Follow
Hamid Reza Shahriari
Title
Cited by
Cited by
Year
Software vulnerability analysis and discovery using machine-learning and data-mining techniques: A survey
SM Ghaffarian, HR Shahriari
ACM computing surveys (CSUR) 50 (4), 1-36, 2017
4082017
RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks
M Amini, R Jalili, HR Shahriari
computers & security 25 (6), 459-468, 2006
1722006
Connection-Monitor & Connection-Breaker: A Novel Approach for Prevention and Detection of High Survivable Ransomwares
MM AHMADIAN, HR Shahriari, SMG ANBERAN
12th International ISC Conference on Information Security and Cryptography, 2015
1062015
Detection of distributed denial of service attacks using statistical pre-processor and unsupervised neural networks
R Jalili, F Imani-Mehr, M Amini, HR Shahriari
Information Security Practice and Experience: First International Conference …, 2005
882005
2entFOX: A framework for high survivable ransomwares detection
MM Ahmadian, HR Shahriari
2016 13th international iranian society of cryptology conference on …, 2016
812016
Seven years of software vulnerabilities: The ebb and flow
H Homaei, HR Shahriari
IEEE Security & Privacy 15 (1), 58-65, 2017
382017
Neural software vulnerability analysis using rich intermediate graph representations of programs
SM Ghaffarian, HR Shahriari
Information Sciences 553, 189-207, 2021
292021
A Survey of Anomaly Detection Approaches in Internet of Things.
M Behniafar, A Nowroozi, HR Shahriari
ISeCure 10 (2), 2018
272018
Vulnerability Take Grant (VTG): An efficient approach to analyze network vulnerabilities
HR Shahriari, R Jalili
computers & security 26 (5), 349-360, 2007
252007
Using CSP to model and analyze transmission control protocol vulnerabilities within the broadcast network
HR Shahriari, R Jalili
2004 International Networking and Communication Conference, 42-47, 2004
192004
Using description logics for network vulnerability analysis
R Zakeri, R Jalili, HR Shahriari, H Abolhassani
International Conference on Networking, International Conference on Systems …, 2006
182006
Network vulnerability analysis through vulnerability take-grant model (VTG)
HR Shahriari, R Sadoddin, R Jalili, R Zakeri, AR Omidian
Information and Communications Security: 7th International Conference, ICICS …, 2005
182005
A hybrid approach for database intrusion detection at transaction and inter-transaction levels
M Doroudian, HR Shahriari
2014 6th Conference on Information and Knowledge Technology (IKT), 1-6, 2014
172014
BotRevealer: Behavioral Detection of Botnets based on Botnet Life-cycle.
E Khoshhalpour, HR Shahriari
ISeCure 10 (1), 2018
162018
A model for asset valuation in security risk analysis regarding assets' dependencies
I Loloei, HR Shahriari, A Sadeghi
20th Iranian Conference on Electrical Engineering (ICEE2012), 763-768, 2012
162012
Dwarf frankenstein is still in your memory: tiny code reuse attacks
AA Sadeghi, F Aminmansour, HR Shahriari
The ISC International Journal of Information Security 9 (1), 53-72, 2017
15*2017
A new method for occupational fraud detection in process aware information systems
S Mardani, HR Shahriari
2013 10th International ISC Conference on Information Security and …, 2013
152013
Athena: A framework to automatically generate security test oracle via extracting policies from source code and intended software behaviour
H Homaei, HR Shahriari
Information and Software Technology 107, 112-124, 2019
142019
Botcointrap: detection of bitcoin miner botnet using host based approach
A Zareh, HR Shahriari
2018 15th International ISC (Iranian Society of Cryptology) Conference on …, 2018
142018
Modeling TCP/IP networks topology for network vulnerability analysis
R Zakeri, HR Shahriari, R Jalili, R Sadoddin
2nd int. symposium of telecommunications, 653-658, 2005
142005
The system can't perform the operation now. Try again later.
Articles 1–20