Software vulnerability analysis and discovery using machine-learning and data-mining techniques: A survey SM Ghaffarian, HR Shahriari ACM computing surveys (CSUR) 50 (4), 1-36, 2017 | 460 | 2017 |
RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks M Amini, R Jalili, HR Shahriari computers & security 25 (6), 459-468, 2006 | 175 | 2006 |
Connection-Monitor & Connection-Breaker: A Novel Approach for Prevention and Detection of High Survivable Ransomwares MM AHMADIAN, HR Shahriari, SMG ANBERAN 12th International ISC Conference on Information Security and Cryptography, 2015 | 109 | 2015 |
Detection of distributed denial of service attacks using statistical pre-processor and unsupervised neural networks R Jalili, F Imani-Mehr, M Amini, HR Shahriari Information Security Practice and Experience: First International Conference
, 2005 | 88 | 2005 |
2entFOX: A framework for high survivable ransomwares detection MM Ahmadian, HR Shahriari 2016 13th international iranian society of cryptology conference on
, 2016 | 83 | 2016 |
Seven years of software vulnerabilities: The ebb and flow H Homaei, HR Shahriari IEEE Security & Privacy 15 (1), 58-65, 2017 | 38 | 2017 |
Neural software vulnerability analysis using rich intermediate graph representations of programs SM Ghaffarian, HR Shahriari Information Sciences 553, 189-207, 2021 | 35 | 2021 |
A Survey of Anomaly Detection Approaches in Internet of Things. M Behniafar, A Nowroozi, HR Shahriari ISeCure 10 (2), 2018 | 28 | 2018 |
Vulnerability Take Grant (VTG): An efficient approach to analyze network vulnerabilities HR Shahriari, R Jalili computers & security 26 (5), 349-360, 2007 | 25 | 2007 |
Using CSP to model and analyze transmission control protocol vulnerabilities within the broadcast network HR Shahriari, R Jalili 2004 International Networking and Communication Conference, 42-47, 2004 | 19 | 2004 |
BotRevealer: Behavioral Detection of Botnets based on Botnet Life-cycle. E Khoshhalpour, HR Shahriari ISeCure 10 (1), 2018 | 18 | 2018 |
Using description logics for network vulnerability analysis R Zakeri, R Jalili, HR Shahriari, H Abolhassani International Conference on Networking, International Conference on Systems
, 2006 | 18 | 2006 |
Network vulnerability analysis through vulnerability take-grant model (VTG) HR Shahriari, R Sadoddin, R Jalili, R Zakeri, AR Omidian Information and Communications Security: 7th International Conference, ICICS
, 2005 | 18 | 2005 |
Botcointrap: detection of bitcoin miner botnet using host based approach A Zareh, HR Shahriari 2018 15th International ISC (Iranian Society of Cryptology) Conference on
, 2018 | 17 | 2018 |
A model for asset valuation in security risk analysis regarding assets' dependencies I Loloei, HR Shahriari, A Sadeghi 20th Iranian Conference on Electrical Engineering (ICEE2012), 763-768, 2012 | 17 | 2012 |
A hybrid approach for database intrusion detection at transaction and inter-transaction levels M Doroudian, HR Shahriari 2014 6th Conference on Information and Knowledge Technology (IKT), 1-6, 2014 | 16 | 2014 |
Dwarf frankenstein is still in your memory: tiny code reuse attacks AA Sadeghi, F Aminmansour, HR Shahriari The ISC International Journal of Information Security 9 (1), 53-72, 2017 | 15* | 2017 |
Athena: A framework to automatically generate security test oracle via extracting policies from source code and intended software behaviour H Homaei, HR Shahriari Information and Software Technology 107, 112-124, 2019 | 14 | 2019 |
A novel approach for detecting DGA-based ransomwares S Salehi, HR Shahriari, MM Ahmadian, L Tazik 2018 15th International ISC (Iranian Society of Cryptology) Conference on
, 2018 | 14 | 2018 |
A new method for occupational fraud detection in process aware information systems S Mardani, HR Shahriari 2013 10th International ISC Conference on Information Security and
, 2013 | 14 | 2013 |