1
Morteza Damanafshan, Mehrans. Fallah, "Monitorable Hyperproperties of Nonterminating Systems", Journal of Logical and Algebraic Methods in Programming, July 2022
Vol. 128,
Num. 1,
Page 1-33,
July 2022,
2
Sharar Ahmadi, Mehrans. Fallah, Masoud Pourmahdian, "On the Properties of Epistemic and Temporal Epistemic Logics of Authentication", INFORMATICA, November 2019
Vol. 43,
Num. 0,
Page 161-175,
November 2019,
3
Behrouz Zolfaghari, Mehdi Sedighi, Mehrans. Fallah, "Designing programmable parallel LFSR using parallel prefix trees", Journal of Engineering Research, October 2019
Vol. 7,
Num. 3,
Page 105-122,
October 2019,
4
Fatemeh Imanimehr, Mehrans. Fallah, "On transparent value-sensitive run-time monitoring for information flow policies", COMPUTER LANGUAGES SYSTEMS & STRUCTURES, December 2018
Vol. 54,
Num. 1,
Page 273-296,
December 2018,
5
Sharar Ahmadi, Mehrans. Fallah, "An omniscience-free temporal logic of knowledge for verifying authentication protocols", BULLETIN OF THE IRANIAN MATHEMATICAL SOCIETY, November 2017
Vol. 44,
Num. 1,
Page 1-23,
November 2017,
6
Zeinab Iranmanesh, Mehrans. Fallah, "Static Checking for Multiple Start of Threads in a Type-Safe Multithreaded Java", Journal of Object Technology, June 2017
Vol. 16,
Num. 3,
Page 1-31,
June 2017,
7
Shabnam Seraji, Mehrans. Fallah, "A Bayesian Game of Whitewashing in Reputation Systems", COMPUTER JOURNAL, April 2017
Vol. 0,
Num. 0,
Page 1-15,
April 2017,
8
Behrouz Zolfaghari, Mehrans. Fallah, Mehdi Sedighi, "S-Restricted Compositions revisited", DISCRETE MATHEMATICS AND THEORETICAL COMPUTER SCIENCE, April 2017
Vol. 19,
Num. 1,
Page 1-19,
April 2017,
9
Afshin Lamei, Mehrans. Fallah, "Rewriting-Based Enforcement of Noninterference in Programs with Observable Intermediate Values", JOURNAL OF UNIVERSAL COMPUTER SCIENCE, August 2016
Vol. 22,
Num. 7,
Page 956-991,
August 2016,
10
Zeinab Iranmanesh, Mehrans. Fallah, "Specification and Static Enforcement of Scheduler-Independent Noninterference in a Middleweight Java", COMPUTER LANGUAGES SYSTEMS & STRUCTURES, May 2016
Vol. 46,
Num. 2,
Page 1-24,
May 2016,
11
Fatemeh Imanimehr, Mehrans. Fallah, "How Powerful Are Run-time Monitors with Static Information?", COMPUTER JOURNAL, April 2016
Vol. 0,
Num. 0,
Page 1-14,
April 2016,
12
Behnam Satarzadeh, Mehrans. Fallah, "Automated Type-Based Analysis of Injective Agreement in the Presence of Compromised Principals", JOURNAL OF LOGIC AND ALGEBRAIC PROGRAMMING, June 2015
Vol. 84,
Num. 1,
Page 1-35,
June 2015,
13
Ali Noorpllahi Ravari, Mehrans. Fallah, "A Nonmonotonic Modal Authorization Logic for Pervasive Computing", Security and Communication Networks, June 2014
Vol. 7,
Num. 7,
Page 1-15,
June 2014,
14
Behnam Satarzadeh, Mehrans. Fallah, "Typing secure implementation of authentication protocols in environments with compromised principals", Security and Communication Networks, September 2013
Vol. 6,
Num. 1,
Page 1-16,
September 2013,
15
Sepehr Amir-Mohammadian, Mehrans. Fallah, "Noninterference in a predicative polymorphic calculus for access control", COMPUTER LANGUAGES SYSTEMS & STRUCTURES, June 2013
Vol. 39,
Num. 4,
Page 1-15,
June 2013,
16
Mehrans. Fallah, Nafiseh Kahani, "TDPF: A Traceback-based Distributed Packet Filter to Mitigate DDoS Attacks", Security and Communication Networks, January 2013
Vol. 7,
Num. 1,
Page 1-20,
January 2013,
17
Mehrans. Fallah, Maryam Mouzerani, "A Game?Based Sybil?Resistant Strategy for Reputation Systems in Self?Organizing MANETs", COMPUTER JOURNAL, March 2011
Vol. 0,
Num. 0,
Page 0-0,
March 2011,
18
Hamed Janzadeh, Seyed Kaveh Fayazbakhsh, Mehdi Dehghan Takht Fooladi, Mehrans. Fallah, "A secure credit-based cooperation stimulating mechanism for MANETs using hash chains", , September 2009
Vol. ,
Num. 25,
Page 0-0,
September 2009,
19
Mehrans. Fallah, "A Puzzle -Based Defense Strategy AGainst Flooding Attacks Using Game Theory", , September 2009
Vol. ,
Num. ,
Page 0-0,
September 2009,
20
Azadeh Omrani, Mehrans. Fallah, "A Game -Theoretic Cooperation Stimulus Routing Protocol in Manets", , February 2008
Vol. ,
Num. 19,
Page 0-0,
February 2008,
21
Mehrans. Fallah, [en-name N/A], "Service Availability in Concurrent Systems-Part II:Analysis and Case Studies Using HSIP", , September 2007
Vol. ,
Num. 5,
Page 0-0,
September 2007,
22
Mehrans. Fallah, [en-name N/A], "Service Availability in Concurrent Systems-Part I:A Theory of Hierarchical Services of Interacting Processes", , September 2007
Vol. ,
Num. 5,
Page 0-0,
September 2007,
23
[en-name N/A], Mehrans. Fallah, "A framework for the analysis of denial of service attacks", , March 2004
Vol. ,
Num. 2,
Page 0-0,
March 2004,