سمتهای علمی و اجرایی در دانشگاهها و مراکز علمی کشور
سمتهای علمی و اجرایی در کنفرانس ها و نشستهای معتبر ایران
مقالات بین المللی خارج از کشور
- "A SEMANTIC ACCESS CONTROL MODEL FOR ONLINE SOCIAL NETWORKS", SciTech Solutions, (2017), Vol 0, No 0: 0-0
- "A semantic-based correlation approach for detecting hybrid and low-level APTs", Elsevier BV, (2019), Vol 96, No : 64-88
- "Multi-join query optimization in bucket-based encrypted databases using an enhanced ant colony optimization algorithm", Springer Science and Business Media LLC, (2018), Vol 36, No 2: 399-441
- "An access and inference control model for time series databases", Elsevier BV, (2019), Vol 92, No : 93-108
- "Cooperative security administration in multi-security-domain environments using a variant of deontic logic", Elsevier BV, (2012), Vol 19, No 3: 635-653
- "Specification of History Based Constraints for Access Control in Conceptual Level", Springer Berlin Heidelberg, (2010), Vol , No : 186-200
- "RTECA: Real time episode correlation algorithm for multi-step attack scenarios detection", Elsevier BV, (2015), Vol 49, No : 206-219
- "Enhancing Role-Based Access Control Model through Fuzzy Relations", IEEE, (2007), Vol , No :
- "Separation of Duty in Role-Based Access Control Model through Fuzzy Relations", IEEE, (2007), Vol , No :
- "A Context-Aware Access Control Model for Pervasive Computing Environments", IEEE, (2007), Vol , No :
- "Conflict Detection and Resolution in Context-Aware Authorization", IEEE, (2007), Vol , No :
- "Trust-Based User-Role Assignment in Role-Based Access Control", IEEE, (2007), Vol , No :
- "A calculus for composite authorities' policy derivation in shared domains of pervasive computing environments", IEEE, (2008), Vol , No :
- "A Dynamic Mandatory Access Control Model", Springer Berlin Heidelberg, (2008), Vol , No : 862-866
- "Preventing database schema extraction by error message handling", Elsevier BV, (2016), Vol 56, No : 135-156
- "RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks", Elsevier BV, (2006), Vol 25, No 6: 459-468
- "GTHBAC: A Generalized Temporal History Based Access Control Model", Springer Science and Business Media LLC, (2009), Vol 45, No 2-3: 111-125
- "Big knowledge-based semantic correlation for detecting slow and low-level advanced persistent threats", Springer Science and Business Media LLC, (2021), Vol 8, No 1:
- "A compiler for multi-key homomorphic signatures for Turing machines", Elsevier BV, (2021), Vol 889, No : 145-170
- "Integrity Checking for Aggregate Queries", Institute of Electrical and Electronics Engineers (IEEE), (2021), Vol 9, No : 74068-74084
- "Efficient verification of parallel matrix multiplication in public cloud: the MapReduce case", Springer Science and Business Media LLC, (2020), Vol 7, No 1:
- "Privacy Preserving Dynamic Access Control Model with Access Delegation for eHealth", CMV Verlag, (2020), Vol 17, No 3: 109-140
- "A semantic-based correlation approach for detecting hybrid and low-level APTs", Elsevier BV, (2019), Vol 96, No : 64-88
- "An access and inference control model for time series databases", Elsevier BV, (2019), Vol 92, No : 93-108
- "An access and inference control model for time series databases", Elsevier BV, (2019), Vol 92, No : 93-108
- "Purpose-Based Privacy Preserving Access Control for Secure Service Provision and Composition", Institute of Electrical and Electronics Engineers (IEEE), (2019), Vol 12, No 4: 604-620
- "Preventing database schema extraction by error message handling", Elsevier BV, (2016), Vol 56, No : 135-156
- "Trust Inference in Web-Based Social Networks Using Resistive Networks", IEEE, (2008), Vol , No :
- "PTO: A Trust Ontology for Pervasive Environments", IEEE, (2008), Vol , No :
- "A Temporal Semantic-Based Access Control Model", Springer Berlin Heidelberg, (2008), Vol , No : 559-568
- "A Semantic aware Access Control model with real time constraints on history of accesses", IEEE, (2008), Vol , No :
- "A Logic for Multi-domain Authorization Considering Administrators", IEEE, (2008), Vol , No :
- "A history based semantic aware access control model using logical time", IEEE, (2008), Vol , No :
- "Protecting Location Privacy through a Graph-Based Location Representation and a Robust Obfuscation Technique", Springer Berlin Heidelberg, (2009), Vol , No : 116-133
- "Handling Context in a Semantic-Based Access Control Framework", IEEE, (2009), Vol , No :
- "A Temporal Description Logic Based Access Control Model for Expressing History Constrained Policies in Semantic Web", IEEE, (2009), Vol , No :
- "A semantic-based access control mechanism using semantic technologies", ACM Press, (2009), Vol , No :
- "Multi-level authorisation model and framework for distributed semantic-aware environments", Institution of Engineering and Technology (IET), (2010), Vol 4, No 4: 301
- "Policy specification and enforcement in online social networks using MKNF<sup>&#x002B;</sup>", IEEE, (2012), Vol , No :
- "Non-monotonocity in OrBAC through default and exception policy rules", IEEE, (2012), Vol , No :
- "A trust and reputation-based access control model for virtual organizations", IEEE, (2012), Vol , No :
- "Fine-grained access control for hybrid mobile applications in Android using restricted paths", IEEE, (2016), Vol , No :
- "Purpose-Based Privacy Preserving Access Control for Secure Service Provision and Composition", Institute of Electrical and Electronics Engineers (IEEE), (2019), Vol 12, No 4: 604-620
- "Efficient verification of parallel matrix multiplication in public cloud: the MapReduce case", Springer Science and Business Media LLC, (2020), Vol 7, No 1:
- "A compiler for multi-key homomorphic signatures for Turing machines", Elsevier BV, (2021), Vol 889, No : 145-170
- "Integrity Checking for Aggregate Queries", Institute of Electrical and Electronics Engineers (IEEE), (2021), Vol 9, No : 74068-74084
مقالات کنفرانسهای داخلی
- یک مدل اعتماد مبتنی بر هستان شناسی و آگاه از معنا برای محیطهای محاسبات فراگیر ارائه شده در چهارمین کنفرانس انجمن رمز ایران (1386)
- توصیف و استنتاج خطمشی های دسترسی و الزام بر مبنای منطق هنجارها در محیطهای آگاه از معنا ارائه شده در چهارمین کنفرانس انجمن رمز ایران (1386)
- کنترل دسترسی آگاه از زمینه و مبتنی بر تاریخچه در محیط های محاسباتی فراگیر ارائه شده در نهمین کنفرانس دانشجویی مهندسی برق (1385)
- SPUNNLD: روشی جدید در تشخیص حملات از کاراندازی سرویس توزیع شده مبتنی بر ترکیب روشهای آماری و شبکه های عصبی مصنوعی بدون ناظر ارائه شده در دهمین کنفرانس سالانه انجمن کامپیوتر ایران (1383)
- سیستم تشخیص تهاجم مبتنی بر شبکه عصبیART ارائه شده در پنجمین کنفرانس سراسری سیستم های هوشمند (1382)