Stebėti
Hamid Reza Shahriari
Pavadinimas
Cituota
Cituota
Metai
Software vulnerability analysis and discovery using machine-learning and data-mining techniques: A survey
SM Ghaffarian, HR Shahriari
ACM computing surveys (CSUR) 50 (4), 1-36, 2017
4602017
RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks
M Amini, R Jalili, HR Shahriari
computers & security 25 (6), 459-468, 2006
1752006
Connection-Monitor & Connection-Breaker: A Novel Approach for Prevention and Detection of High Survivable Ransomwares
MM AHMADIAN, HR Shahriari, SMG ANBERAN
12th International ISC Conference on Information Security and Cryptography, 2015
1092015
Detection of distributed denial of service attacks using statistical pre-processor and unsupervised neural networks
R Jalili, F Imani-Mehr, M Amini, HR Shahriari
Information Security Practice and Experience: First International Conference …, 2005
882005
2entFOX: A framework for high survivable ransomwares detection
MM Ahmadian, HR Shahriari
2016 13th international iranian society of cryptology conference on …, 2016
832016
Seven years of software vulnerabilities: The ebb and flow
H Homaei, HR Shahriari
IEEE Security & Privacy 15 (1), 58-65, 2017
382017
Neural software vulnerability analysis using rich intermediate graph representations of programs
SM Ghaffarian, HR Shahriari
Information Sciences 553, 189-207, 2021
352021
A Survey of Anomaly Detection Approaches in Internet of Things.
M Behniafar, A Nowroozi, HR Shahriari
ISeCure 10 (2), 2018
282018
Vulnerability Take Grant (VTG): An efficient approach to analyze network vulnerabilities
HR Shahriari, R Jalili
computers & security 26 (5), 349-360, 2007
252007
Using CSP to model and analyze transmission control protocol vulnerabilities within the broadcast network
HR Shahriari, R Jalili
2004 International Networking and Communication Conference, 42-47, 2004
192004
BotRevealer: Behavioral Detection of Botnets based on Botnet Life-cycle.
E Khoshhalpour, HR Shahriari
ISeCure 10 (1), 2018
182018
Using description logics for network vulnerability analysis
R Zakeri, R Jalili, HR Shahriari, H Abolhassani
International Conference on Networking, International Conference on Systems …, 2006
182006
Network vulnerability analysis through vulnerability take-grant model (VTG)
HR Shahriari, R Sadoddin, R Jalili, R Zakeri, AR Omidian
Information and Communications Security: 7th International Conference, ICICS …, 2005
182005
Botcointrap: detection of bitcoin miner botnet using host based approach
A Zareh, HR Shahriari
2018 15th International ISC (Iranian Society of Cryptology) Conference on …, 2018
172018
A model for asset valuation in security risk analysis regarding assets' dependencies
I Loloei, HR Shahriari, A Sadeghi
20th Iranian Conference on Electrical Engineering (ICEE2012), 763-768, 2012
172012
A hybrid approach for database intrusion detection at transaction and inter-transaction levels
M Doroudian, HR Shahriari
2014 6th Conference on Information and Knowledge Technology (IKT), 1-6, 2014
162014
Dwarf frankenstein is still in your memory: tiny code reuse attacks
AA Sadeghi, F Aminmansour, HR Shahriari
The ISC International Journal of Information Security 9 (1), 53-72, 2017
15*2017
Athena: A framework to automatically generate security test oracle via extracting policies from source code and intended software behaviour
H Homaei, HR Shahriari
Information and Software Technology 107, 112-124, 2019
142019
A novel approach for detecting DGA-based ransomwares
S Salehi, HR Shahriari, MM Ahmadian, L Tazik
2018 15th International ISC (Iranian Society of Cryptology) Conference on …, 2018
142018
A new method for occupational fraud detection in process aware information systems
S Mardani, HR Shahriari
2013 10th International ISC Conference on Information Security and …, 2013
142013
Sistema negali atlikti operacijos. Bandykite vėliau dar kartą.
Straipsniai 1–20