Mohsen Rezvani
Mohsen Rezvani
在 cse.unsw.edu.au 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks
M Rezvani, A Ignatovic, E Bertino, S Jha
IEEE Transactions on Dependable and Secure Computing, 1-1, 2014
1932014
MalwareMonitor: an SDN-based framework for securing large networks
Z Abaid, M Rezvani, S Jha
Proceedings of the 2014 CoNEXT on Student Workshop, 40-42, 2014
262014
Interdependent security risk analysis of hosts and flows
M Rezvani, V Sekulic, A Ignjatovic, E Bertino, S Jha
IEEE Transactions on Information Forensics and Security 10 (11), 2325-2339, 2015
252015
A robust iterative filtering technique for wireless sensor networks in the presence of malicious attacks
M Rezvani, A Ignjatovic, E Bertino, S Jha
Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems, 1-2, 2013
162013
Provenance-aware security risk analysis for hosts and network flows
M Rezvani, A Ignjatovic, E Bertino, S Jha
2014 IEEE Network Operations and Management Symposium (NOMS), 1-8, 2014
152014
Analyzing and resolving anomalies in firewall security policies based on propositional logic
M Rezvani, R Aryan
2009 IEEE 13th International Multitopic Conference, 1-7, 2009
132009
Assessment methodology for anomaly-based intrusion detection in cloud computing
M Rezvani
Journal of AI and Data Mining 6 (2), 387-397, 2018
112018
Routing-aware and malicious node detection in a concealed data aggregation for WSNs
W Alghamdi, M Rezvani, H Wu, SS Kanhere
ACM Transactions on Sensor Networks (TOSN) 15 (2), 1-20, 2019
82019
Anomaly-free policy composition in software-defined networks
M Rezvani, A Ignjatovic, M Pagnucco, S Jha
2016 IFIP Networking Conference (IFIP Networking) and Workshops, 28-36, 2016
82016
Method for providing secure and private fine-grained access to outsourced data
M Jahan, M Rezvani, A Seneviratne, S Jha
2015 IEEE 40th Conference on Local Computer Networks (LCN), 406-409, 2015
82015
Specification and verification of security policies in firewalls
R Jalili, M Rezvani
Eurasian Conference on Information and Communication Technology, 154-163, 2002
82002
A collaborative reputation system based on credibility propagation in WSNs
M Rezvani, A Ignjatovic, E Bertino, S Jha
2015 IEEE 21st International Conference on Parallel and Distributed Systems …, 2015
72015
An email-based high capacity text steganography using repeating characters
M Fateh, M Rezvani
International Journal of Computers and Applications 43 (3), 226-232, 2021
52021
A randomized reputation system in the presence of unfair ratings
M Rezvani, M Rezvani
ACM Transactions on Management Information Systems (TMIS) 11 (1), 1-16, 2020
52020
Deep recurrent–convolutional neural network for classification of simultaneous EEG–fNIRS signals
H Ghonchi, M Fateh, V Abolghasemi, S Ferdowsi, M Rezvani
IET Signal Processing 14 (3), 142-153, 2020
52020
Analyzing XACML policies using answer set programming
M Rezvani, D Rajaratnam, A Ignjatovic, M Pagnucco, S Jha
International Journal of Information Security 18 (4), 465-479, 2019
52019
A trust assessment framework for streaming data in WSNs using iterative filtering
M Rezvani, A Ignjatovic, E Bertino, S Jha
2015 IEEE Tenth International Conference on Intelligent Sensors, Sensor …, 2015
52015
A provenance-aware multi-dimensional reputation system for online rating systems
M Rezvani, A Ignjatovic, E Bertino
ACM Transactions on Internet Technology (TOIT) 18 (4), 1-20, 2018
42018
Light weight write mechanism for cloud data
M Jahan, M Rezvani, Q Zhao, PS Roy, K Sakurai, A Seneviratne, S Jha
IEEE Transactions on Parallel and Distributed Systems 29 (5), 1131-1146, 2017
42017
An iterative algorithm for reputation aggregation in multi-dimensional and multinomial rating systems
M Rezvani, M Allahbakhsh, L Vigentini, A Ignjatovic, S Jha
IFIP International Information Security and Privacy Conference, 189-203, 2015
42015
系统目前无法执行此操作,请稍后再试。
文章 1–20