Rasool Jalili

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

30EEMohsen Taherian, Rasool Jalili, Morteza Amini: PTO: A Trust Ontology for Pervasive Environments. AINA Workshops 2008: 301-306
29EEHadi Hemmati, Rasool Jalili: Self-reconfiguration in Highly Available Pervasive Computing Systems. ATC 2008: 289-301
28EEMohsen Taherian, Rasool Jalili, Morteza Amini: A Semantic-Aware Ontology-Based Trust Model for Pervasive Computing Environments. ATC 2008: 47-59
27EEMahdi Niamanesh, Rasool Jalili: A Formalism for Recongurability Analysis in Distributed Non-Blocking Components. ICDCS Workshops 2008: 453-458
26EEJafar Haadi Jafarian, Ali Noorollahi Ravari, Morteza Amini, Rasool Jalili: Protecting Location Privacy through a Graph-Based Location Representation and a Robust Obfuscation Technique. ICISC 2008: 116-133
25EEMohsen Taherian, Morteza Amini, Rasool Jalili: Trust Inference in Web-Based Social Networks Using Resistive Networks. ICIW 2008: 233-238
24EEZeinab Iranmanesh, Morteza Amini, Rasool Jalili: A Logic for Multi-domain Authorization Considering Administrators. POLICY 2008: 189-196
23EEJafar Haadi Jafarian, Morteza Amini, Rasool Jalili: A Context-Aware Mandatory Access Control Model for Multilevel Security Environments. SAFECOMP 2008: 401-414
22EEHamid Reza Shahriari, Yasser Ganjisaffar, Rasool Jalili, Jafar Habibi: Topological Analysis of Multi-phase Attacks using Expert Systems. J. Inf. Sci. Eng. 24(3): 743-767 (2008)
21EEHassan Takabi, Morteza Amini, Rasool Jalili: Trust-Based User-Role Assignment in Role-Based Access Control. AICCSA 2007: 807-814
20EEAmir Reza Masoumzadeh, Morteza Amini, Rasool Jalili: Conflict Detection and Resolution in Context-Aware Authorization. AINA Workshops (1) 2007: 505-511
19EEMahdi Niamanesh, Rasool Jalili: A Dynamic-Reconfigurable Architecture for Protocol Stacks of Networked Systems. COMPSAC (1) 2007: 609-612
18EEBehnam Sattarzadeh, Mahdi Asadpour, Rasool Jalili: Improved User Identity Confidentiality for UMTS Mobile Networks. ECUMN 2007: 401-409
17EEMahdi Niamanesh, Sirwah Sabetghadam, Reza Yousefzadeh Rahaghi, Rasool Jalili: Design and Implementation of a Dynamic-Reconfigurable Architecture for Protocol Stack. FSEN 2007: 396-403
16EEMohammad Ebrahim Rafiei, Mohsen Taherian, Hamid Mousavi, Ali Movaghar, Rasool Jalili: Vulnerability Analysis in VGBPS Using Prolog. FSEN 2007: 404-411
15EEMahdi Niamanesh, Rasool Jalili: Formalizing Compatibility and Substitutability in Communication Protocols Using I/O-Constraint Automata. FSEN 2007: 49-64
14EEHassan Takabi, Morteza Amini, Rasool Jalili: Separation of Duty in Role-Based Access Control Model through Fuzzy Relations. IAS 2007: 125-130
13EEHassan Takabi, Morteza Amini, Rasool Jalili: Enhancing Role-Based Access Control Model through Fuzzy Relations. IAS 2007: 131-136
12EEHamid Reza Shahriari, Rasool Jalili: Vulnerability Take Grant (VTG): An efficient approach to analyze network vulnerabilities. Computers & Security 26(5): 349-360 (2007)
11EEAmir Reza Masoumzadeh, Morteza Amini, Rasool Jalili: Context-Aware Provisional Access Control. ICISS 2006: 132-146
10EEReza Zakeri, Rasool Jalili, Hamid Reza Shahriari, Hassan Abolhassani: Using Description Logics for Network Vulnerability Analysis. ICN/ICONS/MCL 2006: 78
9 Sarah Javanmardi, Hadi Hemmati, Rasool Jalili: An Access Control Framework for Pervasive Computing Environments. PSC 2006: 97-103
8 Behnam Sattarzadeh, Mahdi Asadpour, Rasool Jalili: Security Enhancement for a Low Computation Cost User Authentication Scheme. SECRYPT 2006: 5-8
7EEMorteza Amini, Rasool Jalili, Hamid Reza Shahriari: RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks. Computers & Security 25(6): 459-468 (2006)
6EEMahdi Niamanesh, Nafiseh Fekrazad Nobakht, Rasool Jalili, Faranak Heydarian Dehkordi: On Validity Assurance of Dynamic Reconfiguration for Component-based Programs. Electr. Notes Theor. Comput. Sci. 159: 227-239 (2006)
5EEHamid Reza Shahriari, Reza Sadoddin, Rasool Jalili, Reza Zakeri, Ali Reza Omidian: Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG). ICICS 2005: 256-268
4EERasool Jalili, Fatemeh Imani-Mehr, Morteza Amini, Hamid Reza Shahriari: Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks. ISPEC 2005: 192-203
3EERasool Jalili, Mohsen Rezvani: Specification and Verification of Security Policies in Firewalls. EurAsia-ICT 2002: 154-163
2EERasool Jalili, Frans A. Henskens: Using directed graphs to describe entity dependency in stable distributed persistent stores. HICSS (2) 1995: 665-674
1EEFrans A. Henskens, D. M. Koch, Rasool Jalili, John Rosenberg: Hardware Support for Stability in a Persistent Architecture. POS 1994: 387-399

Coauthor Index

1Hassan Abolhassani [10]
2Morteza Amini [4] [7] [11] [13] [14] [20] [21] [23] [24] [25] [26] [28] [30]
3Mahdi Asadpour [8] [18]
4Faranak Heydarian Dehkordi [6]
5Yasser Ganjisaffar [22]
6Jafar Habibi [22]
7Hadi Hemmati [9] [29]
8Frans A. Henskens (Frans Henskens) [1] [2]
9Fatemeh Imani-Mehr [4]
10Zeinab Iranmanesh [24]
11Jafar Haadi Jafarian [23] [26]
12Sarah Javanmardi [9]
13D. M. Koch [1]
14Amir Reza Masoumzadeh [11] [20]
15Hamid Mousavi [16]
16Ali Movaghar-Rahimabadi (Ali Movaghar) [16]
17Mahdi Niamanesh [6] [15] [17] [19] [27]
18Nafiseh Fekrazad Nobakht [6]
19Ali Reza Omidian [5]
20Mohammad Ebrahim Rafiei [16]
21Reza Yousefzadeh Rahaghi [17]
22Ali Noorollahi Ravari [26]
23Mohsen Rezvani [3]
24John Rosenberg [1]
25Sirwah Sabetghadam [17]
26Reza Sadoddin [5]
27Behnam Sattarzadeh [8] [18]
28Hamid Reza Shahriari [4] [5] [7] [10] [12] [22]
29Mohsen Taherian [16] [25] [28] [30]
30Hassan Takabi [13] [14] [21]
31Reza Zakeri [5] [10]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)