DLLMiner: structural mining for malware detection M Narouei, M Ahmadi, G Giacinto, H Takabi, A Sami Security and Communication Networks 8 (18), 3311-3322, 2015 | 61 | 2015 |
Towards a top-down policy engineering framework for attribute-based access control M Narouei, H Khanpour, H Takabi, N Parde, R Nielsen proceedings of the 22nd ACM on Symposium on Access Control Models and …, 2017 | 49 | 2017 |
Automatic extraction of access control policies from natural language documents M Narouei, H Takabi, R Nielsen IEEE Transactions on Dependable and Secure Computing 17 (3), 506-517, 2018 | 42 | 2018 |
Towards an automatic top-down role engineering approach using natural language processing techniques M Narouei, H Takabi Proceedings of the 20th ACM Symposium on Access Control Models and …, 2015 | 29 | 2015 |
Identification of access control policy sentences from natural language policy documents M Narouei, H Khanpour, H Takabi Data and Applications Security and Privacy XXXI: 31st Annual IFIP WG 11.3 …, 2017 | 22 | 2017 |
Automatic top-down role engineering framework using natural language processing techniques M Narouei, H Takabi IFIP International Conference on Information Security Theory and Practice …, 2015 | 17 | 2015 |
A nature-inspired framework for optimal mining of attribute-based access control policies M Narouei, H Takabi Security and Privacy in Communication Networks: 15th EAI International …, 2019 | 9 | 2019 |
SePaS: Word sense disambiguation by sequential patterns in sentences M NAROUEI, M AHMADI, A SAMI Natural Language Engineering, 1-19, 2013 | 5 | 2013 |
A novel approach toward spam detection based on iterative patterns M Razmara, B Asadi, M Narouei, M Ahmadi 2012 2nd International eConference on Computer and Knowledge Engineering …, 2012 | 4 | 2012 |
Textual spam detection: An iterative pattern mining approach M Razmara, A Razmara, M Narouei World Applied Sciences Journal 20 (2), 198-204, 2012 | 3 | 2012 |
A Novel Approach Toward Spam Detection Based on Iterative Patterns per Text M Razmara, B Asadi, M Narouei, M Ahmadi International eConference on Computer and Knowledge Engineering (ICCKE) 3, 3-8, 2012 | 2 | 2012 |
Mining Modules’ Dependencies for Malware Detection M Narouei, M Ahmadi, A Sami | 1 | 2012 |
A Top-Down Policy Engineering Framework for Attribute-Based Access Control M Narouei University of North Texas, 2020 | | 2020 |
Mining Attribute-based Access Control Policies by Taking Aspirations from Particle Swarm Optimization Algorithm M Narouei, H Takabi, L Adams Poster in 2017 Annual Computer Security Applications conference (ACSAC'17), 2017 | | 2017 |
Structural Mining for Malware Detection BY Masoud Narouei, Mansour Ahmadi, Ashkan Sami, Marco Vieira Poster Reception with light refreshments in Annual Computer Security …, 2014 | | 2014 |