Volgen
Masoud Narouei, Ph.D.
Masoud Narouei, Ph.D.
Geverifieerd e-mailadres voor my.unt.edu
Titel
Geciteerd door
Geciteerd door
Jaar
DLLMiner: structural mining for malware detection
M Narouei, M Ahmadi, G Giacinto, H Takabi, A Sami
Security and Communication Networks 8 (18), 3311-3322, 2015
582015
Towards a top-down policy engineering framework for attribute-based access control
M Narouei, H Khanpour, H Takabi, N Parde, R Nielsen
proceedings of the 22nd ACM on Symposium on Access Control Models and …, 2017
432017
Automatic extraction of access control policies from natural language documents
M Narouei, H Takabi, R Nielsen
IEEE Transactions on Dependable and Secure Computing 17 (3), 506-517, 2018
362018
Towards an automatic top-down role engineering approach using natural language processing techniques
M Narouei, H Takabi
Proceedings of the 20th ACM Symposium on Access Control Models and …, 2015
272015
Identification of access control policy sentences from natural language policy documents
M Narouei, H Khanpour, H Takabi
Data and Applications Security and Privacy XXXI: 31st Annual IFIP WG 11.3 …, 2017
202017
Automatic top-down role engineering framework using natural language processing techniques
M Narouei, H Takabi
IFIP International Conference on Information Security Theory and Practice …, 2015
162015
A nature-inspired framework for optimal mining of attribute-based access control policies
M Narouei, H Takabi
Security and Privacy in Communication Networks: 15th EAI International …, 2019
82019
SePaS: Word sense disambiguation by sequential patterns in sentences
M NAROUEI, M AHMADI, A SAMI
Natural Language Engineering, 1-19, 2013
52013
A novel approach toward spam detection based on iterative patterns
M Razmara, B Asadi, M Narouei, M Ahmadi
2012 2nd International eConference on Computer and Knowledge Engineering …, 2012
42012
Textual spam detection: An iterative pattern mining approach
M Razmara, A Razmara, M Narouei
World Applied Sciences Journal 20 (2), 198-204, 2012
32012
A Novel Approach Toward Spam Detection Based on Iterative Patterns per Text
M Razmara, B Asadi, M Narouei, M Ahmadi
International eConference on Computer and Knowledge Engineering (ICCKE) 3, 3-8, 2012
22012
Mining Modules’ Dependencies for Malware Detection
M Narouei, M Ahmadi, A Sami
12012
A Top-Down Policy Engineering Framework for Attribute-Based Access Control
M Narouei
University of North Texas, 2020
2020
Mining Attribute-based Access Control Policies by Taking Aspirations from Particle Swarm Optimization Algorithm
M Narouei, H Takabi, L Adams
Poster in 2017 Annual Computer Security Applications conference (ACSAC'17), 2017
2017
Structural Mining for Malware Detection
BY Masoud Narouei, Mansour Ahmadi, Ashkan Sami, Marco Vieira
Poster Reception with light refreshments in Annual Computer Security …, 2014
2014
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–15