![]() |
| 2006 | ||
|---|---|---|
| 3 | EE | Kiarash Mizanian, Morteza Analoui, Reza Zakeri, Shahab Tasharrofi: User Modeling Using Network Layer Information. ICN/ICONS/MCL 2006: 48 |
| 2 | EE | Reza Zakeri, Rasool Jalili, Hamid Reza Shahriari, Hassan Abolhassani: Using Description Logics for Network Vulnerability Analysis. ICN/ICONS/MCL 2006: 78 |
| 2005 | ||
| 1 | EE | Hamid Reza Shahriari, Reza Sadoddin, Rasool Jalili, Reza Zakeri, Ali Reza Omidian: Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG). ICICS 2005: 256-268 |
| 1 | Hassan Abolhassani | [2] |
| 2 | Morteza Analoui | [3] |
| 3 | Rasool Jalili | [1] [2] |
| 4 | Kiarash Mizanian | [3] |
| 5 | Ali Reza Omidian | [1] |
| 6 | Reza Sadoddin | [1] |
| 7 | Hamid Reza Shahriari | [1] [2] |
| 8 | Shahab Tasharrofi | [3] |