Follow
Mohammad Ali Hadavi
Mohammad Ali Hadavi
Unknown affiliation
Verified email at ce.sharif.edu
Title
Cited by
Cited by
Year
Secure data outsourcing based on threshold secret sharing; towards a more practical solution
MA Hadavi, R Jalili
Proc. VLDB PhD Workshop, 54-59, 2010
382010
AS5: A secure searchable secret sharing scheme for privacy preserving database outsourcing
MA Hadavi, E Damiani, R Jalili, S Cimato, Z Ganjei
Data Privacy Management and Autonomous Spontaneous Security: 7th …, 2013
372013
Security and searchability in secret sharing-based data outsourcing
MA Hadavi, R Jalili, E Damiani, S Cimato
International Journal of Information Security 14, 513-529, 2015
362015
Software security; a vulnerability activity revisit
MA Hadavi, H Shirazi, HM Sangchi, VS Hamishagi
2008 Third International Conference on Availability, Reliability and …, 2008
362008
Security requirements engineering; state of the art and research challenges
MA Hadavi, VS Hamishagi, HM Sangchi
Proceedings of the International MultiConference of Engineers and Computer …, 2008
322008
Database as a service: towards a unified solution for security requirements
MA Hadavi, M Noferesti, R Jalili, E Damiani
2012 IEEE 36th Annual Computer Software and Applications Conference …, 2012
272012
Access control enforcement on outsourced data ensuring privacy of access control policies
P Tourani, MA Hadavi, R Jalili
2011 International Conference on High Performance Computing & Simulation …, 2011
132011
A signature-based approach of correctness assurance in data outsourcing scenarios
M Noferesti, MA Hadavi, R Jalili
Information Systems Security: 7th International Conference, ICISS 2011 …, 2011
102011
Using deep reinforcement learning to evade web application firewalls
M Hemmati, MA Hadavi
2021 18th International ISC Conference on Information Security and …, 2021
72021
Correctness verification in database outsourcing: A trust-based fake tuples approach
S Ghasemi, M Noferesti, MA Hadavi, S Dorri Nogoorani, R Jalili
Information Systems Security: 8th International Conference, ICISS 2012 …, 2012
62012
k-Anonymity-Based Horizontal Fragmentation to Preserve Privacy in Data Outsourcing
AT Soodejani, MA Hadavi, R Jalili
Data and Applications Security and Privacy XXVI: 26th Annual IFIP WG 11.3 …, 2012
62012
Bypassing Web Application Firewalls Using Deep Reinforcement Learning.
M Hemmati, MA Hadavi
ISeCure 14 (2), 2022
42022
Access control aware data retrieval for secret sharing based database outsourcing
MA Hadavi, R Jalili, L Karimi
Distributed and Parallel Databases 34, 505-534, 2016
42016
(t, k)‐Hypergraph anonymization: an approach for secure data publishing
A Asayesh, MA Hadavi, R Jalili
Security and Communication Networks 8 (7), 1306-1317, 2015
42015
Threat extraction method based on uml software description
M Zeinali, MA Hadavi
2018 15th International ISC (Iranian Society of Cryptology) Conference on …, 2018
22018
A trust-based approach for correctness verification of query results in data outsourcing
M Noferesti, S Ghasemi, MA Hadavi, R Jalili
Journal of Computing and Security 1 (1), 3-14, 2014
22014
Automatic Black-Box Detection of Resistance Against CSRF Vulnerabilities in Web Applications
MA Hadavi, S Sadeghi
Journal of Computing and Security 8 (1), 19-32, 2021
12021
Software security analysis based on the principle of Defense-in-Depth
A Jalali, MA Hadavi
2018 15th International ISC (Iranian Society of Cryptology) Conference on …, 2018
12018
Missing a Trusted Reference Monitor: How to Enforce Confidential and Dynamic Access Policies?
L Karimi, SA Javadi, MA Hadavi, R Jalili
Computer Networks and Distributed Systems: International Symposium, CNDS …, 2014
12014
Modeling Attacker’s Capability Level Focusing on Injection Attacks on Web Applications
S Moqimi, MA Hadavi
Biannual Journal Monadi for Cyberspace Security (AFTA) 11 (2), 52-60, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20