Follow
R. Jalili
Title
Cited by
Cited by
Year
New constructions for forward and backward private symmetric searchable encryption
J Ghareh Chamani, D Papadopoulos, C Papamanthou, R Jalili
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
2652018
RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks
M Amini, R Jalili, HR Shahriari
computers & security 25 (6), 459-468, 2006
1752006
Alert correlation algorithms: A survey and taxonomy
SA Mirheidari, S Arshad, R Jalili
Cyberspace Safety and Security: 5th International Symposium, CSS 2013 …, 2013
962013
Detection of distributed denial of service attacks using statistical pre-processor and unsupervised neural networks
R Jalili, F Imani-Mehr, M Amini, HR Shahriari
Information Security Practice and Experience: First International Conference …, 2005
882005
Adversarial network traffic: Towards evaluating the robustness of deep-learning-based network traffic classification
AM Sadeghzadeh, S Shiravi, R Jalili
IEEE Transactions on Network and Service Management 18 (2), 1962-1976, 2021
722021
Trust inference in web-based social networks using resistive networks
M Taherian, M Amini, R Jalili
2008 Third International Conference on Internet and Web Applications and …, 2008
692008
On constrained implementation of lattice-based cryptographic primitives and schemes on smart cards
A Boorghany, SB Sarmadi, R Jalili
ACM Transactions on Embedded Computing Systems (TECS) 14 (3), 1-25, 2015
662015
FAST: fast anonymization of big data streams
E Mohammadian, M Noferesti, R Jalili
Proceedings of the 2014 international conference on big data science and …, 2014
512014
Trust-based user-role assignment in role-based access control
H Takabi, M Amini, R Jalili
2007 IEEE/ACS International Conference on Computer Systems and Applications …, 2007
462007
Sbac: A semantic based access control model
S Javanmardi, M Amini, R Jalili, Y GanjiSaffar
11th Nordic Workshop on Secure IT-systems (NordSec’06), Linkping, Sweden 22, 2006
462006
Implementation and comparison of lattice-based identification protocols on smart cards and microcontrollers
A Boorghany, R Jalili
Cryptology ePrint Archive, 2014
442014
An access control model for protecting semantic web resources
S Javanmardi, M Amini, R Jalili
Web policy workshop, 2006
432006
Secure data outsourcing based on threshold secret sharing; towards a more practical solution
MA Hadavi, R Jalili
Proc. VLDB PhD Workshop, 54-59, 2010
392010
Network-based intrusion detection using unsupervised adaptive resonance theory (ART)
M Amini, R Jalili
Proceedings of the 4th Conference on Engineering of Intelligent Systems (EIS …, 2004
392004
AS5: A secure searchable secret sharing scheme for privacy preserving database outsourcing
MA Hadavi, E Damiani, R Jalili, S Cimato, Z Ganjei
Data Privacy Management and Autonomous Spontaneous Security: 7th …, 2013
382013
Security and searchability in secret sharing-based data outsourcing
MA Hadavi, R Jalili, E Damiani, S Cimato
International Journal of Information Security 14, 513-529, 2015
362015
Conflict detection and resolution in context-aware authorization
A Masoumzadeh, M Amini, R Jalili
21st International Conference on Advanced Information Networking and …, 2007
342007
Afmap: Anonymous forward-secure mutual authentication protocols for rfid systems
A Sadighian, R Jalili
2009 Third International Conference on Emerging Security Information …, 2009
292009
Multi-user dynamic searchable symmetric encryption with corrupted participants
JG Chamani, Y Wang, D Papadopoulos, M Zhang, R Jalili
IEEE Transactions on Dependable and Secure Computing 20 (1), 114-130, 2021
282021
Database as a service: towards a unified solution for security requirements
MA Hadavi, M Noferesti, R Jalili, E Damiani
2012 IEEE 36th Annual Computer Software and Applications Conference …, 2012
282012
The system can't perform the operation now. Try again later.
Articles 1–20