default search action
Rasool Jalili
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j46]Amir Mahdi Sadeghzadeh, Amir Mohammad Sobhanian, Faezeh Dehghan, Rasool Jalili:
HODA: Hardness-Oriented Detection of Model Extraction Attacks. IEEE Trans. Inf. Forensics Secur. 19: 1429-1439 (2024) - [j45]Omid Kargarnovin, Amir Mahdi Sadeghzadeh, Rasool Jalili:
Mal2GCN: a robust malware detection approach using deep graph convolutional networks with non-negative weights. J. Comput. Virol. Hacking Tech. 20(1): 95-111 (2024) - [i16]Javad Ghareh Chamani, Ioannis Demertzis, Dimitrios Papadopoulos, Charalampos Papamanthou, Rasool Jalili:
GraphOS: Towards Oblivious Graph Processing. IACR Cryptol. ePrint Arch. 2024: 642 (2024) - 2023
- [j44]Javad Ghareh Chamani, Ioannis Demertzis, Dimitrios Papadopoulos, Charalampos Papamanthou, Rasool Jalili:
GraphOS: Towards Oblivious Graph Processing. Proc. VLDB Endow. 16(13): 4324-4338 (2023) - [j43]Javad Ghareh Chamani, Yun Wang, Dimitrios Papadopoulos, Mingyang Zhang, Rasool Jalili:
Multi-User Dynamic Searchable Symmetric Encryption With Corrupted Participants. IEEE Trans. Dependable Secur. Comput. 20(1): 114-130 (2023) - 2022
- [j42]Mosayeb Hajimaghsoodi, Rasool Jalili:
RAD: A Statistical Mechanism Based on Behavioral Analysis for DDoS Attack Countermeasure. IEEE Trans. Inf. Forensics Secur. 17: 2732-2745 (2022) - [i15]Javad Ghareh Chamani, Yun Wang, Dimitrios Papadopoulos, Mingyang Zhang, Rasool Jalili:
Multi-User Dynamic Searchable Symmetric Encryption with Corrupted Participants. IACR Cryptol. ePrint Arch. 2022: 1114 (2022) - 2021
- [j41]Amir Mahdi Sadeghzadeh, Behrad Tajali, Rasool Jalili:
AWA: Adversarial Website Adaptation. IEEE Trans. Inf. Forensics Secur. 16: 3109-3122 (2021) - [j40]Amir Mahdi Sadeghzadeh, Saeed Shiravi, Rasool Jalili:
Adversarial Network Traffic: Towards Evaluating the Robustness of Deep-Learning-Based Network Traffic Classification. IEEE Trans. Netw. Serv. Manag. 18(2): 1962-1976 (2021) - [i14]Amir Mahdi Sadeghzadeh, Faezeh Dehghan, Amir Mohammad Sobhanian, Rasool Jalili:
Hardness of Samples Is All You Need: Protecting Deep Learning Models Using Hardness of Samples. CoRR abs/2106.11424 (2021) - [i13]Omid Kargarnovin, Amir Mahdi Sadeghzadeh, Rasool Jalili:
Mal2GCN: A Robust Malware Detection Approach Using Deep Graph Convolutional Networks With Non-Negative Weights. CoRR abs/2108.12473 (2021) - 2020
- [j39]Morteza Noferesti, Rasool Jalili:
ACoPE: An adaptive semi-supervised learning approach for complex-policy enforcement in high-bandwidth networks. Comput. Networks 166 (2020) - [i12]Amir Mahdi Sadeghzadeh, Rasool Jalili, Saeed Shiravi:
Adversarial Network Traffic: Toward Evaluating the Robustness of Deep Learning Based Network Traffic Classification. CoRR abs/2003.01261 (2020) - [i11]Amir Mahdi Sadeghzadeh, Behrad Tajali, Rasool Jalili:
AWA: Adversarial Website Adaptation. CoRR abs/2012.10832 (2020)
2010 – 2019
- 2019
- [j38]Morteza Noferesti, Rasool Jalili:
Inline high-bandwidth network analysis using a robust stream clustering algorithm. IET Inf. Secur. 13(5): 486-495 (2019) - [j37]Javad Ghareh Chamani, Mohammad Sadeq Dousti, Rasool Jalili, Dimitrios Papadopoulos:
SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing. ISC Int. J. Inf. Secur. 11(1): 15-34 (2019) - [c62]Ziaeddin Nazari, Morteza Noferesti, Rasool Jalili:
DSCA: an inline and adaptive application identification approach in encrypted network traffic. ICCSP 2019: 39-43 - 2018
- [j36]Naeimeh Soltani, Ramin Bohlooli, Rasool Jalili:
Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version). ISC Int. J. Inf. Secur. 10(2): 129-139 (2018) - [c61]Javad Ghareh Chamani, Dimitrios Papadopoulos, Charalampos Papamanthou, Rasool Jalili:
New Constructions for Forward and Backward Private Symmetric Searchable Encryption. CCS 2018: 1038-1055 - [i10]Seyed Ali Mirheidari, Sajjad Arshad, Rasool Jalili:
Alert Correlation Algorithms: A Survey and Taxonomy. CoRR abs/1811.00921 (2018) - [i9]Seyed Ali Mirheidari, Sajjad Arshad, Saeidreza Khoshkdahan, Rasool Jalili:
A Comprehensive Approach to Abusing Locality in Shared Web Hosting Servers. CoRR abs/1811.00922 (2018) - [i8]Seyed Ali Mirheidari, Sajjad Arshad, Saeidreza Khoshkdahan, Rasool Jalili:
Two Novel Server-Side Attacks against Log File in Shared Web Hosting Servers. CoRR abs/1811.00923 (2018) - 2017
- [j35]Morteza Noferesti, Rasool Jalili:
HB2DS: A behavior-driven high-bandwidth network mining system. J. Syst. Softw. 127: 266-277 (2017) - [c60]Naeimeh Soltani, Rasool Jalili:
Enforcing Access Control Policies over Data Stored on Untrusted Server. ISCISC 2017: 119-124 - [i7]Navid Emamdoost, Mohammad Sadeq Dousti, Rasool Jalili:
Statistical Disclosure: Improved, Extended, and Resisted. CoRR abs/1710.00101 (2017) - 2016
- [j34]Mohammad Ali Hadavi, Rasool Jalili, Leila Karimi:
Access control aware data retrieval for secret sharing based database outsourcing. Distributed Parallel Databases 34(4): 505-534 (2016) - [j33]Sadegh Dorri Nogoorani, Rasool Jalili:
TIRIAC: A trust-driven risk-aware access control framework for Grid environments. Future Gener. Comput. Syst. 55: 238-254 (2016) - [j32]Mohammad Sadeq Dousti, Rasool Jalili:
An efficient statistical zero-knowledge authentication protocol for smart cards. Int. J. Comput. Math. 93(3): 453-481 (2016) - [j31]Sadegh Dorri Nogoorani, Rasool Jalili:
Uncertainty in Trust: A Risk-Aware Approach. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 24(5): 703-738 (2016) - [c59]Abolfazl Zargar, Alireza Nowroozi, Rasool Jalili:
XABA: A zero-knowledge anomaly-based behavioral analysis method to detect insider threats. ISCISC 2016: 26-31 - [i6]Ahmad Boorghany, Siavash Bayat Sarmadi, Rasool Jalili:
Efficient Lattice-based Authenticated Encryption: A Practice-Oriented Provable Security Approach. IACR Cryptol. ePrint Arch. 2016: 268 (2016) - 2015
- [j30]Mohammad Sadeq Dousti, Rasool Jalili:
FORSAKES: A forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes. Adv. Math. Commun. 9(4): 471-514 (2015) - [j29]Mohammad Ali Hadavi, Rasool Jalili, Ernesto Damiani, Stelvio Cimato:
Security and searchability in secret sharing-based data outsourcing. Int. J. Inf. Sec. 14(6): 513-529 (2015) - [j28]Rasool Jalili:
Editorial. ISC Int. J. Inf. Secur. 7(1): 1-2 (2015) - [j27]Rasool Jalili:
Editorial. ISC Int. J. Inf. Secur. 7(2): 89-90 (2015) - [j26]Mina Niknafs, Sadegh Dorri Nogoorani, Rasool Jalili:
A collusion mitigation scheme for reputation systems. ISC Int. J. Inf. Secur. 7(2): 151-166 (2015) - [j25]Atefeh Asayesh, Mohammad Ali Hadavi, Rasool Jalili:
(t, k)-Hypergraph anonymization: an approach for secure data publishing. Secur. Commun. Networks 8(7): 1306-1317 (2015) - [j24]Ahmad Boorghany, Siavash Bayat Sarmadi, Rasool Jalili:
On Constrained Implementation of Lattice-Based Cryptographic Primitives and Schemes on Smart Cards. ACM Trans. Embed. Comput. Syst. 14(3): 42:1-42:25 (2015) - 2014
- [j23]Rasool Jalili:
Editorial. ISC Int. J. Inf. Secur. 6(1): 1-2 (2014) - [j22]Rasool Jalili:
Editorial. ISC Int. J. Inf. Secur. 6(2): 97-98 (2014) - [c58]Ahmad Boorghany, Siavash Bayat Sarmadi, Pamian Yousefi, Pouneh Gorji, Rasool Jalili:
Random data and key generation evaluation of some commercial tokens and smart cards. ISCISC 2014: 49-54 - [c57]Abolfazl Najafi, Ahamd Sepahi, Rasool Jalili:
Web driven alert verification. ISCISC 2014: 180-185 - [c56]Mahdi Soltani, Sina Najafi, Rasool Jalili:
Mid-defense: Mitigating protocol-level attacks in TOR using indistinguishability obfuscation. ISCISC 2014: 214-219 - [i5]Ahmad Boorghany, Rasool Jalili:
Implementation and Comparison of Lattice-based Identification Protocols on Smart Cards and Microcontrollers. IACR Cryptol. ePrint Arch. 2014: 78 (2014) - [i4]Mohammad Sadeq Dousti, Rasool Jalili:
FORSAKES: A Forward-Secure Authenticated Key Exchange Protocol Based on Symmetric Key-Evolving Schemes. IACR Cryptol. ePrint Arch. 2014: 123 (2014) - [i3]Ahmad Boorghany, Siavash Bayat Sarmadi, Rasool Jalili:
On Constrained Implementation of Lattice-based Cryptographic Primitives and Schemes on Smart Cards. IACR Cryptol. ePrint Arch. 2014: 514 (2014) - 2013
- [j21]Rasool Jalili:
Editorial. ISC Int. J. Inf. Secur. 5(1): 1-3 (2013) - [j20]Rasool Jalili:
Editorial. ISC Int. J. Inf. Secur. 5(2): 117-118 (2013) - [j19]Hamid Reza Mahrooghi, Rasool Jalili:
An Algebraic Theory of Epistemic Processes. J. Univers. Comput. Sci. 19(10): 1396-1432 (2013) - [c55]Seyed Ali Mirheidari, Sajjad Arshad, Rasool Jalili:
Alert Correlation Algorithms: A Survey and Taxonomy. CSS 2013: 183-197 - [c54]Yasser Sobhdel, Rasool Jalili:
A UC-Secure Authenticated Contributory Group Key Exchange Protocol Based on Discrete Logarithm. ICISS 2013: 390-401 - [c53]Alireza Toroghi Haghighat, Mohammad Ali Kargar, Mohammad Sadeq Dousti, Rasool Jalili:
Minimal assumptions to achieve privacy in e-voting protocols. ISCISC 2013: 1-5 - [c52]Vahid Khodabakhshi, Mahdi Soltani, Rasool Jalili, Mostafa Rezvani:
Chaos-based selective key (CSK) Cryptosystem: A new direction to secure VPN. ISCISC 2013: 1-7 - [c51]Alireza Toroghi Haghighat, Mohammad Sadeq Dousti, Rasool Jalili:
An efficient and provably-secure coercion-resistant e-voting protocol. PST 2013: 161-168 - [c50]Seyed Ali Mirheidari, Sajjad Arshad, Saeidreza Khoshkdahan, Rasool Jalili:
A Comprehensive Approach to Abusing Locality in Shared Web Hosting Servers. TrustCom/ISPA/IUCC 2013: 1620-1625 - [i2]Mohammad Sadeq Dousti, Rasool Jalili:
Efficient Statistical Zero-Knowledge Authentication Protocols for Smart Cards Secure Against Active & Concurrent Quantum Attacks. IACR Cryptol. ePrint Arch. 2013: 709 (2013) - 2012
- [j18]Rasool Jalili:
Editorial. ISC Int. J. Inf. Secur. 4(1): 1-2 (2012) - [j17]Rasool Jalili:
Editorial. ISC Int. J. Inf. Secur. 4(2): 95-96 (2012) - [j16]Morteza Amini, Rasool Jalili, Moussa Amir Ehsan, Fathiyeh Faghih:
Cooperative security administration in multi-security-domain environments using a variant of deontic logic. Sci. Iran. 19(3): 635-653 (2012) - [c49]Sadegh Dorri Nogoorani, Rasool Jalili:
Uncertainty in Probabilistic Trust Models. AINA 2012: 511-517 - [c48]Mohammad Ali Hadavi, Morteza Noferesti, Rasool Jalili, Ernesto Damiani:
Database as a Service: Towards a Unified Solution for Security Requirements. COMPSAC Workshops 2012: 415-420 - [c47]Abbas Taheri Soodejani, Mohammad Ali Hadavi, Rasool Jalili:
k-Anonymity-Based Horizontal Fragmentation to Preserve Privacy in Data Outsourcing. DBSec 2012: 263-273 - [c46]Mohammad Ali Hadavi, Ernesto Damiani, Rasool Jalili, Stelvio Cimato, Zeinab Ganjei:
AS5: A Secure Searchable Secret Sharing Scheme for Privacy Preserving Database Outsourcing. DPM/SETOP 2012: 201-216 - [c45]Simin Ghasemi, Morteza Noferesti, Mohammad Ali Hadavi, Sadegh Dorri Nogoorani, Rasool Jalili:
Correctness Verification in Database Outsourcing: A Trust-Based Fake Tuples Approach. ICISS 2012: 343-351 - [c44]Seyed Ali Mirheidari, Sajjad Arshad, Saeidreza Khoshkdahan, Rasool Jalili:
Two novel server-side attacks against log file in Shared Web Hosting servers. ICITST 2012: 318-323 - 2011
- [j15]Rasool Jalili:
Editorial. ISC Int. J. Inf. Secur. 3(1): 1-2 (2011) - [j14]Rasool Jalili:
Editorial. ISC Int. J. Inf. Secur. 3(2): 67-68 (2011) - [j13]Somayeh Soltani, Mohammad Ali Hadavi, Rasool Jalili:
Separating indexes from data: a distributed scheme for secure database outsourcing. ISC Int. J. Inf. Secur. 3(2): 121-133 (2011) - [c43]Morteza Noferesti, Mohammad Ali Hadavi, Rasool Jalili:
A Signature-Based Approach of Correctness Assurance in Data Outsourcing Scenarios. ICISS 2011: 374-378 - [c42]Parastou Tourani, Mohammad Ali Hadavi, Rasool Jalili:
Access control enforcement on outsourced data ensuring privacy of access control policies. HPCS 2011: 491-497 - [i1]Mohammad Sadeq Dousti, Rasool Jalili:
Milder Definitions of Computational Approximability: The Case of Zero-Knowledge Protocols. IACR Cryptol. ePrint Arch. 2011: 514 (2011) - 2010
- [j12]Hamid Reza Shahriari, Mohammad Sadegh Makarem, Marjan Sirjani, Rasool Jalili, Ali Movaghar:
Vulnerability analysis of networks to detect multiphase attacks using the actor-based language Rebeca. Comput. Electr. Eng. 36(5): 874-885 (2010) - [j11]Morteza Amini, Rasool Jalili:
Multi-level authorisation model and framework for distributed semantic-aware environments. IET Inf. Secur. 4(4): 301-321 (2010) - [j10]Rasool Jalili:
Editorial. ISC Int. J. Inf. Secur. 2(1): 1-2 (2010) - [j9]Rasool Jalili:
Editorial. ISC Int. J. Inf. Secur. 2(2): 67-68 (2010) - [j8]Ali Noorollahi Ravari, Jafar Haadi Jafarian, Morteza Amini, Rasool Jalili:
GTHBAC: A Generalized Temporal History Based Access Control Model. Telecommun. Syst. 45(2-3): 111-125 (2010) - [c41]Fathieh Faghih, Morteza Amini, Rasool Jalili:
Specification of History Based Constraints for Access Control in Conceptual Level. ICISS 2010: 186-200 - [c40]Amir Salar Amoli, Mehdi Kharrazi, Rasool Jalili:
2Ploc: Preserving Privacy in Location-based Services. SocialCom/PASSAT 2010: 707-712
2000 – 2009
- 2009
- [j7]Mohammad Reza Aref, Rasool Jalili:
Editorial. ISC Int. J. Inf. Secur. 1(1): 1-2 (2009) - [j6]Rasool Jalili:
Editorial. ISC Int. J. Inf. Secur. 1(2): 69-70 (2009) - [j5]Mahdi Niamanesh, Rasool Jalili:
DRAPS: A Framework for Dynamic Reconfigurable Protocol Stacks. J. Inf. Sci. Eng. 25(3): 827-841 (2009) - [j4]Mahdi Asadpour, Rasool Jalili:
Double Voting Problem of Some Anonymous E-Voting Schemes. J. Inf. Sci. Eng. 25(3): 895-906 (2009) - [c39]Moussa Amir Ehsan, Morteza Amini, Rasool Jalili:
Handling Context in a Semantic-Based Access Control Framework. AINA Workshops 2009: 103-108 - [c38]Fathieh Faghih, Morteza Amini, Rasool Jalili:
A Temporal Description Logic Based Access Control Model for Expressing History Constrained Policies in Semantic Web. POLICY 2009: 142-149 - [c37]Alireza Sadighian, Rasool Jalili:
AFMAP: Anonymous Forward-Secure Mutual Authentication Protocols for RFID Systems. SECURWARE 2009: 31-36 - [c36]Moussa Amir Ehsan, Morteza Amini, Rasool Jalili:
A semantic-based access control mechanism using semantic technologies. SIN 2009: 258-267 - 2008
- [j3]Hamid Reza Shahriari, Yasser Ganjisaffar, Rasool Jalili, Jafar Habibi:
Topological Analysis of Multi-phase Attacks using Expert Systems. J. Inf. Sci. Eng. 24(3): 743-767 (2008) - [c35]Mohsen Taherian, Rasool Jalili, Morteza Amini:
PTO: A Trust Ontology for Pervasive Environments. AINA Workshops 2008: 301-306 - [c34]Mohsen Taherian, Rasool Jalili, Morteza Amini:
A Semantic-Aware Ontology-Based Trust Model for Pervasive Computing Environments. ATC 2008: 47-59 - [c33]Hadi Hemmati, Rasool Jalili:
Self-reconfiguration in Highly Available Pervasive Computing Systems. ATC 2008: 289-301 - [c32]Fatemeh Saremi, Hoda Mashayekhi, Ali Movaghar, Rasool Jalili:
CEBAC: A Decentralized Cooperation Enforcement Based Access Control Framework in MANETs. CSICC 2008: 427-434 - [c31]Alireza Mohammadi-Nodooshan, Yousef Darmani, Rasool Jalili, Mehrdad Nourani:
A Robust and Efficient SIP Authentication Scheme. CSICC 2008: 551-558 - [c30]Ali Noorollahi Ravari, Morteza Amini, Rasool Jalili:
A Temporal Semantic-Based Access Control Model. CSICC 2008: 559-568 - [c29]Jafar Haadi Jafarian, Morteza Amini, Rasool Jalili:
A Dynamic Mandatory Access Control Model. CSICC 2008: 862-866 - [c28]Mahdi Niamanesh, Rasool Jalili:
A Formalism for Recongurability Analysis in Distributed Non-Blocking Components. ICDCS Workshops 2008: 453-458 - [c27]Jafar Haadi Jafarian, Ali Noorollahi Ravari, Morteza Amini, Rasool Jalili:
Protecting Location Privacy through a Graph-Based Location Representation and a Robust Obfuscation Technique. ICISC 2008: 116-133 - [c26]Mohsen Taherian, Morteza Amini, Rasool Jalili:
Trust Inference in Web-Based Social Networks Using Resistive Networks. ICIW 2008: 233-238 - [c25]Alireza Sadighian, Rasool Jalili:
FLMAP: A fast lightweight mutual authentication protocol for RFID systems. ICON 2008: 1-6 - [c24]Ali Noorollahi Ravari, Morteza Amini, Rasool Jalili:
A Semantic aware Access Control model with real time constraints on history of accesses. IMCSIT 2008: 827-836 - [c23]Zeinab Iranmanesh, Morteza Amini, Rasool Jalili:
A Logic for Multi-domain Authorization Considering Administrators. POLICY 2008: 189-196 - [c22]Jafar Haadi Jafarian, Morteza Amini, Rasool Jalili:
A Context-Aware Mandatory Access Control Model for Multilevel Security Environments. SAFECOMP 2008: 401-414 - 2007
- [j2]Hamid Reza Shahriari, Rasool Jalili:
Vulnerability Take Grant (VTG): An efficient approach to analyze network vulnerabilities. Comput. Secur. 26(5): 349-360 (2007) - [c21]Hassan Takabi, Morteza Amini, Rasool Jalili:
Separation of Duty in Role-Based Access Control Model through Fuzzy Relations. IAS 2007: 125-130 - [c20]Hassan Takabi, Morteza Amini, Rasool Jalili:
Enhancing Role-Based Access Control Model through Fuzzy Relations. IAS 2007: 131-136 - [c19]Hassan Takabi, Morteza Amini, Rasool Jalili:
Trust-Based User-Role Assignment in Role-Based Access Control. AICCSA 2007: 807-814 - [c18]Amirreza Masoumzadeh, Morteza Amini, Rasool Jalili:
Conflict Detection and Resolution in Context-Aware Authorization. AINA Workshops (1) 2007: 505-511 - [c17]Mahdi Niamanesh, Rasool Jalili:
A Dynamic-Reconfigurable Architecture for Protocol Stacks of Networked Systems. COMPSAC (1) 2007: 609-612 - [c16]Behnam Sattarzadeh, Mahdi Asadpour, Rasool Jalili:
Improved User Identity Confidentiality for UMTS Mobile Networks. ECUMN 2007: 401-409 - [c15]Mahdi Niamanesh, Rasool Jalili:
Formalizing Compatibility and Substitutability in Communication Protocols Using I/O-Constraint Automata. FSEN 2007: 49-64 - [c14]Mahdi Niamanesh, Sirwah Sabetghadam, Reza Yousefzadeh Rahaghi, Rasool Jalili:
Design and Implementation of a Dynamic-Reconfigurable Architecture for Protocol Stack. FSEN 2007: 396-403 - [c13]Mohammad Ebrahim Rafiei, Mohsen Taherian, Hamid Mousavi, Ali Movaghar, Rasool Jalili:
Vulnerability Analysis in VGBPS Using Prolog. FSEN 2007: 404-411 - 2006
- [j1]Morteza Amini, Rasool Jalili, Hamid Reza Shahriari:
RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks. Comput. Secur. 25(6): 459-468 (2006) - [c12]Yasser Ganjisaffar, Hassan Abolhassani, Rasool Jalili:
An Architecture for a Context-aware Service Broker in Ubiquitous Computing Environments. AICCSA 2006: 1097-1100 - [c11]Sarah Javanmardi, Hadi Hemmati, Rasool Jalili:
An Access Control Framework for Pervasive Computing Environments. PSC 2006: 97-103 - [c10]Amirreza Masoumzadeh, Morteza Amini, Rasool Jalili:
Context-Aware Provisional Access Control. ICISS 2006: 132-146 - [c9]Reza Zakeri, Rasool Jalili, Hamid Reza Shahriari, Hassan Abolhassani:
Using Description Logics for Network Vulnerability Analysis. ICN/ICONS/MCL 2006: 78 - [c8]Behnam Sattarzadeh, Mahdi Asadpour, Rasool Jalili:
Security Enhancement for a Low Computation Cost User Authentication Scheme. SECRYPT 2006: 5-8 - 2005
- [c7]Hamid Reza Shahriari, Reza Sadoddin, Rasool Jalili, Reza Zakeri, Ali Reza Omidian:
Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG). ICICS 2005: 256-268 - [c6]Rasool Jalili, Fatemeh Imani-Mehr, Morteza Amini, Hamid Reza Shahriari:
Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks. ISPEC 2005: 192-203 - [c5]Mahdi Niamanesh, Nafiseh Fekrazad Nobakht, Rasool Jalili, Faranak Heydarian Dehkordi:
On Validity Assurance of Dynamic Reconfiguration for Component-based Programs. FSEN 2005: 227-239 - 2002
- [c4]Rasool Jalili, Mohsen Rezvani:
Specification and Verification of Security Policies in Firewalls. EurAsia-ICT 2002: 154-163
1990 – 1999
- 1995
- [c3]Rasool Jalili, Frans A. Henskens:
Using directed graphs to describe entity dependency in stable distributed persistent stores. HICSS (2) 1995: 665-674 - 1994
- [c2]Frans A. Henskens, David M. Koch, Rasool Jalili, John Rosenberg:
Hardware Support for Stability in a Persistent Architecture. POS 1994: 387-399 - [c1]Rasool Jalili, Frans A. Henskens, David M. Koch, John Rosenberg:
Operating system support for object dependencies in persistent object stores. WORDS 1994: 18-25
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-22 19:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint