Follow
Mohammad Ali Hadavi
Mohammad Ali Hadavi
Unknown affiliation
Verified email at ce.sharif.edu
Title
Cited by
Cited by
Year
AS5: A secure searchable secret sharing scheme for privacy preserving database outsourcing
MA Hadavi, E Damiani, R Jalili, S Cimato, Z Ganjei
International Workshop on Data Privacy Management, 201-216, 2012
392012
Secure data outsourcing based on threshold secret sharing; towards a more practical solution
MA Hadavi, R Jalili
Proc. VLDB PhD Workshop, 54-59, 2010
392010
Security and searchability in secret sharing-based data outsourcing
MA Hadavi, R Jalili, E Damiani, S Cimato
International Journal of Information Security 14, 513-529, 2015
372015
Software security; a vulnerability activity revisit
MA Hadavi, H Shirazi, HM Sangchi, VS Hamishagi
2008 Third International Conference on Availability, Reliability and …, 2008
362008
Security requirements engineering; state of the art and research challenges
MA Hadavi, VS Hamishagi, HM Sangchi
Proceedings of the International MultiConference of Engineers and Computer …, 2008
322008
Database as a service: towards a unified solution for security requirements
MA Hadavi, M Noferesti, R Jalili, E Damiani
2012 IEEE 36th Annual Computer Software and Applications Conference …, 2012
282012
Using deep reinforcement learning to evade web application firewalls
M Hemmati, MA Hadavi
2021 18th International ISC Conference on Information Security and …, 2021
152021
Access control enforcement on outsourced data ensuring privacy of access control policies
P Tourani, MA Hadavi, R Jalili
2011 International Conference on High Performance Computing & Simulation …, 2011
132011
A signature-based approach of correctness assurance in data outsourcing scenarios
M Noferesti, MA Hadavi, R Jalili
Information Systems Security: 7th International Conference, ICISS 2011 …, 2011
102011
Correctness verification in database outsourcing: A trust-based fake tuples approach
S Ghasemi, M Noferesti, MA Hadavi, S Dorri Nogoorani, R Jalili
Information Systems Security: 8th International Conference, ICISS 2012 …, 2012
62012
k-Anonymity-Based Horizontal Fragmentation to Preserve Privacy in Data Outsourcing
AT Soodejani, MA Hadavi, R Jalili
Data and Applications Security and Privacy XXVI: 26th Annual IFIP WG 11.3 …, 2012
62012
Access control aware data retrieval for secret sharing based database outsourcing
MA Hadavi, R Jalili, L Karimi
Distributed and Parallel Databases 34, 505-534, 2016
52016
Bypassing Web Application Firewalls Using Deep Reinforcement Learning.
M Hemmati, MA Hadavi
ISeCure 14 (2), 2022
42022
Automatic Black-Box Detection of Resistance Against CSRF Vulnerabilities in Web Applications.
S Sadeghi, MA Hadavi
Journal of Computing & Security 8 (1), 2021
42021
(t, k)‐Hypergraph anonymization: an approach for secure data publishing
A Asayesh, MA Hadavi, R Jalili
Security and Communication Networks 8 (7), 1306-1317, 2015
42015
Threat extraction method based on uml software description
M Zeinali, MA Hadavi
2018 15th International ISC (Iranian Society of Cryptology) Conference on …, 2018
22018
A trust-based approach for correctness verification of query results in data outsourcing
M Noferesti, S Ghasemi, MA Hadavi, R Jalili
Journal of Computing and Security 1 (1), 3-14, 2014
22014
IDOT: Black-Box Detection of Access Control Violations in Web Applications.
MA Hadavi, A Bagherdaei, S Ghasemi
ISeCure 13 (2), 2021
12021
Software security analysis based on the principle of Defense-in-Depth
A Jalali, MA Hadavi
2018 15th International ISC (Iranian Society of Cryptology) Conference on …, 2018
12018
Missing a Trusted Reference Monitor: How to Enforce Confidential and Dynamic Access Policies?
L Karimi, SA Javadi, MA Hadavi, R Jalili
Computer Networks and Distributed Systems: International Symposium, CNDS …, 2014
12014
The system can't perform the operation now. Try again later.
Articles 1–20