Volgen
Masoud Narouei, Ph.D.
Masoud Narouei, Ph.D.
Geverifieerd e-mailadres voor my.unt.edu
Titel
Geciteerd door
Geciteerd door
Jaar
DLLMiner: structural mining for malware detection
M Narouei, M Ahmadi, G Giacinto, H Takabi, A Sami
Security and Communication Networks 8 (18), 3311-3322, 2015
492015
Towards a top-down policy engineering framework for attribute-based access control
M Narouei, H Khanpour, H Takabi, N Parde, R Nielsen
Proceedings of the 22nd ACM on Symposium on Access Control Models and …, 2017
312017
Automatic extraction of access control policies from natural language documents
M Narouei, H Takabi, R Nielsen
IEEE Transactions on Dependable and Secure Computing 17 (3), 506-517, 2018
242018
Towards an automatic top-down role engineering approach using natural language processing techniques
M Narouei, H Takabi
Proceedings of the 20th ACM Symposium on Access Control Models and …, 2015
232015
Identification of access control policy sentences from natural language policy documents
M Narouei, H Khanpour, H Takabi
IFIP Annual Conference on Data and Applications Security and Privacy, 82-100, 2017
122017
Automatic top-down role engineering framework using natural language processing techniques
M Narouei, H Takabi
IFIP International Conference on Information Security Theory and Practice …, 2015
102015
A Nature-Inspired Framework for Optimal Mining of Attribute-Based Access Control Policies
M Narouei, H Takabi
International Conference on Security and Privacy in Communication Systems …, 2019
52019
A novel approach toward spam detection based on iterative patterns
M Razmara, B Asadi, M Narouei, M Ahmadi
2012 2nd International eConference on Computer and Knowledge Engineering …, 2012
42012
SePaS: Word sense disambiguation by sequential patterns in sentences
M NAROUEI, M AHMADI, A SAMI
Natural Language Engineering, 1-19, 2013
32013
Textual spam detection: An iterative pattern mining approach
M Razmara, A Razmara, M Narouei
World Applied Sciences Journal 20 (2), 198-204, 2012
32012
A Novel Approach Toward Spam Detection Based on Iterative Patterns per Text
M Razmara, B Asadi, M Narouei, M Ahmadi
International eConference on Computer and Knowledge Engineering (ICCKE) 3, 3-8, 2012
22012
Mining Modules’ Dependencies for Malware Detection
M Narouei, M Ahmadi, A Sami
12012
Mining Attribute-based Access Control Policies by Taking Aspirations from Particle Swarm Optimization Algorithm
M Narouei, H Takabi, L Adams
Poster in 2017 Annual Computer Security Applications conference (ACSAC'17), 2017
2017
Structural Mining for Malware Detection
BY Masoud Narouei, Mansour Ahmadi, Ashkan Sami, Marco Vieira
Poster Reception with light refreshments in Annual Computer Security …, 2014
2014
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–14