default search action
Behrouz Tork Ladani
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j38]Atefeh Nirumand, Bahman Zamani, Behrouz Tork Ladani:
A comprehensive framework for inter-app ICC security analysis of Android apps. Autom. Softw. Eng. 31(2): 45 (2024) - 2023
- [j37]Hayyan Hasan, Hasan Deeb, Behrouz Tork Ladani:
A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware. ISC Int. J. Inf. Secur. 15(1): 59-71 (2023) - [j36]Hayyan Hasan, Behrouz Tork Ladani, Bahman Zamani:
Maaker: A framework for detecting and defeating evasion techniques in Android malware. J. Inf. Secur. Appl. 78: 103617 (2023) - [j35]Golbarg Hajian, Behrouz Shahgholi Ghahfarokhi, Mehri Asadi Vasfi, Behrouz Tork Ladani:
Privacy, trust, and secure rewarding in mobile crowd-sensing based spectrum monitoring. J. Ambient Intell. Humaniz. Comput. 14(1): 655-675 (2023) - [j34]Sanaz Zamani, Behrouz Tork Ladani, Maede Ashouri-Talouki:
Privacy, reputation, and incentive provision for vehicular social networks. J. Reliab. Intell. Environ. 9(4): 447-461 (2023) - [j33]Atefeh Nirumand, Bahman Zamani, Behrouz Tork Ladani, Jacques Klein, Tegawendé F. Bissyandé:
A model-based framework for inter-app Vulnerability analysis of Android applications. Softw. Pract. Exp. 53(4): 895-936 (2023) - 2022
- [j32]Seyed Behnam Andarzian, Behrouz Tork Ladani:
SANT: Static Analysis of Native Threads for Security Vetting of Android Applications. ISC Int. J. Inf. Secur. 14(1): 13-25 (2022) - [j31]Amirhosein Sayyadabdi, Behrouz Tork Ladani, Bahman Zamani:
Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System. ISC Int. J. Inf. Secur. 14(3): 61-69 (2022) - [j30]Afshin Karampour, Maede Ashouri-Talouki, Behrouz Tork Ladani:
Light-Weight Privacy-Preserving Data Aggregation Protocols in Smart Grid Metering Networks. ISC Int. J. Inf. Secur. 14(3): 101-112 (2022) - [j29]Zahra Zojaji, Behrouz Tork Ladani:
Adaptive cost-sensitive stance classification model for rumor detection in social networks. Soc. Netw. Anal. Min. 12(1): 134 (2022) - [j28]Maryam Zarezadeh, Hamid Mala, Behrouz Tork Ladani:
Efficient Secure Pattern Matching With Malicious Adversaries. IEEE Trans. Dependable Secur. Comput. 19(2): 1407-1419 (2022) - [c19]Atefeh Nirumand, Bahman Zamani, Behrouz Tork Ladani:
A Model-Based Approach for Representing Data Sharing Mechanism in Android Applications. CSICC 2022: 1-7 - [d2]Behrouz Tork Ladani, Mehran Khosravi:
A semi real dataset of Meta-Alerts for APT attack detection. IEEE DataPort, 2022 - [i2]Amirhosein Sayyadabdi, Behrouz Tork Ladani, Bahman Zamani:
Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System. CoRR abs/2208.11062 (2022) - 2021
- [j27]Mojgan Askarizadeh, Behrouz Tork Ladani:
Soft rumor control in social networks: Modeling and analysis. Eng. Appl. Artif. Intell. 100: 104198 (2021) - [j26]Hayyan Hasan, Behrouz Tork Ladani, Bahman Zamani:
MEGDroid: A model-driven event generation framework for dynamic android malware analysis. Inf. Softw. Technol. 135: 106569 (2021) - [j25]Hayyan Hasan, Behrouz Tork Ladani, Bahman Zamani:
Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware. ISC Int. J. Inf. Secur. 13(2): 131-143 (2021) - [c18]Hasan Deeb, Hayyan Hasan, Behrouz Tork Ladani, Bahman Zamani:
A machine learning approach for detecting and categorizing evasion sources in Android malware. ISCISC 2021: 28-34 - [d1]Hayyan Hasan, Hasan Deeb, Behrouz Tork Ladani, Bahman Zamani:
Android malware dynamic evasions. IEEE DataPort, 2021 - 2020
- [j24]Mehran Khosravi, Behrouz Tork Ladani:
Alerts Correlation and Causal Analysis for APT Based Cyber Attack Detection. IEEE Access 8: 162642-162656 (2020) - [j23]Seyed Asgary Ghasempouri, Behrouz Tork Ladani:
Model checking of robustness properties in trust and reputation systems. Future Gener. Comput. Syst. 108: 302-319 (2020) - [j22]Maryam Zarezadeh, Hamid Mala, Behrouz Tork Ladani:
Secure parameterized pattern matching. Inf. Sci. 522: 299-316 (2020) - [j21]Mansooreh Ezhei, Behrouz Tork Ladani:
Interdependency Analysis in Security Investment against Strategic Attacks. Inf. Syst. Frontiers 22(1): 187-201 (2020) - [j20]Ebrahim Sahafizadeh, Behrouz Tork Ladani:
A Model for Social Communication Network in Mobile Instant Messaging Systems. IEEE Trans. Comput. Soc. Syst. 7(1): 68-83 (2020) - [c17]Hayyan Hasan, Behrouz Tork Ladani, Bahman Zamani:
Enhancing Monkey to trigger malicious payloads in Android malware. ISCISC 2020: 65-72
2010 – 2019
- 2019
- [j19]Seyed Asgary Ghasempouri, Behrouz Tork Ladani:
Modeling trust and reputation systems in hostile environments. Future Gener. Comput. Syst. 99: 571-592 (2019) - [j18]Seyed Alireza Hasheminasab, Behrouz Tork Ladani, Tansu Alpcan:
Interdependent Security Game Design over Constrained Linear Influence Networks. ISC Int. J. Inf. Secur. 11(2): 95-111 (2019) - [j17]Atefeh Nirumand, Bahman Zamani, Behrouz Tork Ladani:
VAnDroid: A framework for vulnerability analysis of Android applications using a model-driven reverse engineering technique. Softw. Pract. Exp. 49(1): 70-99 (2019) - 2017
- [j16]Mansooreh Ezhei, Behrouz Tork Ladani:
Information sharing vs. privacy: A game theoretic analysis. Expert Syst. Appl. 88: 327-337 (2017) - [j15]Marzieh Safarzadeh, Mahboubeh Taghizadeh, Bahman Zamani, Behrouz Tork Ladani:
An automatic test case generator for evaluating implementation of access control policies. ISC Int. J. Inf. Secur. 9(1): 73-91 (2017) - [c16]Seyed Asgary Ghasempouri, Behrouz Tork Ladani:
A Formal Model for Security Analysis of Trust and Reputation systems. ISCISC 2017: 13-18 - 2016
- [j14]Zahra Zojaji, Behrouz Tork Ladani, Alireza Khalilian:
Automated program repair using genetic programming and model checking. Appl. Intell. 45(4): 1066-1088 (2016) - [j13]Amir Jalaly Bidgoly, Behrouz Tork Ladani:
Benchmarking reputation systems: A quantitative verification approach. Comput. Hum. Behav. 57: 274-291 (2016) - [j12]Amir Jalaly Bidgoly, Behrouz Tork Ladani:
Modeling and Quantitative Verification of Trust Systems Against Malicious Attackers. Comput. J. 59(7): 1005-1027 (2016) - 2015
- [j11]Amir Jalaly Bidgoly, Behrouz Tork Ladani:
Modelling and Quantitative Verification of Reputation Systems Against Malicious Attackers. Comput. J. 58(10): 2567-2582 (2015) - [j10]Mousa Mousazadeh, Behrouz Tork Ladani:
Gossip-based data aggregation in hostile environments. Comput. Commun. 62: 1-12 (2015) - [j9]Safieh Ghasemi Falavarjani, Behrouz Tork Ladani, Simin Ghasemi:
GGRA: a grouped gossip-based reputation aggregation algorithm. ISC Int. J. Inf. Secur. 7(1): 59-74 (2015) - [j8]Fereidoun Moradi, Hamid Mala, Behrouz Tork Ladani:
Security Analysis and Strengthening of an RFID Lightweight Authentication Protocol Suitable for VANETs. Wirel. Pers. Commun. 83(4): 2607-2621 (2015) - 2014
- [j7]Mousa Mousazadeh, Behrouz Tork Ladani:
Randomized gossip algorithms under attack. Int. J. Inf. Sec. 13(4): 391-402 (2014) - [j6]Maryam Shojaei, Naser Movahhedinia, Behrouz Tork Ladani:
DDoS attack detection in IEEE 802.16 based networks. Wirel. Networks 20(8): 2543-2559 (2014) - [c15]Masoud Hasanifard, Behrouz Tork Ladani:
DoS and port scan attack detection in high speed networks. ISCISC 2014: 61-66 - 2013
- [j5]Mansooreh Ezhei, Behrouz Tork Ladani:
GTrust: a group based trust model. ISC Int. J. Inf. Secur. 5(2): 155-170 (2013) - [c14]Amir Jalaly Bidgoly, Behrouz Tork Ladani:
Quantitative verification of beta reputation system using PRISM probabilistic model checker. ISCISC 2013: 1-6 - [i1]Mohammad Mehdi Keikha, Mohammad Ali Nematbakhsh, Behrouz Tork Ladani:
Structural Weights in Ontology Matching. CoRR abs/1311.3800 (2013) - 2011
- [j4]Zahra Derakhshandeh, Behrouz Tork Ladani:
A model for specification, composition and verification of access control policies and its application to web services. ISC Int. J. Inf. Secur. 3(2): 103-120 (2011) - [c13]Ehsan Mokhtari, Zeinab Noorian, Behrouz Tork Ladani, Mohammad Ali Nematbakhsh:
A Context-Aware Reputation-Based Model of Trust for Open Multi-agent Environments. Canadian AI 2011: 301-312 - [c12]Maryam Shojaei, Naser Movahhedinia, Behrouz Tork Ladani:
An Entropy Based Approach for DDoS Attack Detection in IEEE 802.16 Based Networks. IWSEC 2011: 129-143 - 2010
- [j3]Mousa Mousazadeh, Behrouz Tork Ladani, Hans Zantema:
Liveness Verification in TRSs Using Tree Automata and Termination Analysis. Comput. Informatics 29(3): 407-426 (2010) - [j2]Hesam Izakian, Ajith Abraham, Behrouz Tork Ladani:
An auction method for resource allocation in computational grids. Future Gener. Comput. Syst. 26(2): 228-235 (2010) - [j1]Fatemeh Raji, Behrouz Tork Ladani:
Anonymity and security for autonomous mobile agents. IET Inf. Secur. 4(4): 397-410 (2010) - [c11]Marzieh Ispareh, Behrouz Tork Ladani, Shirin Shariat Panahi, Zahra Nasr Azadani:
Toward a software development methodology for anonymity applications. EDBT/ICDT Workshops 2010 - [c10]Mohammad Mehdi Keikha, Mohammad Ali Nematbakhsh, Behrouz Tork Ladani:
Adaptive Similarity Aggregation Method for Ontology Matching. EMS 2010: 391-396
2000 – 2009
- 2009
- [c9]Hesam Izakian, Behrouz Tork Ladani, Kamran Zamanifar, Ajith Abraham, Václav Snásel:
A continuous double auction method for resource allocation in computational grids. CISched 2009: 29-35 - [c8]Marzieh Ispareh, Behrouz Tork Ladani:
A conceptual framework for specification, analysis, and design of anonymity services. EDBT/ICDT Workshops 2009: 131-138 - [c7]Hesam Izakian, Behrouz Tork Ladani, Kamran Zamanifar, Ajith Abraham:
A Novel Particle Swarm Optimization Approach for Grid Job Scheduling. ICISTM 2009: 100-109 - 2008
- [c6]Hamed Shahbazi, Alireza Mokhtaripour, Mohammad Dalvi Esfahani, Behrouz Tork Ladani:
A New Approach for Scoring Relevant Documents by Applying a Farsi Stemming Method in Persian Web Search Engines. CSICC 2008: 745-748 - 2007
- [c5]Soheil Saifipoor, Behrouz Tork Ladani, Naser Nematbakhsh:
A Dynamic Reconfigurable Web Service Composition Framework Using Reo Coordination Language. ECOWS 2007: 203-212 - [c4]Lena Mashayekhy, Mohammad Ali Nematbakhsh, Behrouz Tork Ladani:
Measuring of Strategies' Similarity in Automated Negotiation. IMECS 2007: 859-863 - [c3]Lena Mashayekhy, Mohammad Ali Nematbakhsh, Behrouz Tork Ladani:
Comparing Negotiation Strategies Based on Offers. DMBiz@PAKDD 2007: 87-98 - 2006
- [c2]Fatemeh Ghassemi, Naser Nematbakhsh, Behrouz Tork Ladani, Marjan Sirjani:
Specification and Implementation of Multi-Agent Organizations. WEBIST (1) 2006: 447-453 - 2005
- [c1]Behrouz Tork Ladani, Baptiste Alcalde, Ana R. Cavalli:
Passive Testing - A Constrained Invariant Checking Approach. TestCom 2005: 9-22
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint