FAST: fast anonymization of big data streams E Mohammadian, M Noferesti, R Jalili Proceedings of the 2014 international conference on big data science and …, 2014 | 50 | 2014 |
Database as a service: towards a unified solution for security requirements MA Hadavi, M Noferesti, R Jalili, E Damiani 2012 IEEE 36th Annual Computer Software and Applications Conference …, 2012 | 28 | 2012 |
DSCA: An inline and adaptive application identification approach in encrypted network traffic Z Nazari, M Noferesti, R Jalili Proceedings of the 3rd international conference on cryptography, security …, 2019 | 12 | 2019 |
A signature-based approach of correctness assurance in data outsourcing scenarios M Noferesti, MA Hadavi, R Jalili Information Systems Security: 7th International Conference, ICISS 2011 …, 2011 | 10 | 2011 |
Correctness verification in database outsourcing: A trust-based fake tuples approach S Ghasemi, M Noferesti, MA Hadavi, S Dorri Nogoorani, R Jalili Information Systems Security: 8th International Conference, ICISS 2012 …, 2012 | 6 | 2012 |
Inline high‐bandwidth network analysis using a robust stream clustering algorithm M Noferesti, R Jalili IET Information Security 13 (5), 486-495, 2019 | 5 | 2019 |
ACoPE: An adaptive semi-supervised learning approach for complex-policy enforcement in high-bandwidth networks M Noferesti, R Jalili Computer Networks 166, 106943, 2020 | 4 | 2020 |
HB2DS: A behavior-driven high-bandwidth network mining system M Noferesti, R Jalili Journal of Systems and Software 127, 266-277, 2017 | 4 | 2017 |
CNN-BiLSTM-Based Classification of RPL Attacks in IoT Smart Grid Networks (Industry Track) Y Guan, M Noferesti, N Ezzati-Jivan Proceedings of the 24th International Middleware Conference: Industrial …, 2023 | 3 | 2023 |
Enhancing empirical software performance engineering research with kernel-level events: A comprehensive system tracing approach M Noferesti, N Ezzati-Jivan Journal of Systems and Software, 112117, 2024 | 2 | 2024 |
A trust-based approach for correctness verification of query results in data outsourcing M Noferesti, S Ghasemi, MA Hadavi, R Jalili Journal of Computing and Security 1 (1), 3-14, 2014 | 2 | 2014 |
Toward Adaptive Tracing: Efficient System Behavior Analysis using Language Models K Darvishi, M Noferesti, N Ezzati-Jivan Proceedings of the 2024 ACM/IEEE 44th International Conference on Software …, 2024 | 1 | 2024 |
PASD: A Performance Analysis Approach Through the Statistical Debugging of Kernel Events MA Khan, M Noferesti, N Ezzati-Jivan 2023 IEEE 23rd International Working Conference on Source Code Analysis and …, 2023 | 1 | 2023 |
Resource Life-Cycle Aware Noise Detection via Kernel Event Monitoring M Noferesti, B Grandy, N Ezzati-Jivan 2024 34th International Conference on Collaborative Advances in Software and …, 2024 | | 2024 |
A two-tiered framework for anomaly classification in IoT networks utilizing CNN-BiLSTM model Y Guan, M Noferesti, N Ezzati-Jivan Software Impacts 20, 100646, 2024 | | 2024 |
EMD-SCS: A Dynamic Behavioral Approach for Early Malware Detection with Sonification of System Call Sequences R Bhardwaj, M Noferesti, M Janecek, N Ezzati-Jivan 2023 IEEE 22nd International Conference on Trust, Security and Privacy in …, 2023 | | 2023 |
Acar, Yasemin 57 Amini, Mahta 21 Angel Olivares-Mendez, Miguel 87 Assunção, Wesley Klewerton Guez 77 L Boughton, P Chatterjee, M Chaudron, L Chovet, G Chu, K Darvishi, ... | | |