Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Hassan Takabi
@article{DBLP:journals/tdsc/NaroueiTN20, author = {Masoud Narouei and Hassan Takabi and Rodney Nielsen}, title = {Automatic Extraction of Access Control Policies from Natural Language Documents}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {3}, pages = {506--517}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2818708}, doi = {10.1109/TDSC.2018.2818708}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/NaroueiTN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KaghazgaranTCS19, author = {Parisa Kaghazgaran and Hassan Takabi and Flannery Hope Currin and Armando Soriano}, title = {Communication-efficient private distance calculation based on oblivious transfer extensions}, journal = {Comput. Secur.}, volume = {83}, pages = {93--105}, year = {2019}, url = {https://doi.org/10.1016/j.cose.2019.01.010}, doi = {10.1016/J.COSE.2019.01.010}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KaghazgaranTCS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersec/AlohalyT019, author = {Manar Alohaly and Hassan Takabi and Eduardo Blanco}, title = {Automated extraction of attributes from natural language attribute-based access control {(ABAC)} Policies}, journal = {Cybersecur.}, volume = {2}, number = {1}, pages = {2}, year = {2019}, url = {https://doi.org/10.1186/s42400-018-0019-2}, doi = {10.1186/S42400-018-0019-2}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersec/AlohalyT019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itl/AbazariETHP19, author = {Farzaneh Abazari and Flavio Esposito and Hassan Takabi and Hamid Hosseinvand and Tommaso Pecorella}, title = {Teaching software-defined network security through malicious tenant detection}, journal = {Internet Technol. Lett.}, volume = {2}, number = {6}, year = {2019}, url = {https://doi.org/10.1002/itl2.131}, doi = {10.1002/ITL2.131}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itl/AbazariETHP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/simpra/AbazariATF19, author = {Farzaneh Abazari and Morteza Analoui and Hassan Takabi and Song Fu}, title = {{MOWS:} Multi-objective workflow scheduling in cloud computing based on heuristic algorithm}, journal = {Simul. Model. Pract. Theory}, volume = {93}, pages = {119--132}, year = {2019}, url = {https://doi.org/10.1016/j.simpat.2018.10.004}, doi = {10.1016/J.SIMPAT.2018.10.004}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/simpra/AbazariATF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/HesamifardTG19, author = {Ehsan Hesamifard and Hassan Takabi and Mehdi Ghasemi}, editor = {Gail{-}Joon Ahn and Bhavani Thuraisingham and Murat Kantarcioglu and Ram Krishnan}, title = {Deep Neural Networks Classification over Encrypted Data}, booktitle = {Proceedings of the Ninth {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2019, Richardson, TX, USA, March 25-27, 2019}, pages = {97--108}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3292006.3300044}, doi = {10.1145/3292006.3300044}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/HesamifardTG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/AlohalyT019, author = {Manar Alohaly and Hassan Takabi and Eduardo Blanco}, editor = {Gurpreet Dhillon and Fredrik Karlsson and Karin Hedstr{\"{o}}m and Andr{\'{e}} Z{\'{u}}quete}, title = {Towards an Automated Extraction of {ABAC} Constraints from Natural Language Policies}, booktitle = {{ICT} Systems Security and Privacy Protection - 34th {IFIP} {TC} 11 International Conference, {SEC} 2019, Lisbon, Portugal, June 25-27, 2019, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {562}, pages = {105--119}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-22312-0\_8}, doi = {10.1007/978-3-030-22312-0\_8}, timestamp = {Thu, 23 Apr 2020 08:52:39 +0200}, biburl = {https://dblp.org/rec/conf/sec/AlohalyT019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/PodschwadtT19, author = {Robert Podschwadt and Hassan Takabi}, editor = {Songqing Chen and Kim{-}Kwang Raymond Choo and Xinwen Fu and Wenjing Lou and Aziz Mohaisen}, title = {On Effectiveness of Adversarial Examples and Defenses for Malware Classification}, booktitle = {Security and Privacy in Communication Networks - 15th {EAI} International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {305}, pages = {380--393}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-37231-6\_22}, doi = {10.1007/978-3-030-37231-6\_22}, timestamp = {Sat, 07 Mar 2020 15:42:08 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/PodschwadtT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/NaroueiT19, author = {Masoud Narouei and Hassan Takabi}, editor = {Songqing Chen and Kim{-}Kwang Raymond Choo and Xinwen Fu and Wenjing Lou and Aziz Mohaisen}, title = {A Nature-Inspired Framework for Optimal Mining of Attribute-Based Access Control Policies}, booktitle = {Security and Privacy in Communication Networks - 15th {EAI} International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {305}, pages = {489--506}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-37231-6\_29}, doi = {10.1007/978-3-030-37231-6\_29}, timestamp = {Sat, 07 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/NaroueiT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1909-04778, author = {Robert Podschwadt and Hassan Takabi}, title = {Effectiveness of Adversarial Examples and Defenses for Malware Classification}, journal = {CoRR}, volume = {abs/1909.04778}, year = {2019}, url = {http://arxiv.org/abs/1909.04778}, eprinttype = {arXiv}, eprint = {1909.04778}, timestamp = {Tue, 17 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1909-04778.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/HesamifardTGW18, author = {Ehsan Hesamifard and Hassan Takabi and Mehdi Ghasemi and Rebecca N. Wright}, title = {Privacy-preserving Machine Learning as a Service}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2018}, number = {3}, pages = {123--142}, year = {2018}, url = {https://doi.org/10.1515/popets-2018-0024}, doi = {10.1515/POPETS-2018-0024}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/HesamifardTGW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isba/TakabiHD18, author = {Hassan Takabi and Yessir Hashem and Ram Dantu}, title = {Prediction of human error using eye movements patterns for unintentional insider threat detection}, booktitle = {{IEEE} 4th International Conference on Identity, Security, and Behavior Analysis, {ISBA} 2018, Singapore, January 11-12, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ISBA.2018.8311479}, doi = {10.1109/ISBA.2018.8311479}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/isba/TakabiHD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/AlohalyTB18, author = {Manar Alohaly and Hassan Takabi and Eduardo Blanco}, editor = {Elisa Bertino and Dan Lin and Jorge Lobo}, title = {A Deep Learning Approach for Extracting Attributes of {ABAC} Policies}, booktitle = {Proceedings of the 23nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2018, Indianapolis, IN, USA, June 13-15, 2018}, pages = {137--148}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3205977.3205984}, doi = {10.1145/3205977.3205984}, timestamp = {Wed, 21 Nov 2018 12:44:16 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/AlohalyTB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HashemTDN17, author = {Yassir Hashem and Hassan Takabi and Ram Dantu and Rodney D. Nielsen}, title = {A Multi-Modal Neuro-Physiological Study of Malicious Insider Threats}, booktitle = {Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {33--44}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3139923.3139930}, doi = {10.1145/3139923.3139930}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HashemTDN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HesamifardTGJ17, author = {Ehsan Hesamifard and Hassan Takabi and Mehdi Ghasemi and Catherine Jones}, editor = {Bhavani Thuraisingham and Ghassan Karame and Angelos Stavrou}, title = {Privacy-preserving Machine Learning in Cloud}, booktitle = {Proceedings of the 9th Cloud Computing Security Workshop, CCSW@CCS 2017, Dallas, TX, USA, November 3, 2017}, pages = {39--43}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3140649.3140655}, doi = {10.1145/3140649.3140655}, timestamp = {Thu, 12 Oct 2023 12:32:10 +0200}, biburl = {https://dblp.org/rec/conf/ccs/HesamifardTGJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TakabiJ17, author = {Hassan Takabi and Jafar Haadi Jafarian}, title = {Insider Threat Mitigation Using Moving Target Defense and Deception}, booktitle = {Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {93--96}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3139923.3139935}, doi = {10.1145/3139923.3139935}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/TakabiJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coinco/AlohalyT17, author = {Manar Alohaly and Hassan Takabi}, title = {When Do Changes Induce Software Vulnerabilities?}, booktitle = {3rd {IEEE} International Conference on Collaboration and Internet Computing, {CIC} 2017, San Jose, CA, USA, October 15-17, 2017}, pages = {59--66}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CIC.2017.00020}, doi = {10.1109/CIC.2017.00020}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/coinco/AlohalyT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/NaroueiKT17, author = {Masoud Narouei and Hamed Khanpour and Hassan Takabi}, editor = {Giovanni Livraga and Sencun Zhu}, title = {Identification of Access Control Policy Sentences from Natural Language Policy Documents}, booktitle = {Data and Applications Security and Privacy {XXXI} - 31st Annual {IFIP} {WG} 11.3 Conference, DBSec 2017, Philadelphia, PA, USA, July 19-21, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10359}, pages = {82--100}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61176-1\_5}, doi = {10.1007/978-3-319-61176-1\_5}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/NaroueiKT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/NaroueiKTPN17, author = {Masoud Narouei and Hamed Khanpour and Hassan Takabi and Natalie Parde and Rodney D. Nielsen}, editor = {Elisa Bertino and Ravi S. Sandhu and Edgar R. Weippl}, title = {Towards a Top-down Policy Engineering Framework for Attribute-based Access Control}, booktitle = {Proceedings of the 22nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2017, Indianapolis, IN, USA, June 21-23, 2017}, pages = {103--114}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3078861.3078874}, doi = {10.1145/3078861.3078874}, timestamp = {Tue, 09 Feb 2021 08:50:30 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/NaroueiKTPN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1711-05189, author = {Ehsan Hesamifard and Hassan Takabi and Mehdi Ghasemi}, title = {CryptoDL: Deep Neural Networks over Encrypted Data}, journal = {CoRR}, volume = {abs/1711.05189}, year = {2017}, url = {http://arxiv.org/abs/1711.05189}, eprinttype = {arXiv}, eprint = {1711.05189}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1711-05189.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GhasemiGolBT16, author = {Mohammad GhasemiGol and Abbas Ghaemi Bafghi and Hassan Takabi}, title = {A comprehensive approach for network attack forecasting}, journal = {Comput. Secur.}, volume = {58}, pages = {83--105}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2015.11.005}, doi = {10.1016/J.COSE.2015.11.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GhasemiGolBT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AbazariAT16, author = {Farzaneh Abazari and Morteza Analoui and Hassan Takabi}, title = {Effect of anti-malware software on infectious nodes in cloud environment}, journal = {Comput. Secur.}, volume = {58}, pages = {139--148}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2015.12.002}, doi = {10.1016/J.COSE.2015.12.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AbazariAT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GhasemiGolTB16, author = {Mohammad GhasemiGol and Hassan Takabi and Abbas Ghaemi Bafghi}, title = {A foresight model for intrusion response management}, journal = {Comput. Secur.}, volume = {62}, pages = {73--94}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.06.005}, doi = {10.1016/J.COSE.2016.06.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GhasemiGolTB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/HashemTGD16, author = {Yessir Hashem and Hassan Takabi and Mohammad GhasemiGol and Ram Dantu}, title = {Inside the Mind of the Insider: Towards Insider Threat Detection Using Psychophysiological Signals}, journal = {J. Internet Serv. Inf. Secur.}, volume = {6}, number = {1}, pages = {20--36}, year = {2016}, url = {https://doi.org/10.22667/JISIS.2016.02.31.020}, doi = {10.22667/JISIS.2016.02.31.020}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/HashemTGD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcis/OgbanufeKT16, author = {Obi Ogbanufe and Dan Kim and Hassan Takabi}, title = {Top Manager's Perspectives on Cyberinsurance Risk Management for Reducing Cybersecurity Risks}, booktitle = {22nd Americas Conference on Information Systems, {AMCIS} 2016, San Diego, CA, USA, August 11-14, 2016}, publisher = {Association for Information Systems}, year = {2016}, url = {http://aisel.aisnet.org/amcis2016/ISSec/Presentations/10}, timestamp = {Tue, 23 May 2017 14:11:43 +0200}, biburl = {https://dblp.org/rec/conf/amcis/OgbanufeKT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/Takabi16, author = {Hassan Takabi}, title = {Firewall for brain: Towards a privacy preserving ecosystem for {BCI} applications}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {370--371}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860516}, doi = {10.1109/CNS.2016.7860516}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cns/Takabi16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coinco/TakabiBA16, author = {Hassan Takabi and Anuj Bhalotiya and Manar Alohaly}, title = {Brain Computer Interface {(BCI)} Applications: Privacy Threats and Countermeasures}, booktitle = {2nd {IEEE} International Conference on Collaboration and Internet Computing, {CIC} 2016, Pittsburgh, PA, USA, November 1-3, 2016}, pages = {102--111}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CIC.2016.026}, doi = {10.1109/CIC.2016.026}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/coinco/TakabiBA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coinco/TakabiKZ16, author = {Hassan Takabi and Samir Koppikar and Saman Taghavi Zargar}, title = {Differentially Private Distributed Data Analysis}, booktitle = {2nd {IEEE} International Conference on Collaboration and Internet Computing, {CIC} 2016, Pittsburgh, PA, USA, November 1-3, 2016}, pages = {212--218}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CIC.2016.038}, doi = {10.1109/CIC.2016.038}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/coinco/TakabiKZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coinco/AlohalyT16, author = {Manar Alohaly and Hassan Takabi}, title = {If You Can't Measure It, You Can't Manage It: Towards Quantification of Privacy Policies}, booktitle = {2nd {IEEE} International Conference on Collaboration and Internet Computing, {CIC} 2016, Pittsburgh, PA, USA, November 1-3, 2016}, pages = {539--545}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CIC.2016.082}, doi = {10.1109/CIC.2016.082}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/coinco/AlohalyT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/TakabiARZ16, author = {Hassan Takabi and Sheikh Iqbal Ahamed and Mohammad Ashiqur Rahman and Mohammad Zulkernine}, title = {Message from {STPSA} 2016 Workshop Organizers}, booktitle = {40th {IEEE} Annual Computer Software and Applications Conference, {COMPSAC} Workshops 2016, Atlanta, GA, USA, June 10-14, 2016}, pages = {381}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/COMPSAC.2016.271}, doi = {10.1109/COMPSAC.2016.271}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/TakabiARZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/AlohalyT16, author = {Manar Alohaly and Hassan Takabi}, title = {Better Privacy Indicators: {A} New Approach to Quantification of Privacy Policies}, booktitle = {Workshop on Privacy Indicators, WPI@SOUPS 2016, Denver, CO, USA, June 22, 2016}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/soups2016/workshop-program/wpi/presentation/alohaly}, timestamp = {Thu, 04 Aug 2016 15:59:38 +0200}, biburl = {https://dblp.org/rec/conf/soups/AlohalyT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/KaghazgaranT15, author = {Parisa Kaghazgaran and Hassan Takabi}, title = {Toward an Insider Threat Detection Framework Using Honey Permissions}, journal = {J. Internet Serv. Inf. Secur.}, volume = {5}, number = {3}, pages = {19--36}, year = {2015}, url = {https://doi.org/10.22667/JISIS.2015.08.31.019}, doi = {10.22667/JISIS.2015.08.31.019}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/KaghazgaranT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/NaroueiAGTS15, author = {Masoud Narouei and Mansour Ahmadi and Giorgio Giacinto and Hassan Takabi and Ashkan Sami}, title = {DLLMiner: structural mining for malware detection}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3311--3322}, year = {2015}, url = {https://doi.org/10.1002/sec.1255}, doi = {10.1002/SEC.1255}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/NaroueiAGTS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HashemTGD15, author = {Yessir Hashem and Hassan Takabi and Mohammad GhasemiGol and Ram Dantu}, editor = {Elisa Bertino and Ilsun You}, title = {Towards Insider Threat Detection Using Psychophysiological Signals}, booktitle = {Proceedings of the 7th {ACM} {CCS} International Workshop on Managing Insider Security Threats, {MIST} 2015, Denver, Colorado, USA, October 16, 2015}, pages = {71--74}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808783.2808792}, doi = {10.1145/2808783.2808792}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HashemTGD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/NaroueiT15, author = {Masoud Narouei and Hassan Takabi}, editor = {Edgar R. Weippl and Florian Kerschbaum and Adam J. Lee}, title = {Towards an Automatic Top-down Role Engineering Approach Using Natural Language Processing Techniques}, booktitle = {Proceedings of the 20th {ACM} Symposium on Access Control Models and Technologies, Vienna, Austria, June 1-3, 2015}, pages = {157--160}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2752952.2752958}, doi = {10.1145/2752952.2752958}, timestamp = {Mon, 26 Jun 2023 20:45:28 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/NaroueiT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/JafarianTTHS15, author = {Jafar Haadi Jafarian and Hassan Takabi and Hakim Touati and Ehsan Hesamifard and Mohamed Shehab}, editor = {Edgar R. Weippl and Florian Kerschbaum and Adam J. Lee}, title = {Towards a General Framework for Optimal Role Mining: {A} Constraint Satisfaction Approach}, booktitle = {Proceedings of the 20th {ACM} Symposium on Access Control Models and Technologies, Vienna, Austria, June 1-3, 2015}, pages = {211--220}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2752952.2752975}, doi = {10.1145/2752952.2752975}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/JafarianTTHS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/NaroueiT15, author = {Masoud Narouei and Hassan Takabi}, editor = {Raja Naeem Akram and Sushil Jajodia}, title = {Automatic Top-Down Role Engineering Framework Using Natural Language Processing Techniques}, booktitle = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9311}, pages = {137--152}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24018-3\_9}, doi = {10.1007/978-3-319-24018-3\_9}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wistp/NaroueiT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Takabi14, author = {Hassan Takabi}, editor = {Robert H. Deng and Elaine Shi and Kui Ren}, title = {Privacy aware access control for data sharing in cloud computing environments}, booktitle = {Proceedings of the Second International Workshop on Security in Cloud Computing, SCC@ASIACCS '14, Kyoto, Japan, June 3, 2014}, pages = {27--34}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600075.2600076}, doi = {10.1145/2600075.2600076}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Takabi14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gis/JinT14, author = {Lei Jin and Hassan Takabi}, editor = {Carsten Ke{\ss}ler and Grant D. McKenzie and Lars Kulik}, title = {Venue attacks in location-based social networks}, booktitle = {Proceedings of the 1st {ACM} {SIGSPATIAL} International Workshop on Privacy in Geographic Information Collection and Analysis, GeoPrivacy '14, Dallas/Fort Worth, Texas, USA, November 4-7, 2014}, pages = {1:1--1:8}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2675682.2676395}, doi = {10.1145/2675682.2676395}, timestamp = {Tue, 06 Nov 2018 11:07:35 +0100}, biburl = {https://dblp.org/rec/conf/gis/JinT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/JinTLJ14, author = {Lei Jin and Hassan Takabi and Xuelian Long and James B. D. Joshi}, editor = {Gail{-}Joon Ahn and Anupam Datta}, title = {Exploiting Users' Inconsistent Preferences in Online Social Networks to Discover Private Friendship Links}, booktitle = {Proceedings of the 13th Workshop on Privacy in the Electronic Society, {WPES} 2014, Scottsdale, AZ, USA, November 3, 2014}, pages = {59--68}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2665943.2665956}, doi = {10.1145/2665943.2665956}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/JinTLJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcc/TakabiJ12, author = {Hassan Takabi and James B. D. Joshi}, title = {Semantic-based policy management for cloud computing environments}, journal = {Int. J. Cloud Comput.}, volume = {1}, number = {2/3}, pages = {119--144}, year = {2012}, url = {https://doi.org/10.1504/IJCC.2012.046717}, doi = {10.1504/IJCC.2012.046717}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcc/TakabiJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/TakabiJ12, author = {Hassan Takabi and James B. D. Joshi}, title = {Policy Management as a Service: An Approach to Manage Policy Heterogeneity in Cloud Computing Environment}, booktitle = {45th Hawaii International International Conference on Systems Science {(HICSS-45} 2012), Proceedings, 4-7 January 2012, Grand Wailea, Maui, HI, {USA}}, pages = {5500--5508}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/HICSS.2012.475}, doi = {10.1109/HICSS.2012.475}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/TakabiJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/JinTJ11, author = {Lei Jin and Hassan Takabi and James B. D. Joshi}, title = {Analysing security and privacy issues of using e-mail address as identity}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {1}, number = {1}, pages = {34--58}, year = {2011}, url = {https://doi.org/10.1504/IJIPSI.2011.043730}, doi = {10.1504/IJIPSI.2011.043730}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/JinTJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/MazurekKSTBC11, author = {Michelle L. Mazurek and Peter F. Klemperer and Richard Shay and Hassan Takabi and Lujo Bauer and Lorrie Faith Cranor}, editor = {Desney S. Tan and Saleema Amershi and Bo Begole and Wendy A. Kellogg and Manas Tungare}, title = {Exploring reactive access control}, booktitle = {Proceedings of the International Conference on Human Factors in Computing Systems, {CHI} 2011, Vancouver, BC, Canada, May 7-12, 2011}, pages = {2085--2094}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1978942.1979245}, doi = {10.1145/1978942.1979245}, timestamp = {Fri, 12 Mar 2021 15:27:48 +0100}, biburl = {https://dblp.org/rec/conf/chi/MazurekKSTBC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/JinTJ11, author = {Lei Jin and Hassan Takabi and James B. D. Joshi}, editor = {Ravi S. Sandhu and Elisa Bertino}, title = {Towards active detection of identity clone attacks on online social networks}, booktitle = {First {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings}, pages = {27--38}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1943513.1943520}, doi = {10.1145/1943513.1943520}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/JinTJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/ZargarTJ11, author = {Saman Taghavi Zargar and Hassan Takabi and James B. D. Joshi}, editor = {Dimitrios Georgakopoulos and James B. D. Joshi}, title = {{DCDIDP:} {A} distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments}, booktitle = {7th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2011, Orlando, FL, USA, 15-18 October, 2011}, pages = {332--341}, publisher = {{ICST} / {IEEE}}, year = {2011}, url = {https://doi.org/10.4108/icst.collaboratecom.2011.247158}, doi = {10.4108/ICST.COLLABORATECOM.2011.247158}, timestamp = {Fri, 15 Mar 2024 12:30:44 +0100}, biburl = {https://dblp.org/rec/conf/colcom/ZargarTJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/TakabiJA10, author = {Hassan Takabi and James B. D. Joshi and Gail{-}Joon Ahn}, title = {Security and Privacy Challenges in Cloud Computing Environments}, journal = {{IEEE} Secur. Priv.}, volume = {8}, number = {6}, pages = {24--31}, year = {2010}, url = {https://doi.org/10.1109/MSP.2010.186}, doi = {10.1109/MSP.2010.186}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/TakabiJA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/ShayMKT10, author = {Richard Shay and Michelle L. Mazurek and Peter F. Klemperer and Hassan Takabi}, editor = {Elizabeth D. Mynatt and Don Schoner and Geraldine Fitzpatrick and Scott E. Hudson and W. Keith Edwards and Tom Rodden}, title = {Exploring reactive access control}, booktitle = {Proceedings of the 28th International Conference on Human Factors in Computing Systems, {CHI} 2010, Extended Abstracts Volume, Atlanta, Georgia, USA, April 10-15, 2010}, pages = {4417--4422}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1753846.1754163}, doi = {10.1145/1753846.1754163}, timestamp = {Fri, 12 Mar 2021 15:27:48 +0100}, biburl = {https://dblp.org/rec/conf/chi/ShayMKT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/TakabiJA10, author = {Hassan Takabi and James B. D. Joshi and Gail{-}Joon Ahn}, title = {SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments}, booktitle = {Workshop Proceedings of the 34th Annual {IEEE} International Computer Software and Applications Conference, {COMPSAC} Workshops 2010, Seoul, Korea, 19-23 July 2010}, pages = {393--398}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/COMPSACW.2010.74}, doi = {10.1109/COMPSACW.2010.74}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/TakabiJA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/TakabiJ10, author = {Hassan Takabi and James B. D. Joshi}, editor = {James B. D. Joshi and Barbara Carminati}, title = {StateMiner: an efficient similarity-based approach for optimal mining of role hierarchy}, booktitle = {15th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings}, pages = {55--64}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1809842.1809853}, doi = {10.1145/1809842.1809853}, timestamp = {Tue, 06 Nov 2018 16:57:59 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/TakabiJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialcom/JinTJ10, author = {Lei Jin and Hassan Takabi and James B. D. Joshi}, editor = {Ahmed K. Elmagarmid and Divyakant Agrawal}, title = {Security and Privacy Risks of Using E-mail Address as an Identity}, booktitle = {Proceedings of the 2010 {IEEE} Second International Conference on Social Computing, SocialCom / {IEEE} International Conference on Privacy, Security, Risk and Trust, {PASSAT} 2010, Minneapolis, Minnesota, USA, August 20-22, 2010}, pages = {906--913}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SocialCom.2010.134}, doi = {10.1109/SOCIALCOM.2010.134}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/socialcom/JinTJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/TakabiJK09, author = {Hassan Takabi and James B. D. Joshi and Hassan A. Karimi}, editor = {James B. D. Joshi and Tao Zhang}, title = {A collaborative k-anonymity approach for location privacy in location-based services}, booktitle = {The 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2009, Washington DC, USA, November 11-14, 2009}, pages = {1--9}, publisher = {{ICST} / {IEEE}}, year = {2009}, url = {https://doi.org/10.4108/ICST.COLLABORATECOM2009.8374}, doi = {10.4108/ICST.COLLABORATECOM2009.8374}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/colcom/TakabiJK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sws/TakabiKJS09, author = {Hassan Takabi and Minsoo Kim and James B. D. Joshi and Michael B. Spring}, editor = {Ernesto Damiani and Seth Proctor and Anoop Singhal}, title = {An architecture for specification and enforcement of temporal access control constraints using {OWL}}, booktitle = {Proceedings of the 6th {ACM} Workshop On Secure Web Services, {SWS} 2009, Chicago, Illinois, USA, November 13, 2009}, pages = {21--28}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655121.1655127}, doi = {10.1145/1655121.1655127}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sws/TakabiKJS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/AbdallahT08, author = {Ali E. Abdallah and Hassan Takabi}, editor = {Massimiliano Rak and Ajith Abraham and Valentina Casola}, title = {Integrating Delegation with the Formal Core {RBAC} Model}, booktitle = {Proccedings of the Fourth International Conference on Information Assurance and Security, {IAS} 2008, September 8-10, 2008, Napoli, Italy}, pages = {33--36}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/IAS.2008.66}, doi = {10.1109/IAS.2008.66}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/AbdallahT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/TakabiAJ07, author = {Hassan Takabi and Morteza Amini and Rasool Jalili}, editor = {Ning Zhang and Ajith Abraham}, title = {Separation of Duty in Role-Based Access Control Model through Fuzzy Relations}, booktitle = {Proceedings of the Third International Symposium on Information Assurance and Security, {IAS} 2007, August 29-31, 2007, Manchester, United Kingdom}, pages = {125--130}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/IAS.2007.68}, doi = {10.1109/IAS.2007.68}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/TakabiAJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/TakabiAJ07a, author = {Hassan Takabi and Morteza Amini and Rasool Jalili}, editor = {Ning Zhang and Ajith Abraham}, title = {Enhancing Role-Based Access Control Model through Fuzzy Relations}, booktitle = {Proceedings of the Third International Symposium on Information Assurance and Security, {IAS} 2007, August 29-31, 2007, Manchester, United Kingdom}, pages = {131--136}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/IAS.2007.69}, doi = {10.1109/IAS.2007.69}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/TakabiAJ07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aiccsa/TakabiAJ07, author = {Hassan Takabi and Morteza Amini and Rasool Jalili}, title = {Trust-Based User-Role Assignment in Role-Based Access Control}, booktitle = {2007 {IEEE/ACS} International Conference on Computer Systems and Applications {(AICCSA} 2007), 13-16 May 2007, Amman, Jordan}, pages = {807--814}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/AICCSA.2007.370725}, doi = {10.1109/AICCSA.2007.370725}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aiccsa/TakabiAJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.