داده های ثبت شده در پورتال
1
Morteza Damanafshan, Mehrans. Fallah,
"Monitorable Hyperproperties of Nonterminating Systems", Journal of Logical and Algebraic Methods in Programming,
Vol. 128,
Num. 1,
Page 1-33,
July 2022,
2
Sharar Ahmadi, Mehrans. Fallah, Masoud Pourmahdian,
"On the Properties of Epistemic and Temporal Epistemic Logics of Authentication", INFORMATICA,
Vol. 43,
Num. 0,
Page 161-175,
November 2019,
3
Behrouz Zolfaghari, Mehdi Sedighi, Mehrans. Fallah,
"Designing programmable parallel LFSR using parallel prefix trees", Journal of Engineering Research,
Vol. 7,
Num. 3,
Page 105-122,
October 2019,
4
Fatemeh Imanimehr, Mehrans. Fallah,
"On transparent value-sensitive run-time monitoring for information flow policies", COMPUTER LANGUAGES SYSTEMS & STRUCTURES,
Vol. 54,
Num. 1,
Page 273-296,
December 2018,
5
Sharar Ahmadi, Mehrans. Fallah,
"An omniscience-free temporal logic of knowledge for verifying authentication protocols", BULLETIN OF THE IRANIAN MATHEMATICAL SOCIETY,
Vol. 44,
Num. 1,
Page 1-23,
November 2017,
6
Zeinab Iranmanesh, Mehrans. Fallah,
"Static Checking for Multiple Start of Threads in a Type-Safe Multithreaded Java", Journal of Object Technology,
Vol. 16,
Num. 3,
Page 1-31,
June 2017,
7
Behrouz Zolfaghari, Mehrans. Fallah, Mehdi Sedighi,
"S-Restricted Compositions revisited", DISCRETE MATHEMATICS AND THEORETICAL COMPUTER SCIENCE,
Vol. 19,
Num. 1,
Page 1-19,
April 2017,
8
Shabnam Seraji, Mehrans. Fallah,
"A Bayesian Game of Whitewashing in Reputation Systems", COMPUTER JOURNAL,
Vol. 0,
Num. 0,
Page 1-15,
April 2017,
9
Afshin Lamei, Mehrans. Fallah,
"Rewriting-Based Enforcement of Noninterference in Programs with Observable Intermediate Values", JOURNAL OF UNIVERSAL COMPUTER SCIENCE,
Vol. 22,
Num. 7,
Page 956-991,
August 2016,
10
Zeinab Iranmanesh, Mehrans. Fallah,
"Specification and Static Enforcement of Scheduler-Independent Noninterference in a Middleweight Java", COMPUTER LANGUAGES SYSTEMS & STRUCTURES,
Vol. 46,
Num. 2,
Page 1-24,
May 2016,
11
Fatemeh Imanimehr, Mehrans. Fallah,
"How Powerful Are Run-time Monitors with Static Information?", COMPUTER JOURNAL,
Vol. 0,
Num. 0,
Page 1-14,
April 2016,
12
Behnam Satarzadeh, Mehrans. Fallah,
"Automated Type-Based Analysis of Injective Agreement in the Presence of Compromised Principals", JOURNAL OF LOGIC AND ALGEBRAIC PROGRAMMING,
Vol. 84,
Num. 1,
Page 1-35,
June 2015,
13
Ali Noorpllahi Ravari, Mehrans. Fallah,
"A Nonmonotonic Modal Authorization Logic for Pervasive Computing", Security and Communication Networks,
Vol. 7,
Num. 7,
Page 1-15,
June 2014,
14
Behnam Satarzadeh, Mehrans. Fallah,
"Typing secure implementation of authentication protocols in environments with compromised principals", Security and Communication Networks,
Vol. 6,
Num. 1,
Page 1-16,
September 2013,
15
Sepehr Amir-Mohammadian, Mehrans. Fallah,
"Noninterference in a predicative polymorphic calculus for access control", COMPUTER LANGUAGES SYSTEMS & STRUCTURES,
Vol. 39,
Num. 4,
Page 1-15,
June 2013,
16
Mehrans. Fallah, Nafiseh Kahani,
"TDPF: A Traceback-based Distributed Packet Filter to Mitigate DDoS Attacks", Security and Communication Networks,
Vol. 7,
Num. 1,
Page 1-20,
January 2013,
17
Mehrans. Fallah, Maryam Mouzerani,
"A Game?Based Sybil?Resistant Strategy for Reputation Systems in Self?Organizing MANETs", COMPUTER JOURNAL,
Vol. 0,
Num. 0,
Page 0-0,
March 2011,
18
Hamed Janzadeh, Seyed Kaveh Fayazbakhsh, Mehdi Dehghan Takht Fooladi, Mehrans. Fallah,
"A secure credit-based cooperation stimulating mechanism for MANETs using hash chains", ,
Vol. ,
Num. 25,
Page 0-0,
September 2009,
19
Mehrans. Fallah,
"A Puzzle -Based Defense Strategy AGainst Flooding Attacks Using Game Theory", ,
Vol. ,
Num. ,
Page 0-0,
September 2009,
20
Azadeh Omrani, Mehrans. Fallah,
"A Game -Theoretic Cooperation Stimulus Routing Protocol in Manets", ,
Vol. ,
Num. 19,
Page 0-0,
February 2008,
21
Mehrans. Fallah, [en-name N/A],
"Service Availability in Concurrent Systems-Part II:Analysis and Case Studies Using HSIP", ,
Vol. ,
Num. 5,
Page 0-0,
September 2007,
22
Mehrans. Fallah, [en-name N/A],
"Service Availability in Concurrent Systems-Part I:A Theory of Hierarchical Services of Interacting Processes", ,
Vol. ,
Num. 5,
Page 0-0,
September 2007,
23
[en-name N/A], Mehrans. Fallah,
"A framework for the analysis of denial of service attacks", ,
Vol. ,
Num. 2,
Page 0-0,
March 2004,