): An efficient approach to analyze network vulnerabilities.
Comput. Secur., 2007
Proceedings of the International Symposium on Fundamentals of Software Engineering, 2007
Design and Implementation of a Dynamic-Reconfigurable Architecture for Protocol Stack.
Proceedings of the International Symposium on Fundamentals of Software Engineering, 2007
Formalizing Compatibility and Substitutability in Communication Protocols Using I/O-Constraint Automata.
Proceedings of the International Symposium on Fundamentals of Software Engineering, 2007
Proceedings of the Fourth European Conference on Universal Multiservice Networks (ECUMN 2007), 2007
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007
Proceedings of the Third International Symposium on Information Assurance and Security, 2007
Proceedings of the Third International Symposium on Information Assurance and Security, 2007
2006
RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks.
Comput. Secur., 2006
Security Enhancement for a Low Computation Cost User Authentication Scheme.
Proceedings of the SECRYPT 2006, 2006
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006
Proceedings of the Information Systems Security, Second International Conference, 2006
An Access Control Framework for Pervasive Computing Environments.
Proceedings of the 2006 International Conference on Pervasive Systems & Computing, 2006
An Architecture for a Context-aware Service Broker in Ubiquitous Computing Environments.
Proceedings of the 2006 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2006), 2006
2005
Proceedings of the First IPM International Workshop on Foundations of Software Engineering, 2005
Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks.
Proceedings of the Information Security Practice and Experience, 2005
Proceedings of the Information and Communications Security, 7th International Conference, 2005
2002
Proceedings of the EurAsia-ICT 2002: Information and Communication Technology, 2002
1995
Using directed graphs to describe entity dependency in stable distributed persistent stores.
Proceedings of the 28th Annual Hawaii International Conference on System Sciences (HICSS-28), 1995
1994
Proceedings of WORDS '94. The First Workshop on Object-Oriented Real-Time Dependable Systems, 1994
Proceedings of the Persistent Object Systems, 1994