Erfan Bahrami |
Secure Micropayment in Internet of Things Ecosystem |
Farid Zaredar |
Privacy-Preserving Smart Metering in Smart Grids |
Abolfazl Farhadi |
Anomaly Detection in Smart Home according to Environmental Conditions and User Behavior |
Nooshin Zakerzadeh |
Preserving Privacy Through Intelligent Generation of Fake Events in Smart Homes |
AmirMohammad Aghapour |
Digital Currency Scheme with Offline Payment and Financial Crime Combating Law Enforcement |
Mohammadreza Arabzadeh |
Analysis and Countermeasure of Android Malware Generation using Adversarial Example Generation Methods |
Mojtaba Moazzen |
Performance Improvement of Repackaged Android App Detection |
Mohammad Amin Bajand |
Distributed Anomaly Detection on the IoT Edge |
Fatemeh Saghaei |
Android App Permission Analysis based on Developer’s Privacy Policies |
Esmaeil Gholami |
Ontology-based Android Malware Forensics |
Mehran Torki |
Detecting Repackaged Android Apps |
Hossein Beigi |
Distributed Intrusion Detection System in Smart Grids |
Hoda Parsafar |
User Privacy in Enterprise Mobile Management |
Seyyed Heydar Javadi |
Detection of Confidentiality Violation by Short-term Advanced Persistent Threats based on Data Stream Correlation |
Niloofar Mahzoon |
High Volume Event Correlation for Long-term Attack Detection |
Faegheh Ghofrani |
An Access Control System with Access Delegation in eHealth |
AmirReza Alizadeh Nikoo |
Attack Detection in Web Applications Firewall by Learning from Application’s Source Code |
Ramtin Bagheri |
An Efficient Approach for Computation Integrity Assurance in Map-Reduce Model |
Alireza Barkhordari |
Information-flow Analysis in Android Apps for Protecting User Privacy |
Mahya Maftouni |
Secure-Multiparty Computation Protocol for Privacy Preserving Data Mining |
Narges Fazelidoust |
Designing Mechanism for Controlling Query on OWL Documents based on the MA(DL)2 Logic-based Authorization Model |
Fereshteh Hashemi Beni |
Privacy Preserving Access Control in IoT for eHealth |
Mahmoud Jafarinejad |
Query Optimization in Encrypted Database Systems |
Amir Nouri |
An Access Control System for Time Series Data in NoSQL Databases |
Farnazz Osanloo |
Privacy Preserving Access Control for Service Composition in Cloud Computing |
Somayeh Dolatnezhad Samarin |
Improving SQL Injection Detection Techniques |
Sepideh Naghdi |
Database Schema Extraction Prevention through DBMS Error Handling |