Mohammadi-Nodooshan, A., Darmani, Y., Jalili, R. , Nourani, M. and Sayad Haghighi, M. " A Robust and Efficient SIP Authentication Scheme", Accepted for publication in Scientia Transactions on Computer Science and Engineering, 2009.
Asadpour, M. and Jalili, R. .Double Voting Problem of some Anonymous E-Voting Schemes., Journal of Information Science and Engineering (JISE), Vol. 25, pp. 895-906, 2009.
Niamanesh, M. and Jalili, R. .DRAPS: A Framework for Dynamic Reconfigurable Protocol Stacks., Journal of Information Science and Engineering (JISE), Vol. 25, pp. 827-841, 2009.
Niamanesh, M. and Jalili, R. .A Framework for Automatic Reconfigurations of Protocol Stacks in Ubiquitous Computing Systems., Ubiquitous Computing and Communication Journal, Vol. 4, No. 3, pp. 758-769, 2009.
Niamanesh, M. and Jalili, R. .A Solution for Backward-Compatible Reconfigurations of Running Protocol Components in Protocol Stacks., Ubiquitous Computing and Communication Journal, Vol. 4, No. 3, pp. 784-793, 2009.
Shahriari, H.R. Ganji-Saffar, Y., Jalili, R. , Habibi, J. .An Expert System for Automatic Multi-Host Network Vulnerability Analysis., Journal of Information Science and Engineering (JISE), Vol. 24, No. 3; March 2008.
Shahriari, H.R., Makarem, M.S., Sirjani, M., Jalili, R. and Movaghar, A. .Vulnerability Analysis of Networks to Detect Multiphase Attack Using the Actor-based Language Rebeca., Elsevier Computers & Electrical Engineering journal, In Press, Available Online 2008.
Amini, M., Jalili, R. , and Shahriari, H.R. .RT-UNNID: A Practical Solution to Real-Time Network-Based Intrusion Detection Using Unsupervised Neural Networks., Elsevier Computers and Security Journal, Vol. 25, No. 6. Sept. 2006.
Shahriari, H.R. and Jalili, R. .Vulnerability Take Grant (VTG): An Efficient Approach to Analyze Network Vulnerabilities., Elsevier Computers and Security Journal, Vol. 26, No. 5. Sept. 2006.
Yusefi, A., Jalili, R. and Niamanesh, M. .Multi-Determiner Protection of Private Data in Pervasive Computing Environments., IJCSNS International Journal of Computer Science and Network Security, Dec. 2006.
Rafiei, M.E., Jalili, R. and Moosavi, H. .Vulnerability
Analysis trough a Graph-based Protection System., IJCSNS International Journal of Computer Science and
Network Security, Dec. 2006.
Morteza Amini, Rasool Jalili, Mousa Amir Ehsan, and Fathyieh Faghih, Cooperative Security Administration
in Multi-Domain Environments Using a Variant of Deontic Logic, Scientia Iranica, Transaction on Computer
Science & Engineering and Electrical Engineering, Vol. 19, No 3, pp. 635-653, June 2012.
Morteza Amini, Rasool Jalili,A Multi-Level Authorization Model and Framework for Distributed
Semantic-Aware Environments, IET Information Security, Special Issue on Multi-Agent and Distributed
Information Security, Vol. 4, No 4, pp. 301-321, Dec. 2010.
Ali Noorollahi Ravari, Jafar Haadi Jafarian, Morteza Amini and Rasool Jalili, "GTHBAC: A
Generalized Temporal History Based Access Control Model", Springer Telecommunication Systems, Vol. 45,
No 2-3, pp. 111-125, Oct. 2010
Jafar Haadi Jafarian and Morteza Amini, CAMAC: A Context-Aware Mandatory Access Control Model, ISeCure-
The ISC International Journal of Information Security, Vol. 1, No 1, pp. 35-54, January 2009.
Morteza Amini, Rasool Jalili, Hamid-Reza,Shahriari, RT-UNNID: A Practical Solution to Real-Time
Network-Based Intrusion Detection Using Unsupervised Neural Networks, Computers and Security, Vol. 25,
No 6, pp. 459-468, Sep. 2006[PDF]
مقالات کنفرانسی
Karimi, M., Hadavi, A. and Jalili, R. "A Secure Range Query Enabled Approach for Encrypted XML
Documents", Proceedings of the 6th ISC International Conference on Information Security and Cryptology
(ISCISC 2009), pp. 13-22, Isfahan, 2009.
Dousti, M.S., AmirHaeri, M.and Jalili, R. "Privacy-Preserving Single Layer Perceptron", Proceedings of
the 6th ISC International Conference on Information Security and Cryptology (ISCISC 2009), pp. 31-38,
Isfahan, 2009.
Asl-Asgharian, A., Dousti, M.S. and Jalili, R. "An Efficient DC-Net Based Anonymous Message Transmission
Protocol", Proceedings of the 6th ISC International Conference on Information Security and Cryptology
(ISCISC 2009), pp. 23-30, Isfahan, 2009.
AmirHaeri, M. and Jalili, R. "RTEAS: A Real-Time Algorithm for Extracting Attack Scenarios from
Intrusion Alert Stream", Proceedings of the 6th ISC International Conference on Information Security and
Cryptology (ISCISC 2009), pp. 40-47, Isfahan, 2009.
Sadighian, A. and Jalili, R. "AFMAP: Anonymous Forward-Secure Mutual Authentication Protocols for RFID
Systems", Proceedings of the Third International Conference on Emerging Security Information, Systems
and Technologies-SecureWare 2009, Greek, pp. 31-36, 2009.
ShirAliNia, A. and Jalili, R. .The Data Affecting Model for Detecting Source Code Security
Vulnerabilities., Proceedings of the 5th ISC International Conference on Information Security and
Cryptology (ISCISC 2008), Tehran, 2008.
Mansoori, F. and Jalili, R. .A Method for Query Processing On Encrypted String Data., Proceedings of
the 5th ISC International Conference on Information Security and Cryptology (ISCISC 2008), Tehran, 2008.
Sadighian, A.R. and Jalili, R. .FLMAP: A Fast Lightweight Mutual Authentication Protocol for RFID
System., Proceedings of the 16th IEEE International Conference on Networks (ICON 2008), India, 2008.
Niamanesh, M. and Jalili, R. .A Formalism for Reconfigurability Analysis in Distributed Non- Blocking
Components., Proceedings of the 28th International Conference on Distributed Computing Systems
(ICDCS-08), China, 2008.
Abasi-Moghadam, S., Shah-Karami, A. and Jalili, R. .Mapping of Access Control Models in XML-Based
DataBases Using Anthology Based Mapping in Semantic Web., Proceedings of the 13th CSI National Computer
Conference (CSICC2008), Kish Island, IRAN, 2008.
Saremi, F., Mashayekhi, H., Jalili, R. , and Movaghar, A. .CEBAC: A Decentralized Cooperation
Enforcement Based Access Control Framework in MANETs., Proceedings of the 13th CSI International
Computer Conference (CSICC2008), Kish Island, IRAN, 2008.
Mohammadi-Nodooshan, A. Darmani, Y. Jalili, R. and Nourani, M. .A Robust and Efficient SIP
Authentication Scheme., Proceedings of the 13th CSI International Computer Conference (CSICC2008), Kish
Island, IRAN, 2008.
Mohammadi-Nodooshan, A. Darmani, Y. Jalili, R. and Nourani, M. .A Robust and Efficient SIP
Authentication Scheme., Proceedings of the 13th CSI International Computer Conference (CSICC2008), Kish
Island, IRAN, 2008.
Hemmati, H. and Jalili, R. .Self-Reconfiguration in Highly Available Pervasive Computing Systems.,
Proceedings of the International Conference on Autonomic and Trusted Computing (ATC-08) (LNCS 5060),
Netherland, 2008.
Taherian, M. and Jalili, R. .An Anthology-based and Sematic-Aware Trust Model for Pervasive Computing
Environments., Proceedings of the Forth Iranian Society of Cryptography Conference (ISCC2007), IRAN,
2007.
Golyaei, S. and Jalili, R. .A Certificate Based Client Based Access Control Model and its Associating
Policy Description Language., Proceedings of the Forth Iranian Society of Cryptography Conference
(ISCC2007), IRAN, 2007.
Amini, M. and Jalili, R. .Specification and Inference of Access Policies and Obligations Based on The
Deontic Logics in Semantic-Aware Environments., Proceedings of the Forth Iranian Society of Cryptography
Conference (ISCC2007), IRAN, 2007 (The Best Paper Award).
Takabi, H, Amini, M. and Jalili, R. .Separation of Duty in Role- Based Access Control Model through
Fuzzy Relations., Proceedings of the Third International Symposium on Information Assurance and
Security, IAS 2007 (Published by IEEE), UK, 2007.
Niamanesh, M. and Jalili, R. .A Dynamic-Reconfigurable Architecture for Protocol Stacks of Networked
Systems., Proceedings of the 31st IEEE Computers, Software, and Applications Conference (COMPSAC 2007),
China, 2007.
Niamanesh, M. Sabet-Ghadam, S., Yusefzadeh, R. and Jalili, R. .Design and Implementation of a Dynamic
Reconfigurable Architecture for Protocol Stack., Proceedings of the IPM International Workshop on
Foundations of Software Engineering (FSEN 2007.) (LNCS 4767), Tehran, IRAN, 2007.
Niamanesh, M. and Jalili, R. .Formalizing Assured Dynamic Reconfiguration in Protocols., Proceedings of
the IPM International Workshop on Foundations of Software Engineering (FSEN 2007.) (LNCS 4767), Tehran,
IRAN, 2007.
Rafiei, M. E. Taherian, M., Moosavi, H., Movaghar, A. and Jalili, R. .Vulnerability Analysis in VGBPS
using Prolog., Proceedings of the IPM International Workshop on Foundations of Software Engineering
(FSEN 2007.) (LNCS 4767), Tehran, IRAN, 2007.
Shahriari, H.R. and Jalili, R. .Formal Definition and Categorization of Vulnerabilities using
Take-Grant Protection Model., Proceedings of the 12th CSI International Computer Conference (CSICC2007),
Tehran, IRAN, 2007.
Hafez-Ghorani, S., SAdeghian, B., Jalili, R. , and Tarameshloo, E. .A method for Implementation of
ARBAC97 in Relational DBMSs., Proceedings of the 12th CSI International Computer Conference (CSICC2007),
Tehran, IRAN, 2007.
Jalaei, R., Shahriari, H.R., and Jalili, R. .Analysis of Combinational Attacks to Networks Using Attack
Graphs., Proceedings of the 12th CSI International Computer Conference (CSICC2007), Tehran, IRAN, 2007.
Yusefi, A., Jalili, R. , and Niamanesh, M. .A Multi-Determiner Privacy Protection System for Pervasive
Computing Environments., Proceedings of the 12th CSI International Computer Conference (CSICC2007),
Tehran, IRAN, 2007.
Mokhtarian, K., Jalili, R. , and Shahriari, H.R. .Quantitative Evaluation of Network Security Using
Fuzzy Privilege Graph., Proceedings of the 12th CSI International Computer Conference (CSICC2007),
Tehran, IRAN, 2007.
Gerani, Sh. Shahriari, H.R., Saberi, M. and Jalili, R. .Modelling and Analysis of Firewall
Vulnerabilities Using VTG., Proceedings of the 12th CSI International Computer Conference (CSICC2007),
Tehran, IRAN, 2007.
Rafiei, M. E. and Jalili, R. .Decidability of the Safety Problem in the VGBPS Protection System.,
Proceedings of the 12th CSI International Computer Conference (CSICC2007), Tehran, IRAN, 2007.
Takabi, H, Amini, M. and Jalili, R. .Trust-Based User-Role Assignment in Role-Based Access Control.,
Proceedings of The 2007 ACS/IEEE International Conference on Computer Systems and Applications (AICCSA
.2007), Jordan, 2007.
Masoum-Zadeh, A., Amini, M. and Jalili, R. .Conflict Detection and Resolution in Context-Aware
Authorization., Proceedings of the The IEEE 21st International Conference on Advanced Information
Networking and Applications (AINA- 2007), Canada, 2007.
SattarZadeh, B., AsadPour, M. and Jalili, R. .Enhanced Smart-Card-Based Authentication Scheme Providing
Forward- Secure Key Agreement., Proceedings of the International Conference on New Technologies,
Mobility and Security (NTMS'2007), France, 2007.
SattarZadeh, B., AsadPour, M. and Jalili, R. .Improved User Identity Confidentiality for UMTS Mobile
Networks., Proceedings of the 4th European Conference on Universal Multiservice Networks, ECUMN'2007,
France, 2007.
Jalaei, R., Shahriari, H.R., and Jalili, R. .Generating and Analyzing Attack Graphs through
Vulnerability Take Grant Model., Proceedings of the International Conference on Network Security-
ICONS2007, India, 2007.
Masoum-Zadeh, A., Amini, M. and Jalili, R. .Context Aware Access Control through Provisional
Authorization., Proceedings of the 2nd International Conference on Information System Security (ICISS
2006), India, Dec. 2006.
Javanmardi, S., Hemmati, H. and Jalili, R. .An Access Control Framework for Pervasive Computing
Environments. Proceedings of the 2006 International Conference on Pervasive Systems & Computing PSC'06,
Monte Carlo Resort, Las Vegas, Nevada, USA, June 26-29, 2006.
Javanmardi, S., Amini, M. Jalili, R. , and Ganji-Saffar, Y. .SBAC: "A Semantic-Based Access Control
Model. Proceedings of the NORDSEC-2006, Sweden, October 2006.
Javanmardi, S., Amini, M. and Jalili, R. .An Access Control Model for Protecting Semantic Web
Resources., Proceedings of the Semantic Web Policy Workshop, Athens, GA, USA, November 5, 2006.
SattarZadeh, B., AsadPour, M. and Jalili, R. .Security Enhancement for A Low Computation Cost User
Authentication Scheme., Proceedings of the International Conference on Security and Cryptography
(SECRYPT2006), Portugal, August 2006.
Ganji Saffar, Y., Abolhassani, H. and Jalili, R. .An Architecture for a Context-aware Service Broker in
Ubiquitous Computing Environments., Proceedings of the International Workshop on Pervasive Computing
Systems & Application (PerCSA 2006) of the ACS/IEEE AICCSA-06 Conference, Dubai/Sharjeh, 2006.
Zakeri, R., Abolhassani, H., Shahriari, H.R. and Jalili, R. .Using Description Logics for Network
Vulnerability Analysis., Proceedings of the 5th International Conference on Networking ICN'06, IEEE
Computer Society Press, Mauritius 2006.
Sajedi, H., Jalili, R. , and Niamanesh, M., .Using Intelligent Agents for Automatic Selection of
Services in Dynamic Wireless Networks., Proceedings of the 11th CSI Computer Conference (CSICC2006), pp.
1003-1006 (The Farsi Volume), IPM, Tehran, 2006.
Omidian, A., Shahriari, H.R., and Jalili, R. , .Modeling of Computer Network Vulnerabilities Using
Petri-Nets., Proceedings of the 11th CSI Computer Conference (CSICC2006), pp. 935-938 (The Farsi
Volume), IPM, Tehran, 2006.
Fekrazad Nobakht, N., Niamanesh, M., Hemmati, H., and Jalili, R. , .A Graph-Based Mechanism for State
Transfer in Dynamic Reconfiguration of Component-Based Programs., Proceedings of the 11th CSI Computer
Conference (CSICC2006), pp. 436-444 (The Farsi Volume), IPM, Tehran, 2006.
Niamanesh, M., Heydarian, F. and Jalili, R. .Runtime Validity of Dynamic Reconfiguration in
Component-Based Programs., Proceedings of the 11th CSI Computer Conference (CSICC2006), pp. 613-617 (The
English Volume), IPM, Tehran, 2006.
Shahriari, H.R., and Makarem, M.S., Sirjani, M., Jalili, R. and Movaghar, A. .Modeling and Verification
of Complex Network Attacks Using and Actor-Based Language., Proceedings of the 11th CSI Computer
Conference (CSICC2006), pp. 152-158 (The English Volume), IPM, Tehran, 2006.
Zakeri, R., Jalili, R. and Shahriari, H.R. .Using Description Logics For Man In The Middle Attack
Analysis., Proceedings of the 11th CSI Computer Conference (CSICC2006), pp. 512-515 (The English
Volume), IPM, Tehran, 2006.
Shahriari, H.R., Sadoddin, R., Jalili, R. , Zakeri, R. and Omidian, A.R. .Network Vulnerability Analysis
through Vulnerability Take- Grant Model (VTG)., Proceedings of the 7th International Conference on
Information and Communications Security(ICICS2005), pp. 256-268 LNCS# 3783, 2005.
Hemmati, H., Niamanesh, M. Jalili, R. .A Framework to Support Run-Time Assured Dynamic Reconfiguration
for Pervasive Computing Environments., Proceedings of the First International Symposium on Wireless
Pervasive Computing (ISWPC-2006), pp. 273-277, Thailand, 2006.
Hemmati, H., Aliakbarian , S., Niamanesh, M. Jalili, R. .Structural and Behavioral Run-Time Validation
of Dynamic Reconfiguration in Pervasive Computing Environments., Proceedings of the 4th Asian
International Mobile Computing Conference AMOC, India, 2006.
Asadzadeh, K., Niamanesh, M. Jalili, R. .A Composition Function Model for Software Reconfiguration
Propagation in a Network of Systems., Proceedings of the 9th World Multi- Conference on Systemics,
Cybernetics and Informatics (WMSCI2005), Orlando, Florida, 2005.
Niamanesh, M., Heidarian Dehkordi, F., Fekrazad Nobakht, N, Jalili, R. , .On Validity Assurance of
Dynamic Reconfiguration for Component-based Programs., Proceedings of the IPM International Workshop on
Foundations of Software Engineering (Theory And Practice) FSEN 2005, Tehran, Iran, 2005.
Shahriari , H.R., Sadoddin, R. , Jalili, R. , Zakeri, R. and Omidian, R. .Vulnerability Analysis through
Vulnerability Take-Grant Model (VTG)., Proceedings o f the 7th International Conference on Information
and Communications Security (ICICS2005), China, 2005.
Shahriari , H.R. and Jalili, R. "Modeling and Analyzing Network Vulnerabilities via a Logic-Based
Approach., Proceedings of the 2nd International Symposium of Telecommunications (IST2005), Shiraz, Iran
,2005.
Zakeri, R., Shahriari , H.R., Jalili, R. and Sadoddin, R. .Modeling TCP/IP Networks Topology for Network
Vulnerability Analysis., Proceedings of the 2nd International Symposium of Telecommunications (IST2005),
Shiraz, Iran , 2005.
Shahriari , H.R. GanjiSaffar, Y. and Jalili, R. "An Approach to Analyzing Network Vulnerabilities based
on the Topology Relations., Proceedings of the 3rd Iranian Society of Cryptography Conference
(ISCC2005), pp. 273-284, Isfahan, Iran, 2005.
Shahriari , H.R. Sadoddin, R. and Jalili, R. .Network Vulnerability Analysis based on the Take-Grant
Protection Model: A Proof of the Concept., Proceedings of the 3rd Iranian Society of Cryptography
Conference (ISCC2005), pp. 261-272, Isfahan, Iran, 2005.
Shahriari , H.R. and Jalili, R. .Modeling of Network Security- Related Behaviors Using NVML.,
Proceedings of the 8th IEEE International Multi-topic conference (INMIC 2004), Lahur, Pakistan, 2004.
Shahriari , H.R. and Jalili, R. .Using CSP To Model And Analyze Transmission Control Protocol
Vulnerabilities Within The Broadcast Network., Proceedings of the International Networking and
Communications Conference (INCC 2004), Lahur, Pakistan, 2004.
Asadzadeh, K, Niamanesh, M. and Jalili, R. .A Combinational Function Based Model for Reconfiguration
Propagation in Distributed Systems., Proceedings of the Second International Conference on Information
and Knowledge Technology, Tehran, 2005.
Ranjbar, A., Hemmati, H., Niamanesh, M. and Jalili, R. .Context Based Service Migration in Pervasive
Computing., Proceedings of the Second International Conference on Information and Knowledge Technology,
Tehran, 2005.
Moghadam, M., Niamanesh, M. and Jalili, R. .Context Based Service Migration in Pervasive Computing.,
Proceedings of the Second International Conference on Information and Knowledge Technology, Tehran,
2005.
Jalili, R. , Imani-Mehr, F. and Amini, M. .SPUNNID: A new Approach for Detection of DDoS Attacks Based
on the Combination of Statistical Methods and Unsupervised Neural Networks., Proceedings of the 10th
Annual Iranian Computer Society Conference, Tehran, 2005.
Jalili, R. , Imani-Mehr, F. Amini, M. and Shahriari, H.R. .Detection of Distributed Denial of Service
Attacks Using Statistical Pre-processor and Unsupervised Neural Networks,. Proceedings of International
Conference on Information Security Practice and Experience, Singapore, LNCS 3439/2005, pp. 192-203,
2005.
Ranjbar, A., Jalili, R. and Niamanesh, M. .Using Metropolitan Pervasive Environments Information in
Predicting Continuous Location-Based Queries., Proceedings of the 10th Annual Iranian Computer Society
Conference, Tehran, 2005.
Samadi. M, Esmaeili, J. and Jalili, R. .A System for Identification and Misleading of Intruder in
Computer Networks., Proceedings of the 10th Annual Iranian Computer Society Conference, Tehran, 2005.
Jalili, R. and Niamanesh, M. .Modelling of Communication Protocol Stacks with Reconfigurable
Capability., Sharif University of Technology Research Reports, Tehran, 2005.
Jalili, R. and Amini, M. .Network Based Intrusion Detection Using Unsupervised Adaptive Resonance
Theory (ART)., Proceedings of the Fourth International ICSC Symposium On Engineering Of Intelligent
Systems (EIS 2004), Portugal, 2004.
Jalili, R. and Amini, M. .An Intrusion Detection System Based on the ART Neural Networks., Proceedings
of the Fifth Conference on Intelligent Systems (CIS 2003), Ferdowsi University of Mashhad, Mashhad,
Iran, pp. , 2003.
Jalili, R. and Amini, M. .An Intrusion Detection System Based on the ART Neural Networks., Proceedings
of the Fifth Conference on Intelligent Systems (CIS 2003), Ferdowsi University of Mashhad, Mashhad,
Iran, pp. , 2003.
Ezati, N. and Jalili, R. .Improving Performance of the Internet Connections Inspection Through In-Kernel
Application Proxies., Proceedings of the 9th Annual Computer Society of Iran Conference (CSICC2004),
Sharif University of Technology, Tehran, Iran, pp. , 2004.
Khansari-Nia, O. and Jalili, R. .A New Approach for Role Delegation in Distributed Environments Based on
Role-Based Access Control., Proceedings of the 9th Annual Computer Society of Iran Conference
(CSICC2004), Sharif University of Technology, Tehran, Iran, pp. , 2004.
Khansari-Nia, O. and Jalili, R. .A Dynamic Access Control Model for Relational Database Systems.,
Proceedings of the Second Iranian Cryptography Conference (ISCC2003), Sharif University of Technology,
Tehran, Iran, pp. , 2003.
Jalili, R. and Amini, M. .An Intrusion Detection System Based on the ART Neural Networks., Proceedings
of the Fifth Conference on Intelligent Systems (CIS 2003), Ferdowsi University of Mashhad, Mashhad,
Iran, pp. , 2003.
Niamanesh, M. and Jalili, R. .A Secure Architecture for Software Defined Radio., Proceedings of the
Second International Symposium on Telecommunication (IST2003), Isfahan, Iran, pp. , 2003.
Jalili, R. , Heydari, M.A. and Fooladgar, M. .Obstacles and Approaches to Improve The Cyberspace
Security from The Operating System Point of View., Proceedings of the Operating System and Security
Conference, Sharif University of Technology, Tehran, Iran, 2003.
Jalili, R. , Hadavi, A. and Ale-Sheykh, R. .Review of the World Countries to the Open Source
Phenomenon., Proceedings of the Operating System and Security Conference, Sharif University of
Technology, Tehran, Iran, 2003.
Jalili, R. , Ale-Sheykh, R. and Hadavi, A. .Operating System Security: Concepts, Current Research, and
New Approaches., Proceedings of the Operating System and Security Conference, Sharif University of
Technology, Tehran, Iran, 2003.
Ranjbar, A., Makarem, M.S., Jalili, R. And Bakht, M. .On Enhancing of Operating System Security Via
Security Frameworks., Proceedings of the Operating System and Security Conference, Sharif University of
Technology, Tehran, Iran, 2003.
Jalili, R. , and Adelkhah, B, "Design and Implementation of A Specification-based Intrusion Detection
System., Proceedings of the 8th Annual Iranian Computer Society Conference (ICSC'2003), Ferdowsi
University of Mashhad, Iran, pp.576-591, 2003.
Jalili, R. , and Hosseyni, S. M. "SFRED: An Algorithm for Dynamic Queue Management in Firewall.,
Proceedings of the 8th Annual Iranian Computer Society Conference (ICSC'2003), Ferdowsi University of
Mashhad, Iran, pp.142-149, 2003.
Jalili, R. , and Rezvani, M, "Specification and Verification of Security Policies in Firewalls.,
Lecture Notes in Computer Science # 2510, Springer, 2002, pp. 154-163. 2002.
Jalili, R. , and Rezvani, M, "Analysis and Verification of Security Policy in Firewalls. Proceedings of
the 7th Annual Iranian Computer Society Conference (ICSC'2002), Iran Telecommunication Center, pp.
339-345, 2002.
Jalili, R. , and Niamanesh, M. "Attack and Fault Tolerance Through Dependable Middleware. Proceedings
of the Seventh Annual Iranian Computer Society Conference (ICSC'2002), Iran Telecommunication Center,
pp. 365-372, 2002.
Jalili, R. , and Heydari, M. A. "Quality of Service in Virtual Private Networks. Proceedings of the
First Iranian Cryptography Conference, Imam Hossein University, Tehran, Iran, pp.221-235, 2002.
Jalili, R. Samadi, M., and Shahriari, H. R. "FireHack: A Tool for Firewalls Security Evaluation.
Proceedings of the First Iranian Cryptography Conference, Imam Hossein University, Tehran, Iran, pp.
73-82, 2002.
Jalili, R. and Rezvani, M. "High Level Security Policy Specification in Firewalls., Proceedings of the
First Iranian Cryptography Conference, Imam Hossein University, Tehran, Iran, pp. 105-116, 2002.
Jalili, R. and PourReza, H. et al "Hadid Firewall, toward an Integrated Secure Computer Networks.,
Proceedings of the 1st Iranian Military Information Dissemination, Tehran, I271-286, 2001.
Jalili, R. and YusefZadeh, H. "Statefulness and Address Translation in a Packet Filter., Proceedings of
the Sixth Annual Iranian Computer Society Conference (ICSC'2001), University of Isfahan, Isfahan, Iran,
pp. 491-500, 2001.
Jalili, R. and Feili, H. "An Evaluation of Concurrency Control Mechanisms in Database Systems",
Proceedings of the Fifth Iranian Computer Society Conference (ICSC'2000), Shahid Beheshti University,
Tehran, Iran, pp. 113-123, 2000.
Jalili, R. and Pirayesh, A. R. "Persistance in the Sharif Operating System ", Proceedings of the Fourth
Iranian Computer Society Conference (ICSC'98), Sharif University of Technology, Tehran, Iran, pp. 71-80,
1998.
Jalili, R. and Sadri, B. and Lavassani, M. "NFS Version 3 Implementation and Optimization: Our
Experience on Linux", Proceedings of the Third Iranian Computer Society Conference (ICSC'97), Iran
University of Science and Technology, Tehran, Iran, pp. 119-125, 1997.
Jalili, R. and Salek, A.."Protection in the Sharif Operating System", Proceedings of the Third Iranian
Computer Society Conference (ICSC'97), Iran University of Science and Technology, Tehran, Iran, pp.
244-250(F),1997.
Jalili, R. and Zare, R."POURIA: A Persistent Extension to C++", Proceedings of the Second Iranian
Computer Society Conference (ICSC'96), Amir Kabir University of Technology, Tehran, Iran, pp. 1-8,1996.
Jalili, R. and Henskens, F. A."Stable-Copy Replication of Highly Available Stable Distributed
Persistent Stores", Proceedings of the Second Iranian Computer Society Conference (ICSC'96), Amir Kabir
University of Technology, Tehran, Iran, pp. 78-86,1996.
Jalili, R. and Henskens, F. A."Management of Inter-Entity Dependencies using Directed Dependency
Graphs", Proceedings of the First Iranian Computer Society Conference (ICSC'95), Sharif University of
Technology, Tehran, Iran, pp. 210-218,1995.
Heskens, F. A., Koch, D. M., Jalili, R. , Rosenberg, J. "Hardware Support for Stability in a Persistent
Architecture", Proceedings of the 6th International Workshop on Persistent Object Stores, Tarascon,
France, Springer-Verlag, pp. 387-399, 1994.
Jalili, R. and Henskens, F. A. "Reducing the Extent of Cascadable Operations in Stable Distributed
Persistent Stores", Proceedings of the 18th Australian Computer Science Conference (ACSC'95), Adelaide,
Australia, vol 1, pp. 227-236, 1995.
Jalili, R. and Henskens, F. A. "Operating System Support for Object Dependencies in Persistent Object
Stores", Proceedings of the Workshop on Object-Oriented Real-Time Dependable Systems (WORDS'94), Dana
Point, California, IEEE Computer Society Press, pp. 21-29, 1994.
Seyyed Ahmad Javadi, Morteza Amini, and Rasool Jalili, "Non-monotonocity in OrBAC Through Default and
Exception Policy Rules", In Proceedings of the 9th International ISC Conference on Information Security
and Cryptology, pp. 87-94, 2012, Tabriz, Iran.
Mahdi Alizadeh, Seyyed Ahmad Javadi, Morteza Amini, and Rasool Jalili, "Policy Specification and
Enforcement in Online Social Networks Using MKNF, In Proceedings of the 9th International ISC Conference
on Information Security and Cryptology, pp. 48-53, 2012, Tabriz, Iran.
Majid Arasteh, Morteza Amini, and Rasool Jalili, "A Trust and Reputation-based Access Control Model for
Virtual Organizations", In Proceedings of the 9th International ISC Conference on Information Security
and Cryptology, pp. 121-127, 2012, Tabriz, Iran.
Fathieh Faghih, Morteza Amini, and Rasool Jalili, "Specification of History Based Constraints for Access
Control in Conceptual Level", In Proceedings of the 6th International Conference on Information Systems
Security (ICISS10), Lecture Notes in Computer Science (LNCS), Vol. 6503, pp. 186-200, 2010 Gandhinaga,
India.
Fathieh Faghih, Morteza Amini, and Rasool Jalili, "A Temporal Description Logic Based Access Control
Model for Expressing History Constrained Policies in Semantic Web Environments", In Proceedings of the
IEEE Workshop on Policies for Distributed Systems and Networks, 2009, London, UK.
Mousa A. Ehsan, Morteza Amini, Rasool Jalili, "Handling Context in a Semantic-based Access Control
Framework", In Proceedings of the 5th International Symposium on Frontiers of Information Systems
and Network Applications (FINA09) to be held with the IEEE 23rd International Conference on Advanced
Information Networking and Applications(AINA'09)2009, Bradford, UK.
Moussa A. Ehsan, Morteza Amini, and Rasool Jalili, "A Semantic-based Access Control
Mechanism Using Semantic Technologies", Accepted in the 2nd International Conference on Security of
Information and Networks (SIN 2009), 2009, Gazimagusa, North Cyprus.
Morteza Amini, Rasool Jalili, "A Calculus for Composite Authorities' Policy Derivation in Shared Domains
of Pervasive Computing Environments", In Proceedings of the IEEE International Workshop on Internet and
Distributed Computing Systems (IDCS 2008), 2008, Bangladesh
Ali Noorollahi, Morteza Amini, Rasool Jalili, Jafar Haadi Jafarian, Ravari, "A History Based Semantic Aware Access Control Model Using Logical Time Approach",In Proceedings of the IEEE International Workshop on Internet and Distributed Computing Systems (IDCS 2008), 2008, Bangladesh.
Mousa A. Ehsan, Morteza Amini, and Rasool Jalili, "Using Semantic Annotation in Designing Security Mechanisms Based on MA(DL)^2 Semantic-Aware Model", In Proceedings of the 5th International ISC Conference on Information Security and Cryptology (ISCISC08), 2008, Tehran, Iran.
Hamid Reza Anvari, Asghar Asl-e Asgharian, Morteza Amini, and Rasool Jalili, "Access Control in Updating XML Documents using Static Analysis", In Proceedings of the 5th International ISC Conference on Information Security and Cryptology (ISCISC08), 2008, Tehran, Iran.
Jafar Haadi Jafarian, Morteza Amini, and Rasool Jalili, "A Context-Sensitive Information Flow Control Model", In Proceedings of the 5th International ISC Conference on Information Security and Cryptology (ISCISC08), 2008, Tehran, Iran.
Ali Noorollahi Ravari, Morteza Amini, and Rasool Jalili, "Using Logical Time and Semantics in a History-Based Access Control Model", In Proceedings of the 5th International ISC Conference on Information Security and Cryptology (ISCISC08), 2008, Tehran, Iran.
Jafar Haadi Jafarian, Morteza Amini, and Rasool Jalili, "A Context-Aware Mandatory Access Control Model for Multilevel Security Environments", In Proceedings of the 27th International Conference on Computer Safety, Reliability and Security (SafeComp 2008), 2008, Newcastle, UK.
Ali Noorollahi, Morteza Amini, and Rasool Jalili, "A Semantic Aware Access Control Model with Real Time Constraints on History of Accesses",In Proceedings of the International Multiconference on Computer Science and Information Technolog, 2008, Wisla, Poland.
Zeinab Iranmanesh, Morteza Amini, and Rasool Jalili, "A Logic for Inclusion of Administrative Domains and Administrators in Multi-Domain Authorization", In Proceedings of the Global e-Security International Conference (ICGeS08), pp. 190-199, UK, April 2008.
Mohsen Taherian, Morteza Amini, and Rasool Jalili, "A Semantic-Aware Ontology-Based Trust Model for Pervasive Computing Environments", In Proceedings of the 5th International Conference on Autonomic and Trusted Computing (ATC-08), pp. 47-59, 2008, Oslo, Norway.
Zeinab Iranmanesh, Morteza Amini, and Rasool Jalili, "A Logic for Multi-Domain Authorization Considering Administrators", In Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY08), pp. 189-198, 2008, NY, USA.
Mohsen Taherian, Morteza Amini, and Rasool Jalili, "Trust Inference in Web-Based Social Networks using Resistive Networks", In Proceedings of the 3rd IEEE International Conference on Internet and Web Applications and Services (ICIW08), pp. 233-238,2008, Athens, Greece,.
Ali Noorollahi Raavari, Morteza Amini, and Rasool Jalili, "Temporal Semantic based Access Control Model", In Proceedings of the 13th International CSI Computer Conference (CSICC 08), March 2008, Kish Island, Persian Gulf, Iran.
Jafar Hadi Jafarian, Morteza Amini, and Rasool Jalili, "A Dynamic Mandatory Access Control Model", In Proceedings of the 13th International CSI Computer Conference (CSICC 08), March 2008, Kish Island, Persian Gulf, Iran.
Mohsen Taherian, Rasool Jalili, and Morteza Amini, "PTO: A Trust Ontology for Pervasive Environments", In Proceedings of the IEEE 22nd International Conference on Advanced Networking and Applications (AINA08), pp. 301-306, March 2008, Ginowan, Okinawa, Japan.
Morteza Amini, and Rasool Jalili, "Specification and Inference of Authorization and Obligation Policies Using Deontic Logic for Semantic-Aware Environments", In Proceeding of the 4th Iranian Society of Cryptology Conference (ISCC07), pp. 175-184, Oct 2007, Tehran, Iran.
Mohsen Taherian, Morteza Amini, and Rasool Jalili, "An Ontology based Trust Model for Pervasive Computing Environments", In Proceedings of the 4th Iranian Society of Cryptology Conference (ISCC07), pp. 165-174, Oct 2007, Tehran, Iran.
Sareh Sadat Emami, Morteza Amini, and Sadaan Zokaei, "A Context-Aware Access Control Model for Pervasive Computing Environments", In Proceedings of the IEEE International Conference on Intelligent Pervasive Computing (IPC 07), pp. 51-56, Oct 2007, Jeju Island, Korea.
Hassan Takabi, Morteza Amini, and Rasool Jalili, "Separation of Duty in Role-Based Access Control Model through Fuzzy Relations", In Proceedings of the 3rd International Symposium on Information Assurance and Security (IAS 07), IEEE Computer Society, 2007, Manchester, UK.
Hassan Takabi, Morteza Amini, and Rasool Jalili, "Enhancing Role-Based Access Control Model through Fuzzy Relations", In Proceedings of the 3rd International Symposium on Information Assurance and Security (IAS 07), IEEE Computer Society, 2007, Manchester, UK.
Amir Reza Masoumzadeh, Morteza Amini, and Rasool Jalili, "Conflict Detection and Resolution in a Context-Aware Authorization System", In Proceedings of the 3rd IEEE Symposium on Security in Networks and Distributed Systems (SSNDS07), pp. 505-511, May 2007, Niagara Falls, Canada.
Hassan Takabi, Morteza Amini, and Rasool Jalili, "Fuzzy Relation Equation for Role Based Access Control Model", In Proceedings of the ACS/IEEE International Conference on Computer Systems and Applications (AICCSA07), pp. 807-814, May 2007, Amman, Jordan.
Sara Javanmardi, Morteza Amini, and Rasool Jalili, "An Access Control Model for Protecting Semantic Web Resources", In Proceedings of the 2nd International Semantic Web Policy Workshop (SWPW06), pp. 32-46, 2006, Athens, GA, USA. [PDF]
Sara Javanmardi, Morteza Amini, Rasool Jalili, and Yaser Ganjisaffar, "SBAC: A Semantic Based Access Control Model", In Proceedings of the 11th Nordic Workshop on Secure IT-Systems Conference (NordSec06), pp. 157-168, Linkping, Sweden. [PDF]
Amir Reza Masoumzadeh, Morteza Amini, and Rasool Jalili, "Context-Aware Provisional Access Control", In Proceedings of
the 2nd International Conference on Information Systems Security
(ICISS06), Lecture Notes in Computer Science (LNCS), Vol. 4332, pp. 132-146, July 2006, Kolkata, India. [PDF]
A. Omrani, Sareh Sadat Emami, Morteza Amini, "Access Control Based on Context and History in Pervasive Computing Environments", In Proceedings of the 9th Iranian Students Conference on Electrical Engineering, 2006, Tehran, Iran.
Rasool Jalili, Fatemeh Imani-Mehr, and Morteza Amini, "SPUNNID:
A New Approach in Detecting Distributed Denial of Service Attacks using
Combination of Statistical Approaches and Unsupervised Neural Networks", In Proceedings of the 10th Computer Society of Iran Computer Conference, CSICC2005, Iran, 2005. [PDF-Persian]
Morteza Amini, and Rasool Jalili, "Network-Based Intrusion Detection Using Unsupervised Adaptive Resonance Theory (ART)", In Proceedings of the 4th Conference on Engineering of Intelligent Systems (EIS 2004), Madeira, Portugal, 2004. [PDF]
Rasool Jalili,and Morteza Amini, "ART Neural Net based Intrusion Detection System", In Proceedings of the 5th Conference on Intelligent Systems (CIS 2003), Mashhad, Iran, 2003. [PDF-Persian]
Keyvan Ashouri, Morteza Amini, Mohammad Hassan Savoji, "Non-linear Prediction of Speech Signal Using Artificial Neural Nets", In Proceedings of the First EurAsian Conference on Advances in Information and Communication Technology (EurAsia-ICT 2002), pp. 212-219, Shiraz, Iran, 2002. [PDF]