AS5: A secure searchable secret sharing scheme for privacy preserving database outsourcing MA Hadavi, E Damiani, R Jalili, S Cimato, Z Ganjei International Workshop on Data Privacy Management, 201-216, 2012 | 39 | 2012 |
Secure data outsourcing based on threshold secret sharing; towards a more practical solution MA Hadavi, R Jalili Proc. VLDB PhD Workshop, 54-59, 2010 | 39 | 2010 |
Security and searchability in secret sharing-based data outsourcing MA Hadavi, R Jalili, E Damiani, S Cimato International Journal of Information Security 14, 513-529, 2015 | 37 | 2015 |
Software security; a vulnerability activity revisit MA Hadavi, H Shirazi, HM Sangchi, VS Hamishagi 2008 Third International Conference on Availability, Reliability and …, 2008 | 36 | 2008 |
Security requirements engineering; state of the art and research challenges MA Hadavi, VS Hamishagi, HM Sangchi Proceedings of the International MultiConference of Engineers and Computer …, 2008 | 32 | 2008 |
Database as a service: towards a unified solution for security requirements MA Hadavi, M Noferesti, R Jalili, E Damiani 2012 IEEE 36th Annual Computer Software and Applications Conference …, 2012 | 28 | 2012 |
Using deep reinforcement learning to evade web application firewalls M Hemmati, MA Hadavi 2021 18th International ISC Conference on Information Security and …, 2021 | 15 | 2021 |
Access control enforcement on outsourced data ensuring privacy of access control policies P Tourani, MA Hadavi, R Jalili 2011 International Conference on High Performance Computing & Simulation …, 2011 | 13 | 2011 |
A signature-based approach of correctness assurance in data outsourcing scenarios M Noferesti, MA Hadavi, R Jalili Information Systems Security: 7th International Conference, ICISS 2011 …, 2011 | 10 | 2011 |
Correctness verification in database outsourcing: A trust-based fake tuples approach S Ghasemi, M Noferesti, MA Hadavi, S Dorri Nogoorani, R Jalili Information Systems Security: 8th International Conference, ICISS 2012 …, 2012 | 6 | 2012 |
k-Anonymity-Based Horizontal Fragmentation to Preserve Privacy in Data Outsourcing AT Soodejani, MA Hadavi, R Jalili Data and Applications Security and Privacy XXVI: 26th Annual IFIP WG 11.3 …, 2012 | 6 | 2012 |
Access control aware data retrieval for secret sharing based database outsourcing MA Hadavi, R Jalili, L Karimi Distributed and Parallel Databases 34, 505-534, 2016 | 5 | 2016 |
Bypassing Web Application Firewalls Using Deep Reinforcement Learning. M Hemmati, MA Hadavi ISeCure 14 (2), 2022 | 4 | 2022 |
Automatic Black-Box Detection of Resistance Against CSRF Vulnerabilities in Web Applications. S Sadeghi, MA Hadavi Journal of Computing & Security 8 (1), 2021 | 4 | 2021 |
(t, k)‐Hypergraph anonymization: an approach for secure data publishing A Asayesh, MA Hadavi, R Jalili Security and Communication Networks 8 (7), 1306-1317, 2015 | 4 | 2015 |
Threat extraction method based on uml software description M Zeinali, MA Hadavi 2018 15th International ISC (Iranian Society of Cryptology) Conference on …, 2018 | 2 | 2018 |
A trust-based approach for correctness verification of query results in data outsourcing M Noferesti, S Ghasemi, MA Hadavi, R Jalili Journal of Computing and Security 1 (1), 3-14, 2014 | 2 | 2014 |
IDOT: Black-Box Detection of Access Control Violations in Web Applications. MA Hadavi, A Bagherdaei, S Ghasemi ISeCure 13 (2), 2021 | 1 | 2021 |
Software security analysis based on the principle of Defense-in-Depth A Jalali, MA Hadavi 2018 15th International ISC (Iranian Society of Cryptology) Conference on …, 2018 | 1 | 2018 |
Missing a Trusted Reference Monitor: How to Enforce Confidential and Dynamic Access Policies? L Karimi, SA Javadi, MA Hadavi, R Jalili Computer Networks and Distributed Systems: International Symposium, CNDS …, 2014 | 1 | 2014 |