Publications being involved in .... PDF Print E-mail

    Journals:
.
  1. Mohammadi-Nodooshan, A., Darmani, Y., Jalili, R. , Nourani, M. and Sayad Haghighi, M. " A Robust and Efficient SIP Authentication Scheme", Accepted for publication in Scientia Transactions on Computer Science and Engineering, 2009.
  2. Norolahi-Ravari, A., Jafarian,J.H., Amini, M. and Jalili, R. "GTHBAC: A Generalized Temporal History Based Access Control Model", Springer's "Telecommunication Systems" Journal, Published online 2009.
  3. Asadpour, M. and Jalili, R. “Double Voting Problem of some Anonymous E-Voting Schemes”, Journal of Information Science and Engineering (JISE), Vol. 25, pp. 895-906, 2009.
  4. Niamanesh, M. and Jalili, R. “DRAPS: A Framework for Dynamic Reconfigurable Protocol Stacks”, Journal of Information Science and Engineering (JISE), Vol. 25, pp. 827-841, 2009.
  5. Niamanesh, M. and Jalili, R. “A Framework for Automatic Reconfigurations of Protocol Stacks in Ubiquitous Computing Systems”, Ubiquitous Computing and Communication Journal, Vol. 4, No. 3, pp. 758-769, 2009.
  6. Niamanesh, M. and Jalili, R. “A Solution for Backward-Compatible Reconfigurations of Running Protocol Components in Protocol Stacks”, Ubiquitous Computing and Communication Journal, Vol. 4, No. 3, pp. 784-793, 2009.
  7. Shahriari, H.R. Ganji-Saffar, Y., Jalili, R., Habibi, J. “An Expert System for Automatic Multi-Host Network Vulnerability Analysis”, Journal of Information Science and Engineering (JISE), Vol. 24, No. 3; March 2008.
  8. Shahriari, H.R., Makarem, M.S., Sirjani, M., Jalili, R. and Movaghar, A. “Vulnerability Analysis of Networks to Detect Multiphase Attack Using the Actor-based Language Rebeca”, Elsevier Computers & Electrical Engineering journal, In Press, Available Online 2008.
  9. Amini, M., Jalili, R., and Shahriari, H.R. “RT-UNNID: A Practical Solution to Real-Time Network-Based Intrusion Detection Using Unsupervised Neural Networks”, Elsevier Computers and Security Journal, Vol. 25, No. 6. Sept. 2006.
  10. Shahriari, H.R. and Jalili, R. “Vulnerability Take Grant (VTG): An Efficient Approach to Analyze Network Vulnerabilities”, Elsevier Computers and Security Journal, Vol. 26, No. 5. Sept. 2006.
  11. Yusefi, A., Jalili, R. and Niamanesh, M. “Multi-Determiner Protection of Private Data in Pervasive Computing Environments”, IJCSNS International Journal of Computer Science and Network Security, Dec. 2006.
  12. Rafiei, M.E., Jalili, R. and Moosavi, H. “Vulnerability Analysis trough a Graph-based Protection System”, IJCSNS International Journal of Computer Science and Network Security, Dec. 2006.
    Refereed Conferences:

  1. Karimi, M., Hadavi, A. and Jalili, R. "A Secure Range Query Enabled Approach for Encrypted XML Documents", Proceedings of the 6th ISC International Conference on Information Security and Cryptology (ISCISC 2009), pp. 13-22, Isfahan, 2009.
  2. Dousti, M.S., AmirHaeri, M.and Jalili, R. "Privacy-Preserving Single Layer Perceptron", Proceedings of the 6th ISC International Conference on Information Security and Cryptology (ISCISC 2009), pp. 31-38, Isfahan, 2009.
  3. Asl-Asgharian, A., Dousti, M.S. and Jalili, R. "An Efficient DC-Net Based Anonymous Message Transmission Protocol", Proceedings of the 6th ISC International Conference on Information Security and Cryptology (ISCISC 2009), pp. 23-30, Isfahan, 2009.
  4. AmirHaeri, M. and Jalili, R. "RTEAS: A Real-Time Algorithm for Extracting Attack Scenarios from Intrusion Alert Stream", Proceedings of the 6th ISC International Conference on Information Security and Cryptology (ISCISC 2009), pp. 40-47, Isfahan, 2009.
  5. Sadighian, A. and Jalili, R. "AFMAP: Anonymous Forward-Secure Mutual Authentication Protocols for RFID Systems", Proceedings of the Third International Conference on Emerging Security Information, Systems and Technologies-SecureWare 2009, Greek, pp. 31-36, 2009.
  6. Faghih, F., Amini, M. and Jalili, R. "A Temporal Description Logic Based Access Control Model for Expressing History Constrained Policies in Semantic Web", Proceedings of the IEEE International Symposium on Policy for Distributed Systems and Networks-POLICY 2009, England, pp. 142-149, 2009.
  7. Ehsan, A. M., Amini, M., Jalili, R. " A Semantic-based Access Control Mechanism Using Semantic Technologies ", Proceedings of the 2nd International Conference on Security of Information and Networks (SIN 2009) , Gazimagusa, North Cyprus, 2009.
  8. Ehsan, A. M., Amini, M., Jalili, R. " Handling Context in a Semantic-based Access Control Framework ", Proceedings of the 5th International Symposium on Frontiers of Information Systems and Network Applications (FINA ‘09) held with the IEEE 23rd International Conference on Advanced Information Networking and Applications(AINA'09) , Bradford, UK, 2009.
  9. ShirAliNia, A. and Jalili, R. “The Data Affecting Model for Detecting Source Code Security Vulnerabilities”, Proceedings of the 5th ISC International Conference on Information Security and Cryptology (ISCISC 2008), Tehran, 2008.
  10. Ehsan, A.M., Amini, M. and Jalili, R. “Using Semantic Annotation for Designing Security Mechanisms based on MA(DL)2”, Proceedings of the 5th ISC International Conference on Information Security and Cryptology (ISCISC 2008), Tehran, 2008.
  11. Mansoori, F. and Jalili, R. “A Method for Query Processing On Encrypted String Data”, Proceedings of the 5th ISC International Conference on Information Security and Cryptology (ISCISC 2008), Tehran, 2008.
  12. Asl-Asgharian, A., Amini, M. and Jalili, R. “Access Control in Updating XML Documents Using Static Analysis”, Proceedings of the 5th ISC International Conference on Information Security and Cryptology (ISCISC 2008), Tehran, 2008.
  13. Jafarian, J.H., Amini, M. and Jalili, R. “A Context Sensitive Information Flow Model”, Proceedings of the 5th ISC International Conference on Information Security and Cryptology (ISCISC 2008), Tehran, 2008.
  14. Noorollahi, A., Amini, M. and Jalili, R. “Using Logical Time and Semantics in A History Based Access Control Model”, Proceedings of the 5th ISC International Conference on Information Security and Cryptology (ISCISC 2008), Tehran, 2008.
  15. Bahreyni, P. AmirHaeri, M. and Jalili, R. “A Probabilistic Approach to Intrusion Alert Correlation”, Proceedings of the 5th ISC International Conference on Information Security and Cryptology (ISCISC 2008), Tehran, 2008.
  16. Jafarian, J.H., Amini, M. and Jalili, R. “Context-Aware Mandatory Access Control Model for Multilevel Security Environments”, Proceedings of the 27th International Conference on Computer Safety, Reliability and Security SAFECOMP2008, UK, 2008.
  17. IranManesh, Z., Amini, M. and Jalili, R. “A Logic for Multi- Domain Authorization Considering Administrators”, Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY- 2008), USA, 2008.
  18. Noorollahi, A., Amini, M. and Jalili, R. “A Semantic Aware Access Control Model with Real Time Constraints on History of Accesses”, Proceedings of the International Multiconference on Computer Science and Information Technology –(IMCSIT-2008), Poland, 2008.
  19. Amini, M. and Jalili, R. “A Calculus for Composite Authorities' Policy Derivation in Shared Domains of Pervasive Computing Environments”, Proceedings of the IEEE International Workshop on Internet and Distributed Computing Systems (IDCS 2008), Bangeladesh, 2008.
  20. Noorollahi, A., Jafarian, J.H , Amini, M. and Jalili, R. “A History Based Semantic Aware Access Control Model Using Logical Time Approach”, Proceedings of the IEEE International Workshop on Internet and Distributed Computing Systems (IDCS 2008), Bangeladesh, 2008.
  21. Sadighian, A.R. and Jalili, R. “FLMAP: A Fast Lightweight Mutual Authentication Protocol for RFID System”, Proceedings of the 16th IEEE International Conference on Networks (ICON 2008), India, 2008.
  22. Taherian, M. Jalili, R. and Amini, M. “Trust Inference in Web-Based Social Networks using Resistive Networks”, Proceedings of the The Third International Conference on Internet and Web Applications and Services (ICIW-2008), Greece, 2008.
  23. Jafarian, J.H., Amini, M. and Jalili, R. “Protecting Location Privacy through a Graph-based Location Representation and a Robust Obfuscation Technique”, Proceedings of the The 11th International Conference on Information Security and Cryptology- ICISC 2008, Korea, 2008.
  24. Niamanesh, M. and Jalili, R. “A Formalism for Reconfigurability Analysis in Distributed Non- Blocking Components”, Proceedings of the 28th International Conference on Distributed Computing Systems (ICDCS-08), China, 2008.
  25. IranManesh, Z., Amini, M. and Jalili, R. “A Logic for Inclusion of Administrative Domains and Administrators in Multi-Domain Authorization”, Proceedings of the International Conference on Global e-Security, ICGeS-08, UK, 2008.
  26. Abasi-Moghadam, S., Shah-Karami, A. and Jalili, R. “Mapping of Access Control Models in XML-Based DataBases Using Anthology Based Mapping in Semantic Web”, Proceedings of the 13th CSI National Computer Conference (CSICC2008), Kish Island, IRAN, 2008.
  27. Saremi, F., Mashayekhi, H., Jalili, R., and Movaghar, A. “CEBAC: A Decentralized Cooperation Enforcement Based Access Control Framework in MANETs”, Proceedings of the 13th CSI International Computer Conference (CSICC2008), Kish Island, IRAN, 2008.
  28. Mohammadi-Nodooshan, A. Darmani, Y. Jalili, R. and Nourani, M. “A Robust and Efficient SIP Authentication Scheme”, Proceedings of the 13th CSI International Computer Conference (CSICC2008), Kish Island, IRAN, 2008.
  29. Mohammadi-Nodooshan, A. Darmani, Y. Jalili, R. and Nourani, M. “A Robust and Efficient SIP Authentication Scheme”, Proceedings of the 13th CSI International Computer Conference (CSICC2008), Kish Island, IRAN, 2008.
  30. Noorollahi, A., Amini, M. and Jalili, R. “A Temporal Semantic-based Access Control Model”, Proceedings of the 13th CSI International Computer Conference (CSICC2008), Kish Island, IRAN, 2008.
  31. Jafarian, J.H., Amini, M. and Jalili, R. “CAMAC: A Context- Aware Mandatory Access Control Model”, Proceedings of the 13th CSI International Computer Conference (CSICC2008), Kish Island, IRAN, 2008.
  32. Taherian, M. Jalili, R. and Amini, M. “A Semantic-Aware Ontology-Based Trust Model for Pervasive Computing Environments”, Proceedings of the International Conference on Autonomic and Trusted Computing (ATC-08) (LNCS 5060), Netherland, 2008.
  33. Hemmati, H. and Jalili, R. “Self-Reconfiguration in Highly Available Pervasive Computing Systems”, Proceedings of the International Conference on Autonomic and Trusted Computing (ATC-08) (LNCS 5060), Netherland, 2008.
  34. Taherian, M. Jalili, R., Abolhassani, H. and Amini, M. “PTO: A Trust Ontology for Pervasive Environments”, Proceedings of the IEEE AINA-2008 International Conference, Japan, 2008.
  35. Taherian, M. and Jalili, R. “An Anthology-based and Sematic-Aware Trust Model for Pervasive Computing Environments”, Proceedings of the Forth Iranian Society of Cryptography Conference (ISCC2007), IRAN, 2007.
  36. Golyaei, S. and Jalili, R. “A Certificate Based Client Based Access Control Model and its Associating Policy Description Language”, Proceedings of the Forth Iranian Society of Cryptography Conference (ISCC2007), IRAN, 2007.
  37. Amini, M. and Jalili, R. “Specification and Inference of Access Policies and Obligations Based on The Deontic Logics in Semantic-Aware Environments”, Proceedings of the Forth Iranian Society of Cryptography Conference (ISCC2007), IRAN, 2007 (The Best Paper Award).
  38. Takabi, H, Amini, M. and Jalili, R. “Enhancing Role-Based Access Control Model through Fuzzy Relations”, Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007 (Published by IEEE), UK, 2007.
  39. Takabi, H, Amini, M. and Jalili, R. “Separation of Duty in Role- Based Access Control Model through Fuzzy Relations”, Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007 (Published by IEEE), UK, 2007.
  40. Niamanesh, M. and Jalili, R. “A Dynamic-Reconfigurable Architecture for Protocol Stacks of Networked Systems”, Proceedings of the 31st IEEE Computers, Software, and Applications Conference (COMPSAC 2007), China, 2007.
  41. Niamanesh, M. Sabet-Ghadam, S., Yusefzadeh, R. and Jalili, R. “Design and Implementation of a Dynamic Reconfigurable Architecture for Protocol Stack”, Proceedings of the IPM International Workshop on Foundations of Software Engineering (FSEN 2007.) (LNCS 4767), Tehran, IRAN, 2007.
  42. Niamanesh, M. and Jalili, R. “Formalizing Assured Dynamic Reconfiguration in Protocols”, Proceedings of the IPM International Workshop on Foundations of Software Engineering (FSEN 2007.) (LNCS 4767), Tehran, IRAN, 2007.
  43. Rafiei, M. E. Taherian, M., Moosavi, H., Movaghar, A. and Jalili, R. “Vulnerability Analysis in VGBPS using Prolog”, Proceedings of the IPM International Workshop on Foundations of Software Engineering (FSEN 2007.) (LNCS 4767), Tehran, IRAN, 2007.
  44. Shahriari, H.R. and Jalili, R. “Formal Definition and Categorization of Vulnerabilities using Take-Grant Protection Model”, Proceedings of the 12th CSI International Computer Conference (CSICC2007), Tehran, IRAN, 2007.
  45. Hafez-Ghorani, S., SAdeghian, B., Jalili, R., and Tarameshloo, E. “A method for Implementation of ARBAC97 in Relational DBMSs”, Proceedings of the 12th CSI International Computer Conference (CSICC2007), Tehran, IRAN, 2007.
  46. Jalaei, R., Shahriari, H.R., and Jalili, R. “Analysis of Combinational Attacks to Networks Using Attack Graphs”, Proceedings of the 12th CSI International Computer Conference (CSICC2007), Tehran, IRAN, 2007.
  47. Yusefi, A., Jalili, R., and Niamanesh, M. “A Multi-Determiner Privacy Protection System for Pervasive Computing Environments”, Proceedings of the 12th CSI International Computer Conference (CSICC2007), Tehran, IRAN, 2007.
  48. Mokhtarian, K., Jalili, R., and Shahriari, H.R. “Quantitative Evaluation of Network Security Using Fuzzy Privilege Graph”, Proceedings of the 12th CSI International Computer Conference (CSICC2007), Tehran, IRAN, 2007.
  49. Gerani, Sh. Shahriari, H.R., Saberi, M. and Jalili, R. “Modelling and Analysis of Firewall Vulnerabilities Using VTG”, Proceedings of the 12th CSI International Computer Conference (CSICC2007), Tehran, IRAN, 2007.
  50. Rafiei, M. E. and Jalili, R. “Decidability of the Safety Problem in the VGBPS Protection System”, Proceedings of the 12th CSI International Computer Conference (CSICC2007), Tehran, IRAN, 2007.
  51. Takabi, H, Amini, M. and Jalili, R. “Trust-Based User-Role Assignment in Role-Based Access Control”, Proceedings of The 2007 ACS/IEEE International Conference on Computer Systems and Applications (AICCSA ‘2007), Jordan, 2007.
  52. Masoum-Zadeh, A., Amini, M. and Jalili, R. “Conflict Detection and Resolution in Context-Aware Authorization”, Proceedings of the The IEEE 21st International Conference on Advanced Information Networking and Applications (AINA- 2007), Canada, 2007.
  53. SattarZadeh, B., AsadPour, M. and Jalili, R. “Enhanced Smart-Card-Based Authentication Scheme Providing Forward- Secure Key Agreement”, Proceedings of the International Conference on New Technologies, Mobility and Security (NTMS'2007), France, 2007.
  54. SattarZadeh, B., AsadPour, M. and Jalili, R. “Improved User Identity Confidentiality for UMTS Mobile Networks”, Proceedings of the 4th European Conference on Universal Multiservice Networks, ECUMN'2007, France, 2007.
  55. Jalaei, R., Shahriari, H.R., and Jalili, R. “Generating and Analyzing Attack Graphs through Vulnerability Take Grant Model”, Proceedings of the International Conference on Network Security- ICONS2007, India, 2007.
  56. Masoum-Zadeh, A., Amini, M. and Jalili, R. “Context Aware Access Control through Provisional Authorization”, Proceedings of the 2nd International Conference on Information System Security (ICISS 2006), India, Dec. 2006.
  57. Javanmardi, S., Hemmati, H. and Jalili, R. “An Access Control Framework for Pervasive Computing Environments” Proceedings of the 2006 International Conference on Pervasive Systems & Computing PSC'06, Monte Carlo Resort, Las Vegas, Nevada, USA, June 26-29, 2006.
  58. Javanmardi, S., Amini, M. Jalili, R., and Ganji-Saffar, Y. “SBAC: "A Semantic-Based Access Control Model” Proceedings of the NORDSEC-2006, Sweden, October 2006.
  59. Javanmardi, S., Amini, M. and Jalili, R. “An Access Control Model for Protecting Semantic Web Resources”, Proceedings of the Semantic Web Policy Workshop, Athens, GA, USA, November 5, 2006.
  60. SattarZadeh, B., AsadPour, M. and Jalili, R. “Security Enhancement for A Low Computation Cost User Authentication Scheme”, Proceedings of the International Conference on Security and Cryptography (SECRYPT2006), Portugal, August 2006.
  61. Ganji Saffar, Y., Abolhassani, H. and Jalili, R. “An Architecture for a Context-aware Service Broker in Ubiquitous Computing Environments”, Proceedings of the International Workshop on Pervasive Computing Systems & Application (PerCSA 2006) of the ACS/IEEE AICCSA-06 Conference, Dubai/Sharjeh, 2006.
  62. Zakeri, R., Abolhassani, H., Shahriari, H.R. and Jalili, R. “Using Description Logics for Network Vulnerability Analysis”, Proceedings of the 5th International Conference on Networking ICN'06, IEEE Computer Society Press, Mauritius 2006.
  63. Sajedi, H., Jalili, R., and Niamanesh, M., “Using Intelligent Agents for Automatic Selection of Services in Dynamic Wireless Networks”, Proceedings of the 11th CSI Computer Conference (CSICC2006), pp. 1003-1006 (The Farsi Volume), IPM, Tehran, 2006.
  64. Omidian, A., Shahriari, H.R., and Jalili, R., “Modeling of Computer Network Vulnerabilities Using Petri-Nets”, Proceedings of the 11th CSI Computer Conference (CSICC2006), pp. 935-938 (The Farsi Volume), IPM, Tehran, 2006.
  65. Fekrazad Nobakht, N., Niamanesh, M., Hemmati, H., and Jalili, R., “A Graph-Based Mechanism for State Transfer in Dynamic Reconfiguration of Component-Based Programs”, Proceedings of the 11th CSI Computer Conference (CSICC2006), pp. 436-444 (The Farsi Volume), IPM, Tehran, 2006.
  66. Niamanesh, M., Heydarian, F. and Jalili, R. “Runtime Validity of Dynamic Reconfiguration in Component-Based Programs”, Proceedings of the 11th CSI Computer Conference (CSICC2006), pp. 613-617 (The English Volume), IPM, Tehran, 2006.
  67. Shahriari, H.R., and Makarem, M.S., Sirjani, M., Jalili, R. and Movaghar, A. ”Modeling and Verification of Complex Network Attacks Using and Actor-Based Language”, Proceedings of the 11th CSI Computer Conference (CSICC2006), pp. 152-158 (The English Volume), IPM, Tehran, 2006.
  68. Zakeri, R., Jalili, R. and Shahriari, H.R. “Using Description Logics For Man In The Middle Attack Analysis”, Proceedings of the 11th CSI Computer Conference (CSICC2006), pp. 512-515 (The English Volume), IPM, Tehran, 2006.
  69. Shahriari, H.R., Sadoddin, R., Jalili, R., Zakeri, R. and Omidian, A.R. “Network Vulnerability Analysis through Vulnerability Take- Grant Model (VTG)”, Proceedings of the 7th International Conference on Information and Communications Security(ICICS2005), pp. 256-268 LNCS# 3783, 2005.
  70. Hemmati, H., Niamanesh, M. Jalili, R. “A Framework to Support Run-Time Assured Dynamic Reconfiguration for Pervasive Computing Environments”, Proceedings of the First International Symposium on Wireless Pervasive Computing (ISWPC-2006), pp. 273-277, Thailand, 2006.
  71. Hemmati, H., Aliakbarian , S., Niamanesh, M. Jalili, R. “Structural and Behavioral Run-Time Validation of Dynamic Reconfiguration in Pervasive Computing Environments”, Proceedings of the 4th Asian International Mobile Computing Conference AMOC, India, 2006.
  72. Asadzadeh, K., Niamanesh, M. Jalili, R. “A Composition Function Model for Software Reconfiguration Propagation in a Network of Systems”, Proceedings of the 9th World Multi- Conference on Systemics, Cybernetics and Informatics (WMSCI2005), Orlando, Florida, 2005.
  73. Niamanesh, M., Heidarian Dehkordi, F., Fekrazad Nobakht, N, Jalili, R., “On Validity Assurance of Dynamic Reconfiguration for Component-based Programs”, Proceedings of the IPM International Workshop on Foundations of Software Engineering (Theory And Practice) FSEN 2005, Tehran, Iran, 2005.
  74. Shahriari , H.R., Sadoddin, R. , Jalili, R., Zakeri, R. and Omidian, R. “Vulnerability Analysis through Vulnerability Take-Grant Model (VTG)”, Proceedings o f the 7th International Conference on Information and Communications Security (ICICS2005), China, 2005.
  75. Shahriari , H.R. and Jalili, R. "Modeling and Analyzing Network Vulnerabilities via a Logic-Based Approach”, Proceedings of the 2nd International Symposium of Telecommunications (IST2005), Shiraz, Iran ,2005.
  76. Zakeri, R., Shahriari , H.R., Jalili, R. and Sadoddin, R. “Modeling TCP/IP Networks Topology for Network Vulnerability Analysis”, Proceedings of the 2nd International Symposium of Telecommunications (IST2005), Shiraz, Iran , 2005.
  77. Shahriari , H.R. GanjiSaffar, Y. and Jalili, R. "An Approach to Analyzing Network Vulnerabilities based on the Topology Relations”, Proceedings of the 3rd Iranian Society of Cryptography Conference (ISCC2005), pp. 273-284, Isfahan, Iran, 2005.
  78. Shahriari , H.R. Sadoddin, R. and Jalili, R. “Network Vulnerability Analysis based on the Take-Grant Protection Model: A Proof of the Concept”, Proceedings of the 3rd Iranian Society of Cryptography Conference (ISCC2005), pp. 261-272, Isfahan, Iran, 2005.
  79. Shahriari , H.R. and Jalili, R. “Modeling of Network Security- Related Behaviors Using NVML”, Proceedings of the 8th IEEE International Multi-topic conference (INMIC 2004), Lahur, Pakistan, 2004.
  80. Shahriari , H.R. and Jalili, R. “Using CSP To Model And Analyze Transmission Control Protocol Vulnerabilities Within The Broadcast Network”, Proceedings of the International Networking and Communications Conference (INCC 2004), Lahur, Pakistan, 2004.
  81. Asadzadeh, K, Niamanesh, M. and Jalili, R. “A Combinational Function Based Model for Reconfiguration Propagation in Distributed Systems”, Proceedings of the Second International Conference on Information and Knowledge Technology, Tehran, 2005.
  82. Ranjbar, A., Hemmati, H., Niamanesh, M. and Jalili, R. “Context Based Service Migration in Pervasive Computing”, Proceedings of the Second International Conference on Information and Knowledge Technology, Tehran, 2005.
  83. Moghadam, M., Niamanesh, M. and Jalili, R. “Context Based Service Migration in Pervasive Computing”, Proceedings of the Second International Conference on Information and Knowledge Technology, Tehran, 2005.
  84. Jalili, R., Imani-Mehr, F. and Amini, M. “SPUNNID: A new Approach for Detection of DDoS Attacks Based on the Combination of Statistical Methods and Unsupervised Neural Networks”, Proceedings of the 10th Annual Iranian Computer Society Conference, Tehran, 2005.
  85. Jalili, R., Imani-Mehr, F. Amini, M. and Shahriari, H.R. “Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks,” Proceedings of International Conference on Information Security Practice and Experience, Singapore, LNCS 3439/2005, pp. 192-203, 2005.
  86. Ranjbar, A., Jalili, R. and Niamanesh, M. “Using Metropolitan Pervasive Environments Information in Predicting Continuous Location-Based Queries”, Proceedings of the 10th Annual Iranian Computer Society Conference, Tehran, 2005.
  87. Samadi. M, Esmaeili, J. and Jalili, R. “A System for Identification and Misleading of Intruder in Computer Networks”, Proceedings of the 10th Annual Iranian Computer Society Conference, Tehran, 2005.
  88. Jalili, R. and Niamanesh, M. “Modelling of Communication Protocol Stacks with Reconfigurable Capability”, Sharif University of Technology Research Reports, Tehran, 2005.
  89. Jalili, R. and Amini, M. “Network Based Intrusion Detection Using Unsupervised Adaptive Resonance Theory (ART)”, Proceedings of the Fourth International ICSC Symposium On Engineering Of Intelligent Systems (EIS 2004), Portugal, 2004.
  90. Jalili, R. and Amini, M. “An Intrusion Detection System Based on the ART Neural Networks”, Proceedings of the Fifth Conference on Intelligent Systems (CIS 2003), Ferdowsi University of Mashhad, Mashhad, Iran, pp. , 2003.
  91. Jalili, R. and Amini, M. “An Intrusion Detection System Based on the ART Neural Networks”, Proceedings of the Fifth Conference on Intelligent Systems (CIS 2003), Ferdowsi University of Mashhad, Mashhad, Iran, pp. , 2003.
  92. Ezati, N. and Jalili, R. “Improving Performance of the Internet Connections Inspection Through In-Kernel Application Proxies”, Proceedings of the 9th Annual Computer Society of Iran Conference (CSICC2004), Sharif University of Technology, Tehran, Iran, pp. , 2004.
  93. Khansari-Nia, O. and Jalili, R. “A New Approach for Role Delegation in Distributed Environments Based on Role-Based Access Control”, Proceedings of the 9th Annual Computer Society of Iran Conference (CSICC2004), Sharif University of Technology, Tehran, Iran, pp. , 2004.
  94. Khansari-Nia, O. and Jalili, R. “A Dynamic Access Control Model for Relational Database Systems”, Proceedings of the Second Iranian Cryptography Conference (ISCC2003), Sharif University of Technology, Tehran, Iran, pp. , 2003.
  95. Jalili, R. and Amini, M. “An Intrusion Detection System Based on the ART Neural Networks”, Proceedings of the Fifth Conference on Intelligent Systems (CIS 2003), Ferdowsi University of Mashhad, Mashhad, Iran, pp. , 2003.
  96. Niamanesh, M. and Jalili, R. “A Secure Architecture for Software Defined Radio”, Proceedings of the Second International Symposium on Telecommunication (IST2003), Isfahan, Iran, pp. , 2003.
  97. Jalili, R., Heydari, M.A. and Fooladgar, M. “Obstacles and Approaches to Improve The Cyberspace Security from The Operating System Point of View”, Proceedings of the Operating System and Security Conference, Sharif University of Technology, Tehran, Iran, 2003.
  98. Jalili, R., Hadavi, A. and Ale-Sheykh, R. “Review of the World Countries to the Open Source Phenomenon”, Proceedings of the Operating System and Security Conference, Sharif University of Technology, Tehran, Iran, 2003.
  99. Jalili, R., Ale-Sheykh, R. and Hadavi, A. “Operating System Security: Concepts, Current Research, and New Approaches”, Proceedings of the Operating System and Security Conference, Sharif University of Technology, Tehran, Iran, 2003.
  100. Ranjbar, A., Makarem, M.S., Jalili, R. And Bakht, M. “On Enhancing of Operating System Security Via Security Frameworks”, Proceedings of the Operating System and Security Conference, Sharif University of Technology, Tehran, Iran, 2003.
  101. Jalili, R., and Adelkhah, B, "Design and Implementation of A Specification-based Intrusion Detection System”, Proceedings of the 8th Annual Iranian Computer Society Conference (ICSC'2003), Ferdowsi University of Mashhad, Iran, pp.576-591, 2003.
  102. Jalili, R., and Hosseyni, S. M. "SFRED: An Algorithm for Dynamic Queue Management in Firewall”, Proceedings of the 8th Annual Iranian Computer Society Conference (ICSC'2003), Ferdowsi University of Mashhad, Iran, pp.142-149, 2003.
  103. Jalili, R., and Rezvani, M, "Specification and Verification of Security Policies in Firewalls”, Lecture Notes in Computer Science # 2510, Springer, 2002, pp. 154-163. 2002.
  104. Jalili, R., and Rezvani, M, "Analysis and Verification of Security Policy in Firewalls” Proceedings of the 7th Annual Iranian Computer Society Conference (ICSC'2002), Iran Telecommunication Center, pp. 339-345, 2002.
  105. Jalili, R., and Niamanesh, M. "Attack and Fault Tolerance Through Dependable Middleware” Proceedings of the Seventh Annual Iranian Computer Society Conference (ICSC'2002), Iran Telecommunication Center, pp. 365-372, 2002.
  106. Jalili, R., and Heydari, M. A. "Quality of Service in Virtual Private Networks” Proceedings of the First Iranian Cryptography Conference, Imam Hossein University, Tehran, Iran, pp.221-235, 2002.
  107. Jalili, R. Samadi, M., and Shahriari, H. R. "FireHack: A Tool for Firewalls Security Evaluation” Proceedings of the First Iranian Cryptography Conference, Imam Hossein University, Tehran, Iran, pp. 73-82, 2002.
  108. Jalili, R. and Rezvani, M. "High Level Security Policy Specification in Firewalls”, Proceedings of the First Iranian Cryptography Conference, Imam Hossein University, Tehran, Iran, pp. 105-116, 2002.
  109. Jalili, R. and PourReza, H. et al "Hadid Firewall, toward an Integrated Secure Computer Networks”, Proceedings of the 1st Iranian Military Information Dissemination, Tehran, I271-286, 2001.
  110. Jalili, R. and YusefZadeh, H. "Statefulness and Address Translation in a Packet Filter”, Proceedings of the Sixth Annual Iranian Computer Society Conference (ICSC'2001), University of Isfahan, Isfahan, Iran, pp. 491-500, 2001.
  111. Jalili, R. and Feili, H. "An Evaluation of Concurrency Control Mechanisms in Database Systems", Proceedings of the Fifth Iranian Computer Society Conference (ICSC'2000), Shahid Beheshti University, Tehran, Iran, pp. 113-123, 2000.
  112. Jalili, R. and Pirayesh, A. R. "Persistance in the Sharif Operating System ", Proceedings of the Fourth Iranian Computer Society Conference (ICSC'98), Sharif University of Technology, Tehran, Iran, pp. 71-80, 1998.
  113. Jalili, R. and Sadri, B. and Lavassani, M. "NFS Version 3 Implementation and Optimization: Our Experience on Linux", Proceedings of the Third Iranian Computer Society Conference (ICSC'97), Iran University of Science and Technology, Tehran, Iran, pp. 119-125, 1997.
  114. Jalili, R. and Salek, A.."Protection in the Sharif Operating System", Proceedings of the Third Iranian Computer Society Conference (ICSC'97), Iran University of Science and Technology, Tehran, Iran, pp. 244-250(F),1997.
  115. Jalili, R. and Zare, R."POURIA: A Persistent Extension to C++", Proceedings of the Second Iranian Computer Society Conference (ICSC'96), Amir Kabir University of Technology, Tehran, Iran, pp. 1-8,1996.
  116. Jalili, R. and Henskens, F. A."Stable-Copy Replication of Highly Available Stable Distributed Persistent Stores", Proceedings of the Second Iranian Computer Society Conference (ICSC'96), Amir Kabir University of Technology, Tehran, Iran, pp. 78-86,1996.
  117. Jalili, R. and Henskens, F. A."Management of Inter-Entity Dependencies using Directed Dependency Graphs", Proceedings of the First Iranian Computer Society Conference (ICSC'95), Sharif University of Technology, Tehran, Iran, pp. 210-218,1995.
  118. Heskens, F. A., Koch, D. M., Jalili, R., Rosenberg, J. "Hardware Support for Stability in a Persistent Architecture", Proceedings of the 6th International Workshop on Persistent Object Stores, Tarascon, France, Springer-Verlag, pp. 387-399, 1994.
  119. Jalili, R. and Henskens, F. A. "Reducing the Extent of Cascadable Operations in Stable Distributed Persistent Stores", Proceedings of the 18th Australian Computer Science Conference (ACSC'95), Adelaide, Australia, vol 1, pp. 227-236, 1995.
  120. Jalili, R. and Henskens, F. A. "Operating System Support for Object Dependencies in Persistent Object Stores", Proceedings of the Workshop on Object-Oriented Real-Time Dependable Systems (WORDS'94), Dana Point, California, IEEE Computer Society Press, pp. 21-29, 1994.