default search action
Hamid Reza Shahriari
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]Amir Khoshkbarchi, Hamid Reza Shahriari:
Improving Agents Trust in Service-Oriented Environment Based on Entropy Structure and Information Ethics Principles. Int. J. Hum. Comput. Interact. 40(2): 327-342 (2024) - [j22]Atefeh Zareh Chahoki, Hamid Reza Shahriari, Marco Roveri:
CryptojackingTrap: An Evasion Resilient Nature-Inspired Algorithm to Detect Cryptojacking Malware. IEEE Trans. Inf. Forensics Secur. 19: 7465-7477 (2024) - [j21]Mahdi Nikooghadam, Haleh Amintoosi, Hamid Reza Shahriari:
REACH: Robust Efficient Authentication for Crowdsensing-based Healthcare. J. Supercomput. 80(6): 8434-8468 (2024) - 2023
- [j20]Mahdi Nikooghadam, Hamid Reza Shahriari, Saeid Tousi Saeidi:
HAKECC: Highly efficient authentication and key agreement scheme based on ECDH for RFID in IOT environment. J. Inf. Secur. Appl. 76: 103523 (2023) - [c14]Mahmoud Faraji, Hamid Reza Shahriari, Mahdi Nikooghadam:
A Secure and Efficient Scheme for Mutual Authentication for Integrity of Exchanged Data in IoMT. CSICC 2023: 1-5 - 2022
- [i2]Mahdi Nikooghadam, Hamid Reza Shahriari:
Comment on "Provably secure biometric-based client-server secure communication over unreliable networks". CoRR abs/2206.13172 (2022) - [i1]Hadi Farahani, Hamid Reza Shahriari:
A Privacy Preserving IoT Data Marketplace Using IOTA Smart Contracts. CoRR abs/2210.04733 (2022) - 2021
- [j19]Seyed Mohammad Ghaffarian, Hamid Reza Shahriari:
Neural software vulnerability analysis using rich intermediate graph representations of programs. Inf. Sci. 553: 189-207 (2021) - 2020
- [j18]Mahmoud Ghorbanzadeh, Hamid Reza Shahriari:
ANOVUL: Detection of logic vulnerabilities in annotated programs via data and control flow analysis. IET Inf. Secur. 14(3): 352-364 (2020) - [j17]Mahmoud Ghorbanzadeh, Hamid Reza Shahriari:
Detecting application logic vulnerabilities via finding incompatibility between application design and implementation. IET Softw. 14(4): 377-388 (2020)
2010 – 2019
- 2019
- [j16]Hossein Homaei, Hamid Reza Shahriari:
Athena: A framework to automatically generate security test oracle via extracting policies from source code and intended software behaviour. Inf. Softw. Technol. 107: 112-124 (2019) - 2018
- [j15]Mina Sadat Khazaei, Hossein Homaei, Hamid Reza Shahriari:
OPEXA: analyser assistant for detecting over-privileged extensions. IET Inf. Secur. 12(6): 558-565 (2018) - [j14]Ehsan Khoshhalpour, Hamid Reza Shahriari:
BotRevealer: Behavioral Detection of Botnets based on Botnet Life-cycle. ISC Int. J. Inf. Secur. 10(1): 55-61 (2018) - [j13]Morteza Behniafar, Alireza Nowroozi, Hamid Reza Shahriari:
A Survey of Anomaly Detection Approaches in Internet of Things. ISC Int. J. Inf. Secur. 10(2): 79-92 (2018) - [c13]Zohreh Bohluli, Hamid Reza Shahriari:
Detecting Privacy Leaks in Android Apps using Inter-Component Information Flow Control Analysis. ISCISC 2018: 1-6 - [c12]Saeid Salehi, Hamid Reza Shahriari, Mohammad Mehdi Ahmadian, Ladan Tazik:
A Novel Approach for Detecting DGA-based Ransomwares. ISCISC 2018: 1-7 - 2017
- [j12]Seyed Mohammad Ghaffarian, Hamid Reza Shahriari:
Software Vulnerability Analysis and Discovery Using Machine-Learning and Data-Mining Techniques: A Survey. ACM Comput. Surv. 50(4): 56:1-56:36 (2017) - [j11]Amir Khoshkbarchi, Hamid Reza Shahriari:
Coping with unfair ratings in reputation systems based on learning approach. Enterp. Inf. Syst. 11(10): 1481-1499 (2017) - [j10]Hossein Homaei, Hamid Reza Shahriari:
Seven Years of Software Vulnerabilities: The Ebb and Flow. IEEE Secur. Priv. 15(1): 58-65 (2017) - [j9]AliAkbar Sadeghi, Farzane Aminmansour, Hamid Reza Shahriari:
Dwarf Frankenstein is still in your memory: tiny code reuse attacks. ISC Int. J. Inf. Secur. 9(1): 53-72 (2017) - 2016
- [j8]Farzane Aminmansour, Hamid Reza Shahriari:
Aggrandizing the beast's limbs: patulous code reuse attack on ARM architecture. ISC Int. J. Inf. Secur. 8(1): 39-52 (2016) - [c11]Mohammad Mehdi Ahmadian, Hamid Reza Shahriari:
2entFOX: A framework for high survivable ransomwares detection. ISCISC 2016: 79-84 - 2014
- [j7]Mostafa Doroudian, Hamid Reza Shahriari:
A hybrid approach for database intrusion detection at transaction and inter-transaction levels. ISC Int. J. Inf. Secur. 6(2): 155-167 (2014) - [c10]AliAkbar Sadeghi, Farzane Aminmansour, Hamid Reza Shahriari:
Tazhi: A novel technique for hunting trampoline gadgets of jump oriented programming (A class of code reuse attacks). ISCISC 2014: 21-26 - [c9]Amir Khoshkbarchi, Hamid Reza Shahriari, Mehdi Amjadi:
Comparison-based agent partitioning with learning automata: A trust model for service-oriented environments. ISCISC 2014: 109-114 - [c8]Sara Saadat, Hamid Reza Shahriari:
Towards a process-oriented framework for improving trust and security in migration to cloud. ISCISC 2014: 220-225 - 2013
- [j6]Hossein Mohammadhassanzadeh, Hamid Reza Shahriari:
Prediction of user's trustworthiness in web-based social networks via text mining. ISC Int. J. Inf. Secur. 5(2): 171-187 (2013) - [c7]Shahla Mardani, Hamid Reza Shahriari:
A new method for occupational fraud detection in process aware information systems. ISCISC 2013: 1-5 - 2011
- [j5]Hossein Homaei, Hamid Reza Shahriari:
Compositional Approach to Quantify the Vulnerability of Computer Systems. Comput. J. 54(10): 1616-1631 (2011) - [c6]Ahmad Saharkhiz, Hamid Reza Shahriari:
A Method for Preserving Privacy in Published Multi-relational Social Networks. KMIS 2011: 341-346 - [c5]Mohammad Amin Morid, Amin Omidvar, Hamid Reza Shahriari:
An Enhanced Method for Computation of Similarity between the Contexts in Trust Evaluation Using Weighted Ontology. TrustCom 2011: 721-725 - 2010
- [j4]Hamid Reza Shahriari, Mohammad Sadegh Makarem, Marjan Sirjani, Rasool Jalili, Ali Movaghar:
Vulnerability analysis of networks to detect multiphase attacks using the actor-based language Rebeca. Comput. Electr. Eng. 36(5): 874-885 (2010) - [c4]Ali Esmaeeli, Hamid Reza Shahriari:
Privacy Protection of Grid Service Requesters through Distributed Attribute Based Access Control Model. GPC 2010: 573-582
2000 – 2009
- 2008
- [j3]Hamid Reza Shahriari, Yasser Ganjisaffar, Rasool Jalili, Jafar Habibi:
Topological Analysis of Multi-phase Attacks using Expert Systems. J. Inf. Sci. Eng. 24(3): 743-767 (2008) - 2007
- [j2]Hamid Reza Shahriari, Rasool Jalili:
Vulnerability Take Grant (VTG): An efficient approach to analyze network vulnerabilities. Comput. Secur. 26(5): 349-360 (2007) - 2006
- [j1]Morteza Amini, Rasool Jalili, Hamid Reza Shahriari:
RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks. Comput. Secur. 25(6): 459-468 (2006) - [c3]Reza Zakeri, Rasool Jalili, Hamid Reza Shahriari, Hassan Abolhassani:
Using Description Logics for Network Vulnerability Analysis. ICN/ICONS/MCL 2006: 78 - 2005
- [c2]Hamid Reza Shahriari, Reza Sadoddin, Rasool Jalili, Reza Zakeri, Ali Reza Omidian:
Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG). ICICS 2005: 256-268 - [c1]Rasool Jalili, Fatemeh Imani-Mehr, Morteza Amini, Hamid Reza Shahriari:
Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks. ISPEC 2005: 192-203
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-23 19:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint