Students

Ph.D. Students

Current

Name Thesis Title
Mahmoud Aghvamipanah Privacy on IoT Platforms
Sara Asgari Explainable Anomaly Detection in Smart Homes
Reza Saeedi
AmirMohammad Aghapour

Past

Name Thesis Title
Dr. Maryam Masoudian Crash Reproduction in Android Apps Based on Crash Stack Trace
Dr. Somayeh Dolatnezhad Samarin Integrity Checking of Outsourced Computations
Dr. Amir Mohammadzadeh Lajevardi Ontology-based Advanced Persistent Threat Detection

M.Sc. Students

Current

Name Thesis Title
Zahra Keshavarz Fake Action Detection in Privacy Preserving Solutions for Smart Homes
Amna Kadhim Privacy Preserving against Wireless Devices Sniffer in Smart Home
Matin Aghamirkarimi Behavioral Privacy Preservation in Road Monitoring Services for Intelligent Transportation
Mobin Aghamirkarimi Behavioral Privacy Preservation in Usage-Based Insurance for Vehicles
Milad Kheirabi Detection and Mitigation of Isolation Attacks in RPL Routing Protocol
Hossein Naghdbishi End-users’ Privacy in Content Delivery Networks

Past

Name Thesis Title
Erfan Bahrami Secure Micropayment in Internet of Things Ecosystem
Farid Zaredar Privacy-Preserving Smart Metering in Smart Grids
Abolfazl Farhadi Anomaly Detection in Smart Home according to Environmental Conditions and User Behavior
Nooshin Zakerzadeh Preserving Privacy Through Intelligent Generation of Fake Events in Smart Homes
AmirMohammad Aghapour Digital Currency Scheme with Offline Payment and Financial Crime Combating Law Enforcement
Mohammadreza Arabzadeh Analysis and Countermeasure of Android Malware Generation using Adversarial Example Generation Methods
Mojtaba Moazzen Performance Improvement of Repackaged Android App Detection
Mohammad Amin Bajand Distributed Anomaly Detection on the IoT Edge
Fatemeh Saghaei Android App Permission Analysis based on Developer’s Privacy Policies
Esmaeil Gholami Ontology-based Android Malware Forensics
Mehran Torki Detecting Repackaged Android Apps
Hossein Beigi Distributed Intrusion Detection System in Smart Grids
Hoda Parsafar User Privacy in Enterprise Mobile Management
Seyyed Heydar Javadi Detection of Confidentiality Violation by Short-term Advanced Persistent Threats based on Data Stream Correlation
Niloofar Mahzoon High Volume Event Correlation for Long-term Attack Detection
Faegheh Ghofrani An Access Control System with Access Delegation in eHealth
AmirReza Alizadeh Nikoo Attack Detection in Web Applications Firewall by Learning from Application’s Source Code
Ramtin Bagheri An Efficient Approach for Computation Integrity Assurance in Map-Reduce Model
Alireza Barkhordari Information-flow Analysis in Android Apps for Protecting User Privacy
Mahya Maftouni Secure-Multiparty Computation Protocol for Privacy Preserving Data Mining
Narges Fazelidoust Designing Mechanism for Controlling Query on OWL Documents based on the MA(DL)2 Logic-based Authorization Model
Fereshteh Hashemi Beni Privacy Preserving Access Control in IoT for eHealth
Mahmoud Jafarinejad Query Optimization in Encrypted Database Systems
Amir Nouri An Access Control System for Time Series Data in NoSQL Databases
Farnazz Osanloo Privacy Preserving Access Control for Service Composition in Cloud Computing
Somayeh Dolatnezhad Samarin Improving SQL Injection Detection Techniques
Sepideh Naghdi Database Schema Extraction Prevention through DBMS Error Handling