Journal:

  1. Mohammadi-Nodooshan, A., Darmani, Y., Jalili, R. , Nourani, M. and Sayad Haghighi, M. " A Robust and Efficient SIP Authentication Scheme", Accepted for publication in Scientia Transactions on Computer Science and Engineering, 2009.
  2. Asadpour, M. and Jalili, R. .Double Voting Problem of some Anonymous E-Voting Schemes., Journal of Information Science and Engineering (JISE), Vol. 25, pp. 895-906, 2009.
  3. Niamanesh, M. and Jalili, R. .DRAPS: A Framework for Dynamic Reconfigurable Protocol Stacks., Journal of Information Science and Engineering (JISE), Vol. 25, pp. 827-841, 2009.
  4. Niamanesh, M. and Jalili, R. .A Framework for Automatic Reconfigurations of Protocol Stacks in Ubiquitous Computing Systems., Ubiquitous Computing and Communication Journal, Vol. 4, No. 3, pp. 758-769, 2009.
  5. Niamanesh, M. and Jalili, R. .A Solution for Backward-Compatible Reconfigurations of Running Protocol Components in Protocol Stacks., Ubiquitous Computing and Communication Journal, Vol. 4, No. 3, pp. 784-793, 2009.
  6. Shahriari, H.R. Ganji-Saffar, Y., Jalili, R. , Habibi, J. .An Expert System for Automatic Multi-Host Network Vulnerability Analysis., Journal of Information Science and Engineering (JISE), Vol. 24, No. 3; March 2008.
  7. Shahriari, H.R., Makarem, M.S., Sirjani, M., Jalili, R. and Movaghar, A. .Vulnerability Analysis of Networks to Detect Multiphase Attack Using the Actor-based Language Rebeca., Elsevier Computers & Electrical Engineering journal, In Press, Available Online 2008.
  8. Amini, M., Jalili, R. , and Shahriari, H.R. .RT-UNNID: A Practical Solution to Real-Time Network-Based Intrusion Detection Using Unsupervised Neural Networks., Elsevier Computers and Security Journal, Vol. 25, No. 6. Sept. 2006.
  9. Shahriari, H.R. and Jalili, R. .Vulnerability Take Grant (VTG): An Efficient Approach to Analyze Network Vulnerabilities., Elsevier Computers and Security Journal, Vol. 26, No. 5. Sept. 2006.
  10. Yusefi, A., Jalili, R. and Niamanesh, M. .Multi-Determiner Protection of Private Data in Pervasive Computing Environments., IJCSNS International Journal of Computer Science and Network Security, Dec. 2006.
  11. Rafiei, M.E., Jalili, R. and Moosavi, H. .Vulnerability Analysis trough a Graph-based Protection System., IJCSNS International Journal of Computer Science and Network Security, Dec. 2006.
  12. Payload Attribution via Character Dependent Multi-Bloom Filters, M.H. Haghighat, M. Tavakoli, M. Kharrazi, IEEE Transactions on Information Forensics and Security, Volume 8, Issue 5, 2013.[BibTex]
  13. Improving Computer Networks Course Using the Partov Simulation Engine, B. Momeni, M. Kharrazi, IEEE Transactions on Education, Volume 55, Issue 3, August 2012.[BibTex]
  14. The partov source code is being released under GPLv3. If you are interested in obtaining the code, please contact me.
  15. Performance Study of Common Image Steganography and Steganalysis Techniques, M. Kharrazi, H. T. Sencar, N. Memon, Journal of Electronic Imaging, Volume 15, Issue 4, October-December 2006. [BibTex]
  16. Improving Steganalysis by Fusion Techniques: A Case Study with Image Based Steganography, M. Kharrazi, H. T. Sencar, N. Memon, LNCS Transactions on Data Hiding and Multimedia Security I, Volume 4300, 2006. [BibTex]
  17. Image Steganalysis with Binary Similarity Measures, I. Avcibas, M. Kharrazi, N. Memon, B. Sankur, EURASIP Journal on Applied Signal Processing, vol. 2005, no. 17, 2005. [BibTex]
  18. Data Masking: A New Approach for Steganography?, R. Radhakrishnan, M. Kharrazi, N. Memon, The Journal of VLSI Signal Processing, Volume 41, Number 3, November 2005. [BibTex]
  19. Image Steganography: Concepts and Practice, M. Kharrazi, H. T. Sencar, N. Memon, Lecture Notes Series, Institute for Mathematical Sciences, National University of Singapore, 2004. [BibTex]
  20. Morteza Amini, Rasool Jalili, Mousa Amir Ehsan, and Fathyieh Faghih, Cooperative Security Administration in Multi-Domain Environments Using a Variant of Deontic Logic, Scientia Iranica, Transaction on Computer Science & Engineering and Electrical Engineering, Vol. 19, No 3, pp. 635-653, June 2012.
  21. Morteza Amini, Rasool Jalili,A Multi-Level Authorization Model and Framework for Distributed Semantic-Aware Environments, IET Information Security, Special Issue on Multi-Agent and Distributed Information Security, Vol. 4, No 4, pp. 301-321, Dec. 2010.
  22. Ali Noorollahi Ravari, Jafar Haadi Jafarian, Morteza Amini and Rasool Jalili, "GTHBAC: A Generalized Temporal History Based Access Control Model", Springer Telecommunication Systems, Vol. 45, No 2-3, pp. 111-125, Oct. 2010
  23. Jafar Haadi Jafarian and Morteza Amini, CAMAC: A Context-Aware Mandatory Access Control Model, ISeCure- The ISC International Journal of Information Security, Vol. 1, No 1, pp. 35-54, January 2009.
  24. Morteza Amini, Rasool Jalili, Hamid-Reza,Shahriari, RT-UNNID: A Practical Solution to Real-Time Network-Based Intrusion Detection Using Unsupervised Neural Networks, Computers and Security, Vol. 25, No 6, pp. 459-468, Sep. 2006[PDF]

    Conference:

  1. Karimi, M., Hadavi, A. and Jalili, R. "A Secure Range Query Enabled Approach for Encrypted XML Documents", Proceedings of the 6th ISC International Conference on Information Security and Cryptology (ISCISC 2009), pp. 13-22, Isfahan, 2009.
  2. Dousti, M.S., AmirHaeri, M.and Jalili, R. "Privacy-Preserving Single Layer Perceptron", Proceedings of the 6th ISC International Conference on Information Security and Cryptology (ISCISC 2009), pp. 31-38, Isfahan, 2009.
  3. Asl-Asgharian, A., Dousti, M.S. and Jalili, R. "An Efficient DC-Net Based Anonymous Message Transmission Protocol", Proceedings of the 6th ISC International Conference on Information Security and Cryptology (ISCISC 2009), pp. 23-30, Isfahan, 2009.
  4. AmirHaeri, M. and Jalili, R. "RTEAS: A Real-Time Algorithm for Extracting Attack Scenarios from Intrusion Alert Stream", Proceedings of the 6th ISC International Conference on Information Security and Cryptology (ISCISC 2009), pp. 40-47, Isfahan, 2009.
  5. Sadighian, A. and Jalili, R. "AFMAP: Anonymous Forward-Secure Mutual Authentication Protocols for RFID Systems", Proceedings of the Third International Conference on Emerging Security Information, Systems and Technologies-SecureWare 2009, Greek, pp. 31-36, 2009.
  6. ShirAliNia, A. and Jalili, R. .The Data Affecting Model for Detecting Source Code Security Vulnerabilities., Proceedings of the 5th ISC International Conference on Information Security and Cryptology (ISCISC 2008), Tehran, 2008.
  7. Mansoori, F. and Jalili, R. .A Method for Query Processing On Encrypted String Data., Proceedings of the 5th ISC International Conference on Information Security and Cryptology (ISCISC 2008), Tehran, 2008.
  8. Sadighian, A.R. and Jalili, R. .FLMAP: A Fast Lightweight Mutual Authentication Protocol for RFID System., Proceedings of the 16th IEEE International Conference on Networks (ICON 2008), India, 2008.
  9. Niamanesh, M. and Jalili, R. .A Formalism for Reconfigurability Analysis in Distributed Non- Blocking Components., Proceedings of the 28th International Conference on Distributed Computing Systems (ICDCS-08), China, 2008.
  10. Abasi-Moghadam, S., Shah-Karami, A. and Jalili, R. .Mapping of Access Control Models in XML-Based DataBases Using Anthology Based Mapping in Semantic Web., Proceedings of the 13th CSI National Computer Conference (CSICC2008), Kish Island, IRAN, 2008.
  11. Saremi, F., Mashayekhi, H., Jalili, R. , and Movaghar, A. .CEBAC: A Decentralized Cooperation Enforcement Based Access Control Framework in MANETs., Proceedings of the 13th CSI International Computer Conference (CSICC2008), Kish Island, IRAN, 2008.
  12. Mohammadi-Nodooshan, A. Darmani, Y. Jalili, R. and Nourani, M. .A Robust and Efficient SIP Authentication Scheme., Proceedings of the 13th CSI International Computer Conference (CSICC2008), Kish Island, IRAN, 2008.
  13. Mohammadi-Nodooshan, A. Darmani, Y. Jalili, R. and Nourani, M. .A Robust and Efficient SIP Authentication Scheme., Proceedings of the 13th CSI International Computer Conference (CSICC2008), Kish Island, IRAN, 2008.
  14. Hemmati, H. and Jalili, R. .Self-Reconfiguration in Highly Available Pervasive Computing Systems., Proceedings of the International Conference on Autonomic and Trusted Computing (ATC-08) (LNCS 5060), Netherland, 2008.
  15. Taherian, M. and Jalili, R. .An Anthology-based and Sematic-Aware Trust Model for Pervasive Computing Environments., Proceedings of the Forth Iranian Society of Cryptography Conference (ISCC2007), IRAN, 2007.
  16. Golyaei, S. and Jalili, R. .A Certificate Based Client Based Access Control Model and its Associating Policy Description Language., Proceedings of the Forth Iranian Society of Cryptography Conference (ISCC2007), IRAN, 2007.
  17. Amini, M. and Jalili, R. .Specification and Inference of Access Policies and Obligations Based on The Deontic Logics in Semantic-Aware Environments., Proceedings of the Forth Iranian Society of Cryptography Conference (ISCC2007), IRAN, 2007 (The Best Paper Award).
  18. Takabi, H, Amini, M. and Jalili, R. .Separation of Duty in Role- Based Access Control Model through Fuzzy Relations., Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007 (Published by IEEE), UK, 2007.
  19. Niamanesh, M. and Jalili, R. .A Dynamic-Reconfigurable Architecture for Protocol Stacks of Networked Systems., Proceedings of the 31st IEEE Computers, Software, and Applications Conference (COMPSAC 2007), China, 2007.
  20. Niamanesh, M. Sabet-Ghadam, S., Yusefzadeh, R. and Jalili, R. .Design and Implementation of a Dynamic Reconfigurable Architecture for Protocol Stack., Proceedings of the IPM International Workshop on Foundations of Software Engineering (FSEN 2007.) (LNCS 4767), Tehran, IRAN, 2007.
  21. Niamanesh, M. and Jalili, R. .Formalizing Assured Dynamic Reconfiguration in Protocols., Proceedings of the IPM International Workshop on Foundations of Software Engineering (FSEN 2007.) (LNCS 4767), Tehran, IRAN, 2007.
  22. Rafiei, M. E. Taherian, M., Moosavi, H., Movaghar, A. and Jalili, R. .Vulnerability Analysis in VGBPS using Prolog., Proceedings of the IPM International Workshop on Foundations of Software Engineering (FSEN 2007.) (LNCS 4767), Tehran, IRAN, 2007.
  23. Shahriari, H.R. and Jalili, R. .Formal Definition and Categorization of Vulnerabilities using Take-Grant Protection Model., Proceedings of the 12th CSI International Computer Conference (CSICC2007), Tehran, IRAN, 2007.
  24. Hafez-Ghorani, S., SAdeghian, B., Jalili, R. , and Tarameshloo, E. .A method for Implementation of ARBAC97 in Relational DBMSs., Proceedings of the 12th CSI International Computer Conference (CSICC2007), Tehran, IRAN, 2007.
  25. Jalaei, R., Shahriari, H.R., and Jalili, R. .Analysis of Combinational Attacks to Networks Using Attack Graphs., Proceedings of the 12th CSI International Computer Conference (CSICC2007), Tehran, IRAN, 2007.
  26. Yusefi, A., Jalili, R. , and Niamanesh, M. .A Multi-Determiner Privacy Protection System for Pervasive Computing Environments., Proceedings of the 12th CSI International Computer Conference (CSICC2007), Tehran, IRAN, 2007.
  27. Mokhtarian, K., Jalili, R. , and Shahriari, H.R. .Quantitative Evaluation of Network Security Using Fuzzy Privilege Graph., Proceedings of the 12th CSI International Computer Conference (CSICC2007), Tehran, IRAN, 2007.
  28. Gerani, Sh. Shahriari, H.R., Saberi, M. and Jalili, R. .Modelling and Analysis of Firewall Vulnerabilities Using VTG., Proceedings of the 12th CSI International Computer Conference (CSICC2007), Tehran, IRAN, 2007.
  29. Rafiei, M. E. and Jalili, R. .Decidability of the Safety Problem in the VGBPS Protection System., Proceedings of the 12th CSI International Computer Conference (CSICC2007), Tehran, IRAN, 2007.
  30. Takabi, H, Amini, M. and Jalili, R. .Trust-Based User-Role Assignment in Role-Based Access Control., Proceedings of The 2007 ACS/IEEE International Conference on Computer Systems and Applications (AICCSA .2007), Jordan, 2007.
  31. Masoum-Zadeh, A., Amini, M. and Jalili, R. .Conflict Detection and Resolution in Context-Aware Authorization., Proceedings of the The IEEE 21st International Conference on Advanced Information Networking and Applications (AINA- 2007), Canada, 2007.
  32. SattarZadeh, B., AsadPour, M. and Jalili, R. .Enhanced Smart-Card-Based Authentication Scheme Providing Forward- Secure Key Agreement., Proceedings of the International Conference on New Technologies, Mobility and Security (NTMS'2007), France, 2007.
  33. SattarZadeh, B., AsadPour, M. and Jalili, R. .Improved User Identity Confidentiality for UMTS Mobile Networks., Proceedings of the 4th European Conference on Universal Multiservice Networks, ECUMN'2007, France, 2007.
  34. Jalaei, R., Shahriari, H.R., and Jalili, R. .Generating and Analyzing Attack Graphs through Vulnerability Take Grant Model., Proceedings of the International Conference on Network Security- ICONS2007, India, 2007.
  35. Masoum-Zadeh, A., Amini, M. and Jalili, R. .Context Aware Access Control through Provisional Authorization., Proceedings of the 2nd International Conference on Information System Security (ICISS 2006), India, Dec. 2006.
  36. Javanmardi, S., Hemmati, H. and Jalili, R. .An Access Control Framework for Pervasive Computing Environments. Proceedings of the 2006 International Conference on Pervasive Systems & Computing PSC'06, Monte Carlo Resort, Las Vegas, Nevada, USA, June 26-29, 2006.
  37. Javanmardi, S., Amini, M. Jalili, R. , and Ganji-Saffar, Y. .SBAC: "A Semantic-Based Access Control Model. Proceedings of the NORDSEC-2006, Sweden, October 2006.
  38. Javanmardi, S., Amini, M. and Jalili, R. .An Access Control Model for Protecting Semantic Web Resources., Proceedings of the Semantic Web Policy Workshop, Athens, GA, USA, November 5, 2006.
  39. SattarZadeh, B., AsadPour, M. and Jalili, R. .Security Enhancement for A Low Computation Cost User Authentication Scheme., Proceedings of the International Conference on Security and Cryptography (SECRYPT2006), Portugal, August 2006.
  40. Ganji Saffar, Y., Abolhassani, H. and Jalili, R. .An Architecture for a Context-aware Service Broker in Ubiquitous Computing Environments., Proceedings of the International Workshop on Pervasive Computing Systems & Application (PerCSA 2006) of the ACS/IEEE AICCSA-06 Conference, Dubai/Sharjeh, 2006.
  41. Zakeri, R., Abolhassani, H., Shahriari, H.R. and Jalili, R. .Using Description Logics for Network Vulnerability Analysis., Proceedings of the 5th International Conference on Networking ICN'06, IEEE Computer Society Press, Mauritius 2006.
  42. Sajedi, H., Jalili, R. , and Niamanesh, M., .Using Intelligent Agents for Automatic Selection of Services in Dynamic Wireless Networks., Proceedings of the 11th CSI Computer Conference (CSICC2006), pp. 1003-1006 (The Farsi Volume), IPM, Tehran, 2006.
  43. Omidian, A., Shahriari, H.R., and Jalili, R. , .Modeling of Computer Network Vulnerabilities Using Petri-Nets., Proceedings of the 11th CSI Computer Conference (CSICC2006), pp. 935-938 (The Farsi Volume), IPM, Tehran, 2006.
  44. Fekrazad Nobakht, N., Niamanesh, M., Hemmati, H., and Jalili, R. , .A Graph-Based Mechanism for State Transfer in Dynamic Reconfiguration of Component-Based Programs., Proceedings of the 11th CSI Computer Conference (CSICC2006), pp. 436-444 (The Farsi Volume), IPM, Tehran, 2006.
  45. Niamanesh, M., Heydarian, F. and Jalili, R. .Runtime Validity of Dynamic Reconfiguration in Component-Based Programs., Proceedings of the 11th CSI Computer Conference (CSICC2006), pp. 613-617 (The English Volume), IPM, Tehran, 2006.
  46. Shahriari, H.R., and Makarem, M.S., Sirjani, M., Jalili, R. and Movaghar, A. .Modeling and Verification of Complex Network Attacks Using and Actor-Based Language., Proceedings of the 11th CSI Computer Conference (CSICC2006), pp. 152-158 (The English Volume), IPM, Tehran, 2006.
  47. Zakeri, R., Jalili, R. and Shahriari, H.R. .Using Description Logics For Man In The Middle Attack Analysis., Proceedings of the 11th CSI Computer Conference (CSICC2006), pp. 512-515 (The English Volume), IPM, Tehran, 2006.
  48. Shahriari, H.R., Sadoddin, R., Jalili, R. , Zakeri, R. and Omidian, A.R. .Network Vulnerability Analysis through Vulnerability Take- Grant Model (VTG)., Proceedings of the 7th International Conference on Information and Communications Security(ICICS2005), pp. 256-268 LNCS# 3783, 2005.
  49. Hemmati, H., Niamanesh, M. Jalili, R. .A Framework to Support Run-Time Assured Dynamic Reconfiguration for Pervasive Computing Environments., Proceedings of the First International Symposium on Wireless Pervasive Computing (ISWPC-2006), pp. 273-277, Thailand, 2006.
  50. Hemmati, H., Aliakbarian , S., Niamanesh, M. Jalili, R. .Structural and Behavioral Run-Time Validation of Dynamic Reconfiguration in Pervasive Computing Environments., Proceedings of the 4th Asian International Mobile Computing Conference AMOC, India, 2006.
  51. Asadzadeh, K., Niamanesh, M. Jalili, R. .A Composition Function Model for Software Reconfiguration Propagation in a Network of Systems., Proceedings of the 9th World Multi- Conference on Systemics, Cybernetics and Informatics (WMSCI2005), Orlando, Florida, 2005.
  52. Niamanesh, M., Heidarian Dehkordi, F., Fekrazad Nobakht, N, Jalili, R. , .On Validity Assurance of Dynamic Reconfiguration for Component-based Programs., Proceedings of the IPM International Workshop on Foundations of Software Engineering (Theory And Practice) FSEN 2005, Tehran, Iran, 2005.
  53. Shahriari , H.R., Sadoddin, R. , Jalili, R. , Zakeri, R. and Omidian, R. .Vulnerability Analysis through Vulnerability Take-Grant Model (VTG)., Proceedings o f the 7th International Conference on Information and Communications Security (ICICS2005), China, 2005.
  54. Shahriari , H.R. and Jalili, R. "Modeling and Analyzing Network Vulnerabilities via a Logic-Based Approach., Proceedings of the 2nd International Symposium of Telecommunications (IST2005), Shiraz, Iran ,2005.
  55. Zakeri, R., Shahriari , H.R., Jalili, R. and Sadoddin, R. .Modeling TCP/IP Networks Topology for Network Vulnerability Analysis., Proceedings of the 2nd International Symposium of Telecommunications (IST2005), Shiraz, Iran , 2005.
  56. Shahriari , H.R. GanjiSaffar, Y. and Jalili, R. "An Approach to Analyzing Network Vulnerabilities based on the Topology Relations., Proceedings of the 3rd Iranian Society of Cryptography Conference (ISCC2005), pp. 273-284, Isfahan, Iran, 2005.
  57. Shahriari , H.R. Sadoddin, R. and Jalili, R. .Network Vulnerability Analysis based on the Take-Grant Protection Model: A Proof of the Concept., Proceedings of the 3rd Iranian Society of Cryptography Conference (ISCC2005), pp. 261-272, Isfahan, Iran, 2005.
  58. Shahriari , H.R. and Jalili, R. .Modeling of Network Security- Related Behaviors Using NVML., Proceedings of the 8th IEEE International Multi-topic conference (INMIC 2004), Lahur, Pakistan, 2004.
  59. Shahriari , H.R. and Jalili, R. .Using CSP To Model And Analyze Transmission Control Protocol Vulnerabilities Within The Broadcast Network., Proceedings of the International Networking and Communications Conference (INCC 2004), Lahur, Pakistan, 2004.
  60. Asadzadeh, K, Niamanesh, M. and Jalili, R. .A Combinational Function Based Model for Reconfiguration Propagation in Distributed Systems., Proceedings of the Second International Conference on Information and Knowledge Technology, Tehran, 2005.
  61. Ranjbar, A., Hemmati, H., Niamanesh, M. and Jalili, R. .Context Based Service Migration in Pervasive Computing., Proceedings of the Second International Conference on Information and Knowledge Technology, Tehran, 2005.
  62. Moghadam, M., Niamanesh, M. and Jalili, R. .Context Based Service Migration in Pervasive Computing., Proceedings of the Second International Conference on Information and Knowledge Technology, Tehran, 2005.
  63. Jalili, R. , Imani-Mehr, F. and Amini, M. .SPUNNID: A new Approach for Detection of DDoS Attacks Based on the Combination of Statistical Methods and Unsupervised Neural Networks., Proceedings of the 10th Annual Iranian Computer Society Conference, Tehran, 2005.
  64. Jalili, R. , Imani-Mehr, F. Amini, M. and Shahriari, H.R. .Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks,. Proceedings of International Conference on Information Security Practice and Experience, Singapore, LNCS 3439/2005, pp. 192-203, 2005.
  65. Ranjbar, A., Jalili, R. and Niamanesh, M. .Using Metropolitan Pervasive Environments Information in Predicting Continuous Location-Based Queries., Proceedings of the 10th Annual Iranian Computer Society Conference, Tehran, 2005.
  66. Samadi. M, Esmaeili, J. and Jalili, R. .A System for Identification and Misleading of Intruder in Computer Networks., Proceedings of the 10th Annual Iranian Computer Society Conference, Tehran, 2005.
  67. Jalili, R. and Niamanesh, M. .Modelling of Communication Protocol Stacks with Reconfigurable Capability., Sharif University of Technology Research Reports, Tehran, 2005.
  68. Jalili, R. and Amini, M. .Network Based Intrusion Detection Using Unsupervised Adaptive Resonance Theory (ART)., Proceedings of the Fourth International ICSC Symposium On Engineering Of Intelligent Systems (EIS 2004), Portugal, 2004.
  69. Jalili, R. and Amini, M. .An Intrusion Detection System Based on the ART Neural Networks., Proceedings of the Fifth Conference on Intelligent Systems (CIS 2003), Ferdowsi University of Mashhad, Mashhad, Iran, pp. , 2003.
  70. Jalili, R. and Amini, M. .An Intrusion Detection System Based on the ART Neural Networks., Proceedings of the Fifth Conference on Intelligent Systems (CIS 2003), Ferdowsi University of Mashhad, Mashhad, Iran, pp. , 2003.
  71. Ezati, N. and Jalili, R. .Improving Performance of the Internet Connections Inspection Through In-Kernel Application Proxies., Proceedings of the 9th Annual Computer Society of Iran Conference (CSICC2004), Sharif University of Technology, Tehran, Iran, pp. , 2004.
  72. Khansari-Nia, O. and Jalili, R. .A New Approach for Role Delegation in Distributed Environments Based on Role-Based Access Control., Proceedings of the 9th Annual Computer Society of Iran Conference (CSICC2004), Sharif University of Technology, Tehran, Iran, pp. , 2004.
  73. Khansari-Nia, O. and Jalili, R. .A Dynamic Access Control Model for Relational Database Systems., Proceedings of the Second Iranian Cryptography Conference (ISCC2003), Sharif University of Technology, Tehran, Iran, pp. , 2003.
  74. Jalili, R. and Amini, M. .An Intrusion Detection System Based on the ART Neural Networks., Proceedings of the Fifth Conference on Intelligent Systems (CIS 2003), Ferdowsi University of Mashhad, Mashhad, Iran, pp. , 2003.
  75. Niamanesh, M. and Jalili, R. .A Secure Architecture for Software Defined Radio., Proceedings of the Second International Symposium on Telecommunication (IST2003), Isfahan, Iran, pp. , 2003.
  76. Jalili, R. , Heydari, M.A. and Fooladgar, M. .Obstacles and Approaches to Improve The Cyberspace Security from The Operating System Point of View., Proceedings of the Operating System and Security Conference, Sharif University of Technology, Tehran, Iran, 2003.
  77. Jalili, R. , Hadavi, A. and Ale-Sheykh, R. .Review of the World Countries to the Open Source Phenomenon., Proceedings of the Operating System and Security Conference, Sharif University of Technology, Tehran, Iran, 2003.
  78. Jalili, R. , Ale-Sheykh, R. and Hadavi, A. .Operating System Security: Concepts, Current Research, and New Approaches., Proceedings of the Operating System and Security Conference, Sharif University of Technology, Tehran, Iran, 2003.
  79. Ranjbar, A., Makarem, M.S., Jalili, R. And Bakht, M. .On Enhancing of Operating System Security Via Security Frameworks., Proceedings of the Operating System and Security Conference, Sharif University of Technology, Tehran, Iran, 2003.
  80. Jalili, R. , and Adelkhah, B, "Design and Implementation of A Specification-based Intrusion Detection System., Proceedings of the 8th Annual Iranian Computer Society Conference (ICSC'2003), Ferdowsi University of Mashhad, Iran, pp.576-591, 2003.
  81. Jalili, R. , and Hosseyni, S. M. "SFRED: An Algorithm for Dynamic Queue Management in Firewall., Proceedings of the 8th Annual Iranian Computer Society Conference (ICSC'2003), Ferdowsi University of Mashhad, Iran, pp.142-149, 2003.
  82. Jalili, R. , and Rezvani, M, "Specification and Verification of Security Policies in Firewalls., Lecture Notes in Computer Science # 2510, Springer, 2002, pp. 154-163. 2002.
  83. Jalili, R. , and Rezvani, M, "Analysis and Verification of Security Policy in Firewalls. Proceedings of the 7th Annual Iranian Computer Society Conference (ICSC'2002), Iran Telecommunication Center, pp. 339-345, 2002.
  84. Jalili, R. , and Niamanesh, M. "Attack and Fault Tolerance Through Dependable Middleware. Proceedings of the Seventh Annual Iranian Computer Society Conference (ICSC'2002), Iran Telecommunication Center, pp. 365-372, 2002.
  85. Jalili, R. , and Heydari, M. A. "Quality of Service in Virtual Private Networks. Proceedings of the First Iranian Cryptography Conference, Imam Hossein University, Tehran, Iran, pp.221-235, 2002.
  86. Jalili, R. Samadi, M., and Shahriari, H. R. "FireHack: A Tool for Firewalls Security Evaluation. Proceedings of the First Iranian Cryptography Conference, Imam Hossein University, Tehran, Iran, pp. 73-82, 2002.
  87. Jalili, R. and Rezvani, M. "High Level Security Policy Specification in Firewalls., Proceedings of the First Iranian Cryptography Conference, Imam Hossein University, Tehran, Iran, pp. 105-116, 2002.
  88. Jalili, R. and PourReza, H. et al "Hadid Firewall, toward an Integrated Secure Computer Networks., Proceedings of the 1st Iranian Military Information Dissemination, Tehran, I271-286, 2001.
  89. Jalili, R. and YusefZadeh, H. "Statefulness and Address Translation in a Packet Filter., Proceedings of the Sixth Annual Iranian Computer Society Conference (ICSC'2001), University of Isfahan, Isfahan, Iran, pp. 491-500, 2001.
  90. Jalili, R. and Feili, H. "An Evaluation of Concurrency Control Mechanisms in Database Systems", Proceedings of the Fifth Iranian Computer Society Conference (ICSC'2000), Shahid Beheshti University, Tehran, Iran, pp. 113-123, 2000.
  91. Jalili, R. and Pirayesh, A. R. "Persistance in the Sharif Operating System ", Proceedings of the Fourth Iranian Computer Society Conference (ICSC'98), Sharif University of Technology, Tehran, Iran, pp. 71-80, 1998.
  92. Jalili, R. and Sadri, B. and Lavassani, M. "NFS Version 3 Implementation and Optimization: Our Experience on Linux", Proceedings of the Third Iranian Computer Society Conference (ICSC'97), Iran University of Science and Technology, Tehran, Iran, pp. 119-125, 1997.
  93. Jalili, R. and Salek, A.."Protection in the Sharif Operating System", Proceedings of the Third Iranian Computer Society Conference (ICSC'97), Iran University of Science and Technology, Tehran, Iran, pp. 244-250(F),1997.
  94. Jalili, R. and Zare, R."POURIA: A Persistent Extension to C++", Proceedings of the Second Iranian Computer Society Conference (ICSC'96), Amir Kabir University of Technology, Tehran, Iran, pp. 1-8,1996.
  95. Jalili, R. and Henskens, F. A."Stable-Copy Replication of Highly Available Stable Distributed Persistent Stores", Proceedings of the Second Iranian Computer Society Conference (ICSC'96), Amir Kabir University of Technology, Tehran, Iran, pp. 78-86,1996.
  96. Jalili, R. and Henskens, F. A."Management of Inter-Entity Dependencies using Directed Dependency Graphs", Proceedings of the First Iranian Computer Society Conference (ICSC'95), Sharif University of Technology, Tehran, Iran, pp. 210-218,1995.
  97. Heskens, F. A., Koch, D. M., Jalili, R. , Rosenberg, J. "Hardware Support for Stability in a Persistent Architecture", Proceedings of the 6th International Workshop on Persistent Object Stores, Tarascon, France, Springer-Verlag, pp. 387-399, 1994.
  98. Jalili, R. and Henskens, F. A. "Reducing the Extent of Cascadable Operations in Stable Distributed Persistent Stores", Proceedings of the 18th Australian Computer Science Conference (ACSC'95), Adelaide, Australia, vol 1, pp. 227-236, 1995.
  99. Jalili, R. and Henskens, F. A. "Operating System Support for Object Dependencies in Persistent Object Stores", Proceedings of the Workshop on Object-Oriented Real-Time Dependable Systems (WORDS'94), Dana Point, California, IEEE Computer Society Press, pp. 21-29, 1994.
  100. An Anomaly-based Botnet Detection Approach for Identifying Stealthy Botnets, S. Arshad, M. Abbaspour, M. Kharrazi, H. Sanatkar, International Conference on Computer Applications and Industrial Electronics (ICCAIE), 2011.
  101. Passive Worm and Malware Detection in Peer-to-Peer Networks, S. Fahimian, A. Movahed, M. Kharrazi, IEEE/IFIP International Symposium on Trusted Computing and Communications (Trustcom10), 2010
  102. 2PLoc: Preserving Privacy in Location-Based Services, A. Salar Amoli, M. Kharrazi, R. Jalili, IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT10), 2010
  103. Towards Real-Time Performance Monitoring for Encrypted Traffic, M. Kharrazi, S. Sen, O. Spatscheck, ACM SIGCOMM Workshop on Internet Network Management (INM), 2007
  104. Cover Selection for Steganographic Embedding, M. Kharrazi, H. T. Sencar, N. Memon, IEEE International Conference on Image Processing, 2006
  105. Improving Steganalysis by Fusion Techniques: A Case Study with Image Based Steganography, M. Kharrazi, H. T. Sencar, N. Memon, SPIE Symposium on Electronic Imaging, 2006
  106. Benchmarking steganographic and steganalysis techniques, M. Kharrazi, H. T. Sencar, N. Memon, SPIE Symposium on Electronic Imaging, 2005
  107. PSteg: steganographic embedding through patching, K. Petrowski, M. Kharrazi, H. T. Sencar, N. Memon, IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005
  108. Nabs: A System for Detecting Resource Abuses via Characterization of Flow Content Type, K. Shanmugasundaram, M. Kharrazi, N. Memon, Annual Computer Security Applications Conference, 2004
  109. Blind source camera identification, M. Kharrazi, H. T. Sencar, N. Memon, IEEE International Conference on Image Processing, 2004
  110. Network Abuse Detection via Flow Content Characterization, M. Kharrazi, K. Shanmugasundaram, N. Memon, 5th Annual IEEE Information Assurance Workshop, 2004
  111. Image Steganography and Steganalysis: Concepts and Practice, R. Chandramouli, M. Kharrazi, N. Memon, International Workshop on Digital Watermarking, 2003
  112. ODISSEA: A Peer-to-Peer Architecture for Scalable Web Search and Information Retrieval, M. Kharrazi, T. Suel, A. Delis, et. al., Sixth International Workshop on Web and Databases (WebDB), 2003
  113. Seyyed Ahmad Javadi, Morteza Amini, and Rasool Jalili, "Non-monotonocity in OrBAC Through Default and Exception Policy Rules", In Proceedings of the 9th International ISC Conference on Information Security and Cryptology, pp. 87-94, 2012, Tabriz, Iran.
  114. Mahdi Alizadeh, Seyyed Ahmad Javadi, Morteza Amini, and Rasool Jalili, "Policy Specification and Enforcement in Online Social Networks Using MKNF, In Proceedings of the 9th International ISC Conference on Information Security and Cryptology, pp. 48-53, 2012, Tabriz, Iran.
  115. Majid Arasteh, Morteza Amini, and Rasool Jalili, "A Trust and Reputation-based Access Control Model for Virtual Organizations", In Proceedings of the 9th International ISC Conference on Information Security and Cryptology, pp. 121-127, 2012, Tabriz, Iran.
  116. Fathieh Faghih, Morteza Amini, and Rasool Jalili, "Specification of History Based Constraints for Access Control in Conceptual Level", In Proceedings of the 6th International Conference on Information Systems Security (ICISS10), Lecture Notes in Computer Science (LNCS), Vol. 6503, pp. 186-200, 2010 Gandhinaga, India.
  117. Fathieh Faghih, Morteza Amini, and Rasool Jalili, "A Temporal Description Logic Based Access Control Model for Expressing History Constrained Policies in Semantic Web Environments", In Proceedings of the IEEE Workshop on Policies for Distributed Systems and Networks, 2009, London, UK.
  118. Mousa A. Ehsan, Morteza Amini, Rasool Jalili, "Handling Context in a Semantic-based Access Control Framework", In Proceedings of the 5th International Symposium on Frontiers of Information Systems and Network Applications (FINA09) to be held with the IEEE 23rd International Conference on Advanced Information Networking and Applications(AINA'09)2009, Bradford, UK.
  119. Moussa A. Ehsan,  Morteza Amini,  and Rasool Jalili, "A Semantic-based Access Control Mechanism Using Semantic Technologies"Accepted in the 2nd International Conference on Security of Information and Networks (SIN 2009), 2009, Gazimagusa, North Cyprus.
  120. Morteza Amini, Rasool Jalili, "A Calculus for Composite Authorities' Policy Derivation in Shared Domains of Pervasive Computing Environments", In Proceedings of the IEEE International Workshop on Internet and Distributed Computing Systems (IDCS 2008), 2008, Bangladesh.

  121.  Ali Noorollahi, Morteza Amini, Rasool Jalili, Jafar Haadi Jafarian, Ravari, "A History Based Semantic Aware Access Control Model Using Logical Time Approach", In Proceedings of the IEEE International Workshop on Internet and Distributed Computing Systems (IDCS 2008), 2008, Bangladesh.

  122.  Mousa A. Ehsan, Morteza Amini, and Rasool Jalili, "Using Semantic Annotation in Designing Security Mechanisms Based on MA(DL)^2 Semantic-Aware Model", In Proceedings of the 5th International ISC Conference on Information Security and Cryptology (ISCISC08), 2008, Tehran, Iran.

  123.  Hamid Reza Anvari, Asghar Asl-e Asgharian, Morteza Amini, and Rasool Jalili, "Access Control in Updating XML Documents using Static Analysis", In Proceedings of the 5th International ISC Conference on Information Security and Cryptology (ISCISC08), 2008, Tehran, Iran.

  124.  Jafar Haadi Jafarian, Morteza Amini, and Rasool Jalili, "A Context-Sensitive Information Flow Control Model", In Proceedings of the 5th International ISC Conference on Information Security and Cryptology (ISCISC08), 2008, Tehran, Iran.

  125.  Ali Noorollahi Ravari, Morteza Amini, and Rasool Jalili, "Using Logical Time and Semantics in a History-Based Access Control Model", In Proceedings of the 5th International ISC Conference on Information Security and Cryptology (ISCISC08), 2008, Tehran, Iran.

  126.  Jafar Haadi Jafarian, Morteza Amini, and Rasool Jalili, "A Context-Aware Mandatory Access Control Model for Multilevel Security Environments", In Proceedings of the 27th International Conference on Computer Safety, Reliability and Security (SafeComp 2008), 2008, Newcastle, UK.

  127.  Ali Noorollahi, Morteza Amini, and Rasool Jalili, "A Semantic Aware Access Control Model with Real Time Constraints on History of Accesses", In Proceedings of the International Multiconference on Computer Science and Information Technolog, 2008, Wisla, Poland.

  128.  Zeinab Iranmanesh, Morteza Amini, and Rasool Jalili, "A Logic for Inclusion of Administrative Domains and Administrators in Multi-Domain Authorization", In Proceedings of the Global e-Security International Conference (ICGeS08), pp. 190-199, UK, April 2008.

  129.  Mohsen Taherian, Morteza Amini, and Rasool Jalili, "A Semantic-Aware Ontology-Based Trust Model for Pervasive Computing Environments", In Proceedings of the 5th International Conference on Autonomic and Trusted Computing (ATC-08), pp. 47-59, 2008, Oslo, Norway.

  130.  Zeinab Iranmanesh, Morteza Amini, and Rasool Jalili, "A Logic for Multi-Domain Authorization Considering Administrators", In Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY08), pp. 189-198, 2008, NY, USA.

  131.  Mohsen Taherian, Morteza Amini, and Rasool Jalili, "Trust Inference in Web-Based Social Networks using Resistive Networks", In Proceedings of the 3rd IEEE International Conference on Internet and Web Applications and Services (ICIW08), pp. 233-238, 2008, Athens, Greece,.

  132.  Ali Noorollahi Raavari, Morteza Amini, and Rasool Jalili, "Temporal Semantic based Access Control Model", In Proceedings of the 13th International CSI Computer Conference (CSICC 08), March 2008, Kish Island, Persian Gulf, Iran.

  133.  Jafar Hadi Jafarian, Morteza Amini, and Rasool Jalili, "A Dynamic Mandatory Access Control Model", In Proceedings of the 13th International CSI Computer Conference (CSICC 08), March 2008, Kish Island, Persian Gulf, Iran.

  134.  Mohsen Taherian, Rasool Jalili, and Morteza Amini, "PTO: A Trust Ontology for Pervasive Environments", In Proceedings of the IEEE 22nd International Conference on Advanced Networking and Applications (AINA08), pp. 301-306, March 2008, Ginowan, Okinawa, Japan.

  135.  Morteza Amini, and Rasool Jalili, "Specification and Inference of Authorization and Obligation Policies Using Deontic Logic for Semantic-Aware Environments", In Proceeding of the 4th Iranian Society of Cryptology Conference (ISCC07), pp. 175-184, Oct 2007, Tehran, Iran.

  136.  Mohsen Taherian, Morteza Amini, and Rasool Jalili, "An Ontology based Trust Model for Pervasive Computing Environments", In Proceedings of the 4th Iranian Society of Cryptology Conference (ISCC07), pp. 165-174, Oct 2007, Tehran, Iran.

  137.  Sareh Sadat Emami, Morteza Amini, and Sadaan Zokaei, "A Context-Aware Access Control Model for Pervasive Computing Environments", In Proceedings of the IEEE International Conference on Intelligent Pervasive Computing (IPC 07), pp. 51-56, Oct 2007, Jeju Island, Korea.

  138.  Hassan Takabi, Morteza Amini, and Rasool Jalili, "Separation of Duty in Role-Based Access Control Model through Fuzzy Relations", In Proceedings of the 3rd International Symposium on Information Assurance and Security (IAS 07), IEEE Computer Society, 2007, Manchester, UK.

  139.  Hassan Takabi, Morteza Amini, and Rasool Jalili, "Enhancing Role-Based Access Control Model through Fuzzy Relations", In Proceedings of the 3rd International Symposium on Information Assurance and Security (IAS 07), IEEE Computer Society, 2007, Manchester, UK.

  140.  Amir Reza Masoumzadeh, Morteza Amini, and Rasool Jalili, "Conflict Detection and Resolution in a Context-Aware Authorization System", In Proceedings of the 3rd IEEE Symposium on Security in Networks and Distributed Systems (SSNDS07), pp. 505-511, May 2007, Niagara Falls, Canada.

  141.  Hassan Takabi, Morteza Amini, and Rasool Jalili, "Fuzzy Relation Equation for Role Based Access Control Model", In Proceedings of the ACS/IEEE International Conference on Computer Systems and Applications (AICCSA07), pp. 807-814, May 2007, Amman, Jordan.

  142.  Sara Javanmardi, Morteza Amini, and Rasool Jalili, "An Access Control Model for Protecting Semantic Web Resources", In Proceedings of the 2nd International Semantic Web Policy Workshop (SWPW06), pp. 32-46, 2006, Athens, GA, USA. [PDF]

  143.  Sara Javanmardi, Morteza Amini, Rasool Jalili, and Yaser Ganjisaffar, "SBAC: A Semantic Based Access Control Model", In Proceedings of the 11th Nordic Workshop on Secure IT-Systems Conference (NordSec06), pp. 157-168, Linkping, Sweden. [PDF]

  144.  Amir Reza Masoumzadeh, Morteza Amini, and Rasool Jalili, "Context-Aware Provisional Access Control", In Proceedings of the 2nd International Conference on Information Systems Security (ICISS06), Lecture Notes in Computer Science (LNCS), Vol. 4332, pp. 132-146, July 2006, Kolkata, India. [PDF]

  145.  A. Omrani, Sareh Sadat Emami, Morteza Amini, "Access Control Based on Context and History in Pervasive Computing Environments", In Proceedings of the 9th Iranian Students Conference on Electrical Engineering, 2006, Tehran, Iran.

  146.  Rasool Jalili, Fatemeh Imani-Mehr, and Morteza Amini, "SPUNNID: A New Approach in Detecting Distributed Denial of Service Attacks using Combination of Statistical Approaches and Unsupervised Neural Networks", In Proceedings of the 10th Computer Society of Iran Computer Conference, CSICC2005, Iran, 2005. [PDF-Persian]

  147.  Morteza Amini, and Rasool Jalili, "Network-Based Intrusion Detection Using Unsupervised Adaptive Resonance Theory (ART)", In Proceedings of the 4th Conference on Engineering of Intelligent Systems (EIS 2004), Madeira, Portugal, 2004. [PDF]

  148.  Rasool Jalili, and Morteza Amini, "ART Neural Net based Intrusion Detection System", In Proceedings of the 5th Conference on Intelligent Systems (CIS 2003), Mashhad, Iran, 2003. [PDF-Persian]

  149.  Keyvan Ashouri, Morteza Amini, Mohammad Hassan Savoji, "Non-linear Prediction of Speech Signal Using Artificial Neural Nets", In Proceedings of the First EurAsian Conference on Advances in Information and Communication Technology (EurAsia-ICT 2002), pp. 212-219, Shiraz, Iran, 2002. [PDF]