2008 |
30 | EE | Mohsen Taherian,
Rasool Jalili,
Morteza Amini:
PTO: A Trust Ontology for Pervasive Environments.
AINA Workshops 2008: 301-306 |
29 | EE | Hadi Hemmati,
Rasool Jalili:
Self-reconfiguration in Highly Available Pervasive Computing Systems.
ATC 2008: 289-301 |
28 | EE | Mohsen Taherian,
Rasool Jalili,
Morteza Amini:
A Semantic-Aware Ontology-Based Trust Model for Pervasive Computing Environments.
ATC 2008: 47-59 |
27 | EE | Mahdi Niamanesh,
Rasool Jalili:
A Formalism for Recongurability Analysis in Distributed Non-Blocking Components.
ICDCS Workshops 2008: 453-458 |
26 | EE | Jafar Haadi Jafarian,
Ali Noorollahi Ravari,
Morteza Amini,
Rasool Jalili:
Protecting Location Privacy through a Graph-Based Location Representation and a Robust Obfuscation Technique.
ICISC 2008: 116-133 |
25 | EE | Mohsen Taherian,
Morteza Amini,
Rasool Jalili:
Trust Inference in Web-Based Social Networks Using Resistive Networks.
ICIW 2008: 233-238 |
24 | EE | Zeinab Iranmanesh,
Morteza Amini,
Rasool Jalili:
A Logic for Multi-domain Authorization Considering Administrators.
POLICY 2008: 189-196 |
23 | EE | Jafar Haadi Jafarian,
Morteza Amini,
Rasool Jalili:
A Context-Aware Mandatory Access Control Model for Multilevel Security Environments.
SAFECOMP 2008: 401-414 |
22 | EE | Hamid Reza Shahriari,
Yasser Ganjisaffar,
Rasool Jalili,
Jafar Habibi:
Topological Analysis of Multi-phase Attacks using Expert Systems.
J. Inf. Sci. Eng. 24(3): 743-767 (2008) |
2007 |
21 | EE | Hassan Takabi,
Morteza Amini,
Rasool Jalili:
Trust-Based User-Role Assignment in Role-Based Access Control.
AICCSA 2007: 807-814 |
20 | EE | Amir Reza Masoumzadeh,
Morteza Amini,
Rasool Jalili:
Conflict Detection and Resolution in Context-Aware Authorization.
AINA Workshops (1) 2007: 505-511 |
19 | EE | Mahdi Niamanesh,
Rasool Jalili:
A Dynamic-Reconfigurable Architecture for Protocol Stacks of Networked Systems.
COMPSAC (1) 2007: 609-612 |
18 | EE | Behnam Sattarzadeh,
Mahdi Asadpour,
Rasool Jalili:
Improved User Identity Confidentiality for UMTS Mobile Networks.
ECUMN 2007: 401-409 |
17 | EE | Mahdi Niamanesh,
Sirwah Sabetghadam,
Reza Yousefzadeh Rahaghi,
Rasool Jalili:
Design and Implementation of a Dynamic-Reconfigurable Architecture for Protocol Stack.
FSEN 2007: 396-403 |
16 | EE | Mohammad Ebrahim Rafiei,
Mohsen Taherian,
Hamid Mousavi,
Ali Movaghar,
Rasool Jalili:
Vulnerability Analysis in VGBPS Using Prolog.
FSEN 2007: 404-411 |
15 | EE | Mahdi Niamanesh,
Rasool Jalili:
Formalizing Compatibility and Substitutability in Communication Protocols Using I/O-Constraint Automata.
FSEN 2007: 49-64 |
14 | EE | Hassan Takabi,
Morteza Amini,
Rasool Jalili:
Separation of Duty in Role-Based Access Control Model through Fuzzy Relations.
IAS 2007: 125-130 |
13 | EE | Hassan Takabi,
Morteza Amini,
Rasool Jalili:
Enhancing Role-Based Access Control Model through Fuzzy Relations.
IAS 2007: 131-136 |
12 | EE | Hamid Reza Shahriari,
Rasool Jalili:
Vulnerability Take Grant (VTG): An efficient approach to analyze network vulnerabilities.
Computers & Security 26(5): 349-360 (2007) |
2006 |
11 | EE | Amir Reza Masoumzadeh,
Morteza Amini,
Rasool Jalili:
Context-Aware Provisional Access Control.
ICISS 2006: 132-146 |
10 | EE | Reza Zakeri,
Rasool Jalili,
Hamid Reza Shahriari,
Hassan Abolhassani:
Using Description Logics for Network Vulnerability Analysis.
ICN/ICONS/MCL 2006: 78 |
9 | | Sarah Javanmardi,
Hadi Hemmati,
Rasool Jalili:
An Access Control Framework for Pervasive Computing Environments.
PSC 2006: 97-103 |
8 | | Behnam Sattarzadeh,
Mahdi Asadpour,
Rasool Jalili:
Security Enhancement for a Low Computation Cost User Authentication Scheme.
SECRYPT 2006: 5-8 |
7 | EE | Morteza Amini,
Rasool Jalili,
Hamid Reza Shahriari:
RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks.
Computers & Security 25(6): 459-468 (2006) |
6 | EE | Mahdi Niamanesh,
Nafiseh Fekrazad Nobakht,
Rasool Jalili,
Faranak Heydarian Dehkordi:
On Validity Assurance of Dynamic Reconfiguration for Component-based Programs.
Electr. Notes Theor. Comput. Sci. 159: 227-239 (2006) |
2005 |
5 | EE | Hamid Reza Shahriari,
Reza Sadoddin,
Rasool Jalili,
Reza Zakeri,
Ali Reza Omidian:
Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG).
ICICS 2005: 256-268 |
4 | EE | Rasool Jalili,
Fatemeh Imani-Mehr,
Morteza Amini,
Hamid Reza Shahriari:
Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks.
ISPEC 2005: 192-203 |
2002 |
3 | EE | Rasool Jalili,
Mohsen Rezvani:
Specification and Verification of Security Policies in Firewalls.
EurAsia-ICT 2002: 154-163 |
1995 |
2 | EE | Rasool Jalili,
Frans A. Henskens:
Using directed graphs to describe entity dependency in stable distributed persistent stores.
HICSS (2) 1995: 665-674 |
1994 |
1 | EE | Frans A. Henskens,
D. M. Koch,
Rasool Jalili,
John Rosenberg:
Hardware Support for Stability in a Persistent Architecture.
POS 1994: 387-399 |