| Erfan Bahrami | Secure Micropayment in Internet of Things Ecosystem | 
																
																	| Farid Zaredar | Privacy-Preserving Smart Metering in Smart Grids | 
																
																	| Abolfazl Farhadi | Anomaly Detection in Smart Home according to Environmental Conditions and User Behavior | 
																
																	| Nooshin Zakerzadeh | Preserving Privacy Through Intelligent Generation of Fake Events in Smart Homes | 
																
																	| AmirMohammad Aghapour | Digital Currency Scheme with Offline Payment and Financial Crime Combating Law Enforcement | 
																
																	| Mohammadreza Arabzadeh | Analysis and Countermeasure of Android Malware Generation using Adversarial Example Generation Methods | 
																
																	| Mojtaba Moazzen | Performance Improvement of Repackaged Android App Detection | 
																
																	| Mohammad Amin Bajand | Distributed Anomaly Detection on the IoT Edge | 
																
																
																	| Fatemeh Saghaei | Android App Permission Analysis based on Developer’s Privacy Policies | 
																
																	| Esmaeil Gholami | Ontology-based Android Malware Forensics | 
																
																	| Mehran Torki | Detecting Repackaged Android Apps | 
																
																	| Hossein Beigi | Distributed Intrusion Detection System in Smart Grids | 
																
																	| Hoda Parsafar | User Privacy in Enterprise Mobile Management | 
																
																	| Seyyed Heydar Javadi | Detection of Confidentiality Violation by Short-term Advanced Persistent Threats based on Data Stream Correlation | 
																
																	| Niloofar Mahzoon | High Volume Event Correlation for Long-term Attack Detection | 
																
																	| Faegheh Ghofrani | An Access Control System with Access Delegation in eHealth | 
																
																	| AmirReza Alizadeh Nikoo | Attack Detection in Web Applications Firewall by Learning from Application’s Source Code | 
																
																	| Ramtin Bagheri | An Efficient Approach for Computation Integrity Assurance in Map-Reduce Model | 
																
																	| Alireza Barkhordari | Information-flow Analysis in Android Apps for Protecting User Privacy | 
																
																	| Mahya Maftouni | Secure-Multiparty Computation Protocol for Privacy Preserving Data Mining | 
																
																	| Narges Fazelidoust | Designing Mechanism for Controlling Query on OWL Documents based on the MA(DL)2 Logic-based Authorization Model | 
																
																	| Fereshteh Hashemi Beni | Privacy Preserving Access Control in IoT for eHealth | 
																
																	| Mahmoud Jafarinejad | Query Optimization in Encrypted Database Systems | 
																
																	| Amir Nouri | An Access Control System for Time Series Data in NoSQL Databases | 
																
																	| Farnazz Osanloo | Privacy Preserving Access Control for Service Composition in Cloud Computing | 
																
																	| Somayeh Dolatnezhad Samarin | Improving SQL Injection Detection Techniques | 
																
																	| Sepideh Naghdi | Database Schema Extraction Prevention through DBMS Error Handling |