R. Jalili
Title
Cited by
Cited by
Year
RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks
M Amini, R Jalili, HR Shahriari
computers & security 25 (6), 459-468, 2006
1612006
New constructions for forward and backward private symmetric searchable encryption
J Ghareh Chamani, D Papadopoulos, C Papamanthou, R Jalili
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
952018
Detection of distributed denial of service attacks using statistical pre-processor and unsupervised neural networks
R Jalili, F Imani-Mehr, M Amini, HR Shahriari
International Conference on Information Security Practice and Experience …, 2005
762005
Alert correlation algorithms: A survey and taxonomy
SA Mirheidari, S Arshad, R Jalili
International Symposium on Cyberspace Safety and Security, 183-197, 2013
682013
Trust inference in web-based social networks using resistive networks
M Taherian, M Amini, R Jalili
2008 Third International Conference on Internet and Web Applications and …, 2008
672008
On constrained implementation of lattice-based cryptographic primitives and schemes on smart cards
A Boorghany, SB Sarmadi, R Jalili
ACM Transactions on Embedded Computing Systems (TECS) 14 (3), 1-25, 2015
522015
Trust-based user-role assignment in role-based access control
H Takabi, M Amini, R Jalili
2007 IEEE/ACS International Conference on Computer Systems and Applications …, 2007
442007
Sbac: A semantic based access control model
S Javanmardi, M Amini, R Jalili, Y GanjiSaffar
11th Nordic Workshop on Secure IT-systems (NordSec’06), Linkping, Sweden 22, 2006
442006
An access control model for protecting semantic web resources
S Javanmardi, M Amini, R Jalili
Web policy workshop, 2006
392006
Implementation and Comparison of Lattice-based Identification Protocols on Smart Cards and Microcontrollers.
A Boorghany, R Jalili
Iacr Cryptol. Eprint Arch. 2014, 78, 2014
382014
AS5: A secure searchable secret sharing scheme for privacy preserving database outsourcing
MA Hadavi, E Damiani, R Jalili, S Cimato, Z Ganjei
Data Privacy Management and Autonomous Spontaneous Security, 201-216, 2012
372012
Secure data outsourcing based on threshold secret sharing; towards a more practical solution
MA Hadavi, R Jalili
Proc. VLDB PhD Workshop, 54-59, 2010
342010
Network-based intrusion detection using unsupervised adaptive resonance theory (ART)
M Amini, R Jalili
Proceedings of the 4th Conference on Engineering of Intelligent Systems (EIS …, 2004
342004
Conflict detection and resolution in context-aware authorization
A Masoumzadeh, M Amini, R Jalili
21st International Conference on Advanced Information Networking and …, 2007
332007
FAST: fast anonymization of big data streams
E Mohammadian, M Noferesti, R Jalili
Proceedings of the 2014 international conference on big data science and …, 2014
322014
Security and searchability in secret sharing-based data outsourcing
MA Hadavi, R Jalili, E Damiani, S Cimato
International Journal of Information Security 14 (6), 513-529, 2015
272015
Afmap: Anonymous forward-secure mutual authentication protocols for rfid systems
A Sadighian, R Jalili
2009 Third International Conference on Emerging Security Information …, 2009
272009
TIRIAC: A trust-driven risk-aware access control framework for Grid environments
SD Nogoorani, R Jalili
Future generation computer systems 55, 238-254, 2016
252016
Database as a service: towards a unified solution for security requirements
MA Hadavi, M Noferesti, R Jalili, E Damiani
2012 IEEE 36th Annual Computer Software and Applications Conference …, 2012
252012
Vulnerability Take Grant (VTG): An efficient approach to analyze network vulnerabilities
HR Shahriari, R Jalili
computers & security 26 (5), 349-360, 2007
242007
The system can't perform the operation now. Try again later.
Articles 1–20