1
Somayeh Esmaeili Ghomi, Hamidreza Shahriari, "PodBot: A New Botnet Detection Method by Host and Network-Based Analysis ", 2019 27th Iranian Conference on Electrical Engineering (ICEE), April 2019
2
Saeid Salehi, Hamidreza Shahriari, Mohammad Mehdi Ahmadian, Ladan Tazik, "A Novel Approach for Detecting DGA-based Ransomwares ", Iranian Society of Cryptology, August 2018
3
Atefeh Zareh Chahoki, Hamidreza Shahriari, "BotcoinTrap: Detection of Bitcoin Miner Botnet Using Host Based Approach ", International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC), August 2018
4
Zohreh Bohluli, Hamidreza Shahriari, "Detecting Privacy Leaks in Android Apps using Inter-Component Information Flow Control Analysis ", International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC), August 2018
5
Mahdi Khoshnood Mansoorkhani, Seyed Mohammad Ghaffarian Anberan, Hamidreza Shahriari, "A Hybrid approach for Preserving Privacy in Big data Publishing ", International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC), August 2018
6
Mohammad Mehdi Ahmadian, Hamidreza Shahriari, "2entFOX: A Framework for High Survivable Ransomwares Detection ", 13th International Iranian Society of Cryptology Conference on., September 2016
7
Mohammad Mehdi Ahmadian, Hamidreza Shahriari, "A framework for Detecting High Survivable Ransomwares using hybrid behavioral analysis and Bayesian network ", 21st National CSI Computer Conference, March 2016
8
Mohammad Mehdi Ahmadian, Hamidreza Shahriari, Seyed Mohammad Ghaffarian Anberan, "Connection-Monitor & Connection-Breaker: A Novel Approach for Prevention and Detection of High Survivable Ransomwares ", 12th International ISC Conference on Information Security and Cryptography, September 2015
9
Farzane Aminmansour, Hamidreza Shahriari, "Patulous Code Reuse Attack: A Novel Code Reuse Attack on ARM Architecture (A Proof of Concept on Android OS) ", 12th ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, September 2015
10
Aliakbar Sadeghi Baghsorkhi, Farzane Aminmansour, Hamidreza Shahriari, "Tiny Jump-Oriented Programming Attack (A Class of Code Reuse Attacks) ", 12th ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, September 2015
11
Aliakbar Sadeghi Baghsorkhi, Farzane Aminmansour, Hamidreza Shahriari, "Tiny Jump-Oriented Programming Attack (A Class of Code Reuse Attacks) ", 12th ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, September 2015
12
Amir Khoshkbarchi Dehkhargani, Hamidreza Shahriari, "Learning Approach for Dealing with Unfair Ratings in Service Provision ", 23rd Iranian Conference on Electrical Engineering, May 2015
13
Aliakbar Sadeghi Baghsorkhi, Farzane Aminmansour, Hamidreza Shahriari, "Tazhi: A Novel Technique for Hunting Trampoline Gadgets of Jump Oriented Programming ", 11th International ISC Conference on Information Security and Cryptology, September 2014
14
Amir Khoshkbarchi Dehkhargani, Hamidreza Shahriari, Mehdi Amjadi, "A Trust Model for Service Selection, Using Learning Automata-Based Approach ", The Seventh International Symposium on Telecommunications (IST2014), September 2014
15
Mostafa Doroudian, Hamidreza Shahriari, "Database intrusion detection system for detecting malicious behaviors in transaction and inter-transaction levels ", Seventh International Symposium on Telecommunications (IST2014), September 2014
16
Mehrdad Abdi, Hamidreza Shahriari, "Improving White box Fuzzing via Quantifying Risk of Paths ", 11th International ISC Conference on Information Security & Cryptology, September 2014
17
Alireza Ranjbaran, Hamidreza Shahriari, "Detection and exploitation of file system access control vulnerabilities in web applications ", 11th nternational ISC Conference on Information Security and Cryptology, September 2014
18
Sara Saadat, Hamidreza Shahriari, "Towards a process-oriented framework for improving trust and security in migration to cloud ", 11th international ISC conference on information security & cryptology, September 2014
19
Amir Khoshkbarchi Dehkhargani, Hamidreza Shahriari, Mehdi Amjadi, "Comparison-Based Agent Partitioning with Learning Automata: A Trust Model for Service-Oriented Environments ", 11th International ISC Conference on Information Security & Cryptology, September 2014
20
Mostafa Doroudian, Hamidreza Shahriari, "A Hybrid Approach for Database Intrusion Detection at Transaction and Inter-transaction Levels ", The 6th Conference on Information and Knowledge Technology, May 2014
21
Shahla Mardani, Hamidreza Shahriari, "A new method for occupational fraud detection in process aware information systems ", 2013 10th International ISC Conference on Information Security and Cryptology (ISCISC), August 2013
22
Shahla Mardani, Hamidreza Shahriari, "A New Method for Occupational Fraud Detection in Process Aware Information Systems ", 10th International ISC Conference on Information Security & Cryptology, August 2013
23
Mostafa Doroudian, Hamidreza Shahriari, "A Database Intrusion Detection System for detecting malicious behaviors in Transactions and Iter-Transaction Levels ", 21st Iranian Conference on Electrical Engineering - ICEE2013, May 2013
24
Fateme Shafieenejad, Hamidreza Shahriari, "Fuzzy logic and Takagi-Sugeno Neural-Fuzzy For Detecting Bank Fraud Transactions ", 7th Annual Conference on e-commerce in developing countries with focus on E-Security, April 2013
25
Ramtin Aryan, Hamidreza Shahriari, "Botnet detection based on network behavioral and anomaly detection ", 18th National CSI Computer Conference, March 2013
26
Mostafa Doroudian, Hamidreza Shahriari, "Database Intrusion Detection System using Specification-based Approach in Transaction Level and Anomaly-based-Detection in Inter-transaction Level ", 9th International ISC Conference on Information Security and Cryptology (ISCISC’12, September 2012
27
Hossein Mohammadhassanzadeh, Hamidreza Shahriari, "Using User Similarity to Infer Trust Values in Social Networks Regardless of Direct Ratings ", 9th International ISC Conference on Information Security and Cryptology (ISCISC `12), Tabriz, 2012, September 2012
28
Mahmoud Ghorbanzadeh, Hamidreza Shahriari, "Preventing Second Order SQL Injection Vulnerabilities Using Nested Query ", 9th International ISC Conference on Information Security and Cryptology, September 2012
29
Mahmoud Ghorbanzadeh, Hamidreza Shahriari, "Static Detection of Vulnerabilities in Web Applications using Reverse Data Flow Analysis for maximum coverage of critical sinks ", 9th International ISC Conference on Information Security and Cryptology, September 2012
30
Mahmoud Ghorbanzadeh, Hamidreza Shahriari, "A New Attack: Cross Site SQL Injection (XSI) and Prevention of Injection Vulnerabilities ", 20th Iranian Conference on Electrical Engineering, May 2012
31
Masoud Mansoury, Hamidreza Shahriari, Mehdi Shajari, "Trust Evaluation Using Items Ratings in Online Communities ", 20th Iranian Conference on Electrical Engineering, May 2012
32
Mahmoud Ghorbanzadeh, Hamidreza Shahriari, "Static Detection of Second Order Injection Vulnerabilities Using Query Dependency Graph ", 17th CSI Computer Conference, March 2012
33
Morteza Sargolzaei Javan, Mehdi Garakani, Hamidreza Shahriari, Mohammad Kazem Akbari, "A similarity measurement method using ontology for context based trust systems ", 17th CSI Computer Conference, March 2012
34
Hamed Rezaeifar, Hamidreza Shahriari, "Investigating environmental factors and urban features affecting pedestrian accidents in Mashhad, Iran based on negative binominal regression ", The 11th conference on Traffic & Transportation Engineering, February 2012
35
Marzieh Esmaeili, Hamidreza Shahriari, "Anomaly detection in database using temporal mining ", The Fifth Iran Data Mining Conference / IDMC 2011, December 2011
36
Mohammad Amin Morid, Amin Omidvar, Hamidreza Shahriari, "An Enhanced Method for Computation of Similarity between the Contexts in Trust Evaluation using Weighted Ontology ", 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, November 2011
37
Mohsen Raeesi, Alireza Saebi, Hamidreza Shahriari, S.Alireza Hashemi Golpayegany, "A strategy-based trust model to management of supply-chain intelligent agents ", 8th International Conference on Strategic Management, October 2011
38
Ahmad Saharkhiz, Hamidreza Shahriari, "A METHOD FOR PRESERVING PRIVACY IN PUBLISHED MULTI-RELATIONAL SOCIAL NETWORKS ", International Conference on Knowledge Management and Information Sharing - KMIS 2011, October 2011
39
Naeemeh Arastooie, Amin Omidvar, Hamidreza Shahriari, Mohammad Kazem Akbari, "Computing trust value for new service providers using KNN data mining ", 6th Conference on E-commerce and digital Economy, October 2011
40
Elahe Samie Ghahfarokhi, Hamidreza Shahriari, "Quantitative vulnerability metric for computer networks using attack graph and vulnerability scoring system ", 8th International ISC Conference on Information Security and Cryptography (ISCISC11), September 2011
41
Sajjad Omidi, Hamidreza Shahriari, "Enforcing Write Access Control in Data Outsourced Scenario Using Encryption Key Management ", 8th International ISC Conference on Information Security and Cryptology (ISCISC`11)
Ferdowsi University of Mashhad-Septembr 14-15, 2011, September 2011
42
Amin Omidvar, Mohammad Amin Morid, Hamidreza Shahriari, "A Model to Calculate Trust In Social Networks using Text Mining ", 2nd International Contemporary Issues on Computer and Information Science, May 2011
43
Faezeh Bahrameyan, Hamidreza Shahriari, "An Incentive Mechanism for Cooperative Networks Using Central Reputation System and Games ", 16th National Iranian Society of Computer Conference, March 2011
44
Elahe Samie Ghahfarokhi, Hamidreza Shahriari, "A Model for Accumulative Impact Analysis of Security Vulnerabilities ", 16th Annual International Computer Society of Iran Computer Conference (CSICC 2011), March 2011
45
Mahla Asghari, Hamidreza Shahriari, "Impact propagation in security risk analysis by using of asset dependency graph ", 16th National Iranian Society of Computer Conference, March 2011
46
Hamidreza Shahriari, "L-Diversity for Privacy Protection of Users in Location based Services ", 18th Iranian Conference on Electrical Engineering, May 2010
47
Ali Esmaeeli, Hamidreza Shahriari, "Privacy Protection of Grid Service Requesters through Distributed Attribute Based Access Control Model ", 5th International Conference on Grid and Pervasive Computing, May 2010
48
Hamidreza Shahriari, "A Secure Mutual Authentication Protocol for RFID systems ", 18th Iranian Conference on Electrical Engineering, May 2010
49
Hamidreza Shahriari, "Privacy protection of grid service requesters through distributed attribute based access control model ", , February 2010
50
Hamidreza Shahriari, Mohammad Reza Meybodi, "A Call Admisson control Algorithm for ATM using DFLA Automaton ", , February 2002
51
Hamidreza Shahriari, Mohammad Reza Meybodi, "Call Admisson Control in ATM Network Using Learning Automata Based on Eguivalent Capacity Method ", , February 2001
52
Hamidreza Shahriari, Mohammad Reza Meybodi, "Call Admission Control in ATM Networks Using Variable structure Learning Automata ", , May 2000