Volgen
Hamid Reza Shahriari
Titel
Geciteerd door
Geciteerd door
Jaar
Software vulnerability analysis and discovery using machine-learning and data-mining techniques: A survey
SM Ghaffarian, HR Shahriari
ACM Computing Surveys (CSUR) 50 (4), 1-36, 2017
2892017
RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks
M Amini, R Jalili, HR Shahriari
computers & security 25 (6), 459-468, 2006
1682006
Connection-Monitor & Connection-Breaker: A Novel Approach for Prevention and Detection of High Survivable Ransomwares
MM AHMADIAN, HR Shahriari, SMG ANBERAN
12th International ISC Conference on Information Security and Cryptography, 2015
882015
Detection of distributed denial of service attacks using statistical pre-processor and unsupervised neural networks
R Jalili, F Imani-Mehr, M Amini, HR Shahriari
International Conference on Information Security Practice and Experience …, 2005
862005
2entFOX: A framework for high survivable ransomwares detection
MM Ahmadian, HR Shahriari
2016 13th international iranian society of cryptology conference on …, 2016
682016
Seven years of software vulnerabilities: The ebb and flow
H Homaei, HR Shahriari
IEEE Security & Privacy 15 (1), 58-65, 2017
332017
Vulnerability Take Grant (VTG): An efficient approach to analyze network vulnerabilities
HR Shahriari, R Jalili
computers & security 26 (5), 349-360, 2007
262007
Using CSP to model and analyze transmission control protocol vulnerabilities within the broadcast network
HR Shahriari, R Jalili
2004 International Networking and Communication Conference, 42-47, 2004
192004
Network vulnerability analysis through vulnerability take-grant model (VTG)
HR Shahriari, R Sadoddin, R Jalili, R Zakeri, AR Omidian
International Conference on Information and Communications Security, 256-268, 2005
182005
A survey of anomaly detection approaches in internet of things.
M Behniafar, A Nowroozi, HR Shahriari
ISeCure 10 (2), 2018
172018
Using description logics for network vulnerability analysis
R Zakeri, R Jalili, HR Shahriari, H Abolhassani
International Conference on Networking, International Conference on Systems …, 2006
172006
BotRevealer: Behavioral detection of botnets based on botnet life-cycle
E Khoshhalpour, HR Shahriari
The ISC International Journal of Information Security 10 (1), 55-61, 2018
152018
A hybrid approach for database intrusion detection at transaction and inter-transaction levels
M Doroudian, HR Shahriari
2014 6th Conference on Information and Knowledge Technology (IKT), 1-6, 2014
142014
A model for asset valuation in security risk analysis regarding assets' dependencies
I Loloei, HR Shahriari, A Sadeghi
20th Iranian Conference on Electrical Engineering (ICEE2012), 763-768, 2012
142012
Modeling TCP/IP networks topology for network vulnerability analysis
R Zakeri, HR Shahriari, R Jalili, R Sadoddin
2nd int. symposium of telecommunications, 653-658, 2005
142005
Athena: A framework to automatically generate security test oracle via extracting policies from source code and intended software behaviour
H Homaei, HR Shahriari
Information and Software Technology 107, 112-124, 2019
132019
A new method for occupational fraud detection in process aware information systems
S Mardani, HR Shahriari
2013 10th International ISC Conference on Information Security and …, 2013
132013
Modeling and analyzing network vulnerabilities via a logic-based approach
HR Shahriari, R Jalili
Proceedings of the 2nd Int. Symposium of Telecommunications, 13-18, 2005
132005
Botcointrap: detection of bitcoin miner botnet using host based approach
A Zareh, HR Shahriari
2018 15th International ISC (Iranian Society of Cryptology) Conference on …, 2018
122018
Dwarf frankenstein is still in your memory: tiny code reuse attacks
AA Sadeghi, F Aminmansour, HR Shahriari
The ISC International Journal of Information Security 9 (1), 53-72, 2017
12*2017
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20