Loading...
Search for: jalili--m
0.133 seconds

    Specification and verification of security policies in firewalls

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) ; Volume 2510 , 2002 , Pages 154-163 ; 03029743 (ISSN) Jalili, R ; Rezvani, M ; Sharif University of Technology
    2002
    Abstract
    Rules are used as a way of managing and configuring firewalls to fulfill security requirements in most cases. Managers have to specify their organizational security policies using low level and order-dependent rules. Furthermore, dependency of firewalls to the network topology, frequent changes in network topology (specially in dynamic networks), and lack of a method for analysis and verification of specified security policy may reduce to inconsistencies and security holes. Existence of a higher level environment for security policy specification can rectify part of the problems. In this paper we present a language for high level and formal specification of security policy in firewalls.... 

    Immunizing complex networks with limited budget

    , Article EPL ; Volume 98, Issue 3 , 2012 ; 02955075 (ISSN) Mirzasoleiman, B ; Babaei, M ; Jalili, M ; Sharif University of Technology
    2012
    Abstract
    In this letter we studied the epidemic spreading on scale-free networks assuming a limited budget for immunization. We proposed a general model in which the immunity of an individual against the disease depends on its immunized friends in the network. Furthermore, we considered the possibility that each individual might be eager to pay a price to buy the vaccine and become immune against the disease. Under these assumptions we proposed an algorithm for improving the performance of all previous immunization algorithms. We also introduced a heuristic extension of the algorithm, which works well in scale-free networks  

    Recommender systems for social networks analysis and mining: Precision versus diversity

    , Article Understanding Complex Systems ; Volume 73 , 2016 , Pages 423-438 ; 18600832 (ISSN) Javari, A ; Izadi, M ; Jalili, M ; Sharif University of Technology
    Springer Verlag  2016
    Abstract
    Recommender systems has become increasingly important in online community for providing personalized services and products to users. Traditionally, performance of recommender algorithms has been evaluated based on accuracy and the focus of the research was on providing accurate recommendation lists. However, recently diversity and novelty of recommendation lists have been introduced as key issues in designing recommender systems. In general, novelty/diversity and accuracy do not go hand in hand. Therefore, designing models answering novelty/diversityaccuracy dilemma is one of the challenging problems in the context of practical recommender systems. In this paper, we first introduce the... 

    Cascaded failures in weighted networks

    , Article Physical Review E - Statistical, Nonlinear, and Soft Matter Physics ; Volume 84, Issue 4 , 2011 ; 15393755 (ISSN) Mirzasoleiman, B ; Babaei, M ; Jalili, M ; Safari, M ; Sharif University of Technology
    2011
    Abstract
    Many technological networks can experience random and/or systematic failures in their components. More destructive situations can happen if the components have limited capacity, where the failure in one of them might lead to a cascade of failures in other components, and consequently break down the structure of the network. In this paper, the tolerance of cascaded failures was investigated in weighted networks. Three weighting strategies were considered including the betweenness centrality of the edges, the product of the degrees of the end nodes, and the product of their betweenness centralities. Then, the effect of the cascaded attack was investigated by considering the local weighted flow... 

    Reservoir optimization in recurrent neural networks using properties of kronecker product

    , Article Logic Journal of the IGPL ; Volume 18, Issue 5 , 2009 , Pages 670-685 ; 13670751 (ISSN) Ajdari Rad, A ; Hasler, M ; Jalili, M ; Sharif University of Technology
    2009
    Abstract
    Recurrent neural networks based on reservoir computing are increasingly being used in many applications. Optimization of the topological structure of the reservoir and the internal connection weights for a given task is one of the most important problems in reservoir computing. In this paper, considering the fact that one can construct a large matrix using Kronecker products of several small-size matrices, we propose a method to optimize the reservoir. Having a small number of parameters to optimize, a gradient based algorithm is applied to optimize parameters, and consequently the reservoir. In addition to reducing the number of parameters for optimization, potentially, the method is able... 

    Constructing brain functional networks from EEG: Partial and unpartial correlations

    , Article Journal of Integrative Neuroscience ; Volume 10, Issue 2 , 2011 , Pages 213-232 ; 02196352 (ISSN) Jalili, M ; Knyazeva, M. G ; Sharif University of Technology
    2011
    Abstract
    We consider electroencephalograms (EEGs) of healthy individuals and compare the properties of the brain functional networks found through two methods: unpartialized and partialized cross-correlations. The networks obtained by partial correlations are fundamentally different from those constructed through unpartial correlations in terms of graph metrics. In particular, they have completely different connection efficiency, clustering coefficient, assortativity, degree variability, and synchronization properties. Unpartial correlations are simple to compute and they can be easily applied to large-scale systems, yet they cannot prevent the prediction of non-direct edges. In contrast, partial... 

    EEG-based functional networks in schizophrenia

    , Article Computers in Biology and Medicine ; Volume 41, Issue 12 , 2011 , Pages 1178-1186 ; 00104825 (ISSN) Jalili, M ; Knyazeva, M. G ; Sharif University of Technology
    2011
    Abstract
    Schizophrenia is often considered as a dysconnection syndrome in which, abnormal interactions between large-scale functional brain networks result in cognitive and perceptual deficits. In this article we apply the graph theoretic measures to brain functional networks based on the resting EEGs of fourteen schizophrenic patients in comparison with those of fourteen matched control subjects. The networks were extracted from common-average-referenced EEG time-series through partial and unpartial cross-correlation methods. Unpartial correlation detects functional connectivity based on direct and/or indirect links, while partial correlation allows one to ignore indirect links. We quantified the... 

    Flexible wheel/rail contact model for railway vehicle dynamics without pre-calculation

    , Article 2007 ASME Rail Transportation Division Fall Conference, Chicago, IL, 11 September 2007 through 12 September 2007 ; 2007 , Pages 87-93 ; 10788883 (ISSN) ; 9780791848005 (ISBN) Durali, M ; Salehi, S. H ; Jalili, M. M ; Sharif University of Technology
    2007
    Abstract
    An advanced method using progressive concept of geometrical correspondence is applied to create a new wheel/rail contact model based on virtual penetration theory. The geometry and contact mechanism are solved simultaneously because of the independency in a defined correspondence. The model takes the penetrated profiles of wheel and rail and also associated creeps as inputs, and produces driving contact forces as output. The advantage of this model is that it doesn't require pretabulation of rigid contact situation. The method allows calculating flexible, non-elliptical, multiple contact patches during integration of the model. Consequently the rails with substructures can vibrate separately... 

    A trust and reputation-based access control model for virtual organizations

    , Article 2012 9th International ISC Conference on Information Security and Cryptology, ISCISC 2012, 13 September 02012 through 14 September 2012 ; September , 2012 , Pages 121-127 ; 9781467323864 (ISBN) Arasteh, M ; Amini, M ; Jalili, R ; Sharif University of Technology
    2012
    Abstract
    Virtual organization (VO) is aimed to provide inter-organizational collaborations. Constructing a VO necessitates provision of security and access control requirements which cannot be satisfied using the traditional access control models. This is basically due to special features of VOs; such as temporality, unknown users, and diverse resources. In this paper, after expressing our assumption on a framework for VOs; the concept of organizational trust and reputation is used to establish an access control model for VOs. Each member of an organization inherits its organizational reputation. Resource providers announce the behavior of their interacting users to their organization manager.... 

    Cascading failure tolerance of modular small-world networks

    , Article IEEE Transactions on Circuits and Systems II: Express Briefs ; Volume 58, Issue 8 , 2011 , Pages 527-531 ; 15497747 (ISSN) Babaei, M ; Ghassemieh, H ; Jalili, M ; Sharif University of Technology
    2011
    Abstract
    Many real-world networks have a modular structure, and their component may undergo random errors and/or intentional attacks. More devastating situations may happen if the network components have a limited load capacity; the errors and attacks may lead to a cascading component removal process, and consequently, the network may lose its desired performance. In this brief, we investigate the tolerance of cascading errors and attacks in modular small-world networks. This brief studies the size of the largest connected component of the networks when cascading errors or attacks occur. The robustness of the network is tested as a function of both the intermodular connection and intramodular... 

    Rewiring dynamical networks with prescribed degree distribution for enhancing synchronizability

    , Article Chaos ; 2010 , Volume 20, Issue 4 ; 10541500 (ISSN) Dadashi, M ; Barjasteh, I ; Jalili, M ; Sharif University of Technology
    American Institute of Physics Inc  2010
    Abstract
    In this paper, we present an algorithm for enhancing synchronizability of dynamical networks with prescribed degree distribution. The algorithm takes an unweighted and undirected network as input and outputs a network with the same node-degree distribution and enhanced synchronization properties. The rewirings are based on the properties of the Laplacian of the connection graph, i.e., the eigenvectors corresponding to the second smallest and the largest eigenvalues of the Laplacian. A term proportional to the eigenvectors is adopted to choose potential edges for rewiring, provided that the node-degree distribution is preserved. The algorithm can be implemented on networks of any sizes as... 

    Specification of history based constraints for access control in conceptual level

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 17 December 2010 through 19 December 2010, Gandhinagar ; Volume 6503 LNCS , 2010 , Pages 186-200 ; 03029743 (ISSN) ; 9783642177132 (ISBN) Faghih, F ; Amini, M ; Jalili, R ; Sharif University of Technology
    2010
    Abstract
    An access control model for Semantic Web should take the semantic relationships among the entities, defined in the abstract conceptual level (i.e., ontology level), into account. Authorization and policy specification based on a logical model let us infer implicit security policies from the explicit ones based on the defined semantic relationships in the domains of subjects, objects, and actions. In this paper, we propose a logic based access control model for specification and inference of history-constrained access policies in conceptual level of Semantic Web. The proposed model (named TDLBAC-2) enables authorities to state policy rules based on the history of users' accesses using a... 

    A temporal description logic based access control model for expressing history constrained policies in semantic web

    , Article Proceedings - 2009 IEEE International Symposium on Policies for Distributed Systems and Networks, POLICY 2009, 20 July 2009 through 22 July 2009, London ; 2009 , Pages 142-149 ; 9780769537429 (ISBN) Faghih, F ; Amini, M ; Jalili, R ; Sharif University of Technology
    2009
    Abstract
    An access control model for Semantic Web should be compatible with the corresponding semantic model. The access control procedure(s) should also take the semantic relationships between the entities (specified as ontologies) into account. Considering the benefits of logic-based models and the description logic foundation of Semantic Web, in this paper, we propose an access control model based on a temporal variant of description logics (TL-ALCF). This logical schema enables us to express history constrained policies to enrich the policy-base with dynamic properties based on previous accesses. The specification of each component of the model as well as the approach to define history... 

    DSCA: an inline and adaptive application identification approach in encrypted network traffic

    , Article 3rd International Conference on Cryptography, Security and Privacy, ICCSP 2019 with Workshop 2019 the 4th International Conference on Multimedia and Image Processing, ICMIP 2019, 19 January 2019 through 21 January 2019 ; 2019 , Pages 39-43 ; 9781450366182 (ISBN) Nazari, Z ; Noferesti, M ; Jalili, R ; Sharif University of Technology
    Association for Computing Machinery  2019
    Abstract
    Adaptive application detection in today's high-bandwidth networks is resource consuming and inaccurate due to the high volume, velocity, and variety characteristics of the networks traffic. To generate a robust classifier for identifying applications over encrypted traffic, we proposed DSCA as a DPI-based Stream Classification Algorithm. DSCA utilizes applications detected by the DPI, Deep Packet Inspection technique, as ground truth data and updates the classification model accordingly. To reduce the classification algorithms overhead without accuracy reduction, a feature selection method, named CfsSubsetEval, is deployed in DSCA. The proposed approach is implemented via the MOA tool and... 

    Improved user identity confidentiality for UMTS mobile networks

    , Article ECUMN 2007: Fourth European Conference on Universal Multiservice Networks, Toulouse, 14 February 2007 through 16 February 2007 ; 2007 , Pages 401-409 ; 076952768X (ISBN); 9780769527680 (ISBN) Sattarzadeh, B ; Asadpour, M ; Jalili, R ; Sharif University of Technology
    2007
    Abstract
    In UMTS mobile networks, there are some circumstances that the International Mobile Subscriber Identity (IMSI) of a user is conveyed in clear-text over the radio interface. Such situations violate the anonymity of users. In this paper, we introduce an Improved User Identity Confidentiality (IUIC) mechanism which attempts to avoid the drawback and makes users more anonymous. We give the role of IMSI to anonymous tickets in such a way that IMSI is never exposed on the radio interface or over any other link. Our IUIC mechanism, employs symmetric cryptography based on the existing network access security features of UMTS. Its implementation, security, and performance issues are also considered.... 

    An Improved replacement algorithm in fault-tolerant meshes

    , Article SCSC '07: Proceedings of the 2007 Summer Computer Simulation Conference 2007, Part of the 2007 Summer Simulation Multiconference, SummerSim 2007, San Diego, CA, 15 July 2007 through 18 July 2007 ; Volume 1 , 2007 , Pages 443-448 ; 9781622763580 (ISBN) Jalili, S ; Movaghar, A ; Sadrmousav, M ; Sharif University of Technology
    2007
    Abstract
    Since the failure of resources fatally affects processor allocation, a fault tolerant service is essential in the interconnection networks. In this paper, a new fault tolerant method is proposed and evaluated in the hybrid processor allocation scheme, which we have introduced in our previous work. Our task consists of two independent phases. First, the allocation process executes to allocate an efficient set of processors to the requested submesh. The second phase comes to work when the faulty nodes are detected in the allocated spaces. The selected processor allocation scheme allows jobs to be executed without waiting, provided that the number of processors is sufficient in the system and... 

    Separation of duty in role-based access control model through fuzzy relations

    , Article 3rd Internationl Symposium on Information Assurance and Security, IAS 2007, Manchester, 20 August 2007 through 31 August 2007 ; September , 2007 , Pages 125-130 ; 0769528767 (ISBN); 9780769528762 (ISBN) Takabi, H ; Amini, M ; Jalili, R ; Sharif University of Technology
    2007
    Abstract
    As a security principle, separation of duty (SoD) is widely considered in computer security. In the role-based access control(RBAC) model, separation of duty constraints enforce conflict of interest policies. There are two main types of separation of duty policies in RBAC, Static SoD (SSoD) and Dynamic SoD (DSoD). In RBAC, Statically Mutually Exclusive Role (SMER) constraints are used to enforce Static Separation of Duty policies. Dynamic Separation of duty policies, like SSoD policies, are intended to limit the permissions that are available to a user. However, DSoD policies differ from SSoD policies by the context in which these limitations are imposed. A DSoD policy limits the... 

    Enhancing role-based access control model through fuzzy relations

    , Article 3rd Internationl Symposium on Information Assurance and Security, IAS 2007, Manchester, 20 August 2007 through 31 August 2007 ; September , 2007 , Pages 131-136 ; 0769528767 (ISBN); 9780769528762 (ISBN) Takabi, H ; Amini, M ; Jalili, R ; Sharif University of Technology
    2007
    Abstract
    Role-Based Access Control (RBAC) model is naturally suitable to organizations where users are assigned organizational roles with well-defined privileges. However, due to the large number of users in nowadays online services of organizations and enterprises, assigning users to roles is a tiresome task and maintaining user-role assignment up- to-date is costly and error-prone. Additionally, with the increasing number of users, RBAC may have problems in prohibiting cheat and changing roles of users. In order to categorize information and formulate security policies, human decision making is required which is naturally fuzzy in the real world. This leads using a fuzzy approach to address the... 

    Trust-based user-role assignment in Role-Based Access Control

    , Article 2007 IEEE/ACS International Conference on Computer Systems and Applications, AICCSA 2007, Amman, 13 May 2007 through 16 May 2007 ; June , 2007 , Pages 807-814 ; 1424410312 (ISBN); 9781424410316 (ISBN) Takabi, H ; Amini, M ; Jalili, A ; Sharif University of Technology
    2007
    Abstract
    Role Based Access Control (RBAC) model is naturally suitable to organizations where users are assigned organizational roles with well-defined privileges. Nowadays, many organizations and enterprises such as banks, insurance industry and utility companies, provide online services to their veiy large number of users. This shows that assigning users to roles is a intolerable task and maintaining user-role assignment up-to-date is costly and error-prone. Also, with the increasing number of users, RBAC may have problems in prohibiting cheat and changing roles of users. To overcome these problems, user-role assignment decision can be made based on how much we trust him/her. In this paper, we... 

    A logic for multi-domain authorization considering administrators

    , Article 9th IEEE Workshop on Policies for Distributed Systems and Networks, POLICY 2008, Palisades, NY, 2 June 2008 through 4 June 2008 ; 2008 , Pages 189-196 ; 9780769531335 (ISBN) Iranmanesh, Z ; Amini, M ; Jalili, R ; Sharif University of Technology
    2008
    Abstract
    In multi-domain environments, authorization policies for each administrative domain are determined by either one administrator or through cooperation of multiple administrators. Proposed logic-based models for multi-domain environments' authorization neither consider an administrator as the legislator of a policy in policies' representation nor specify the domain of a policy explicitly. Considering legislators in policy specification provides the possibility of presenting composite administration and utilizing administrators' characteristics in policy analysis such as conflict resolution. In this paper, we propose the syntax, proof theory, and semantics of a logic in which administrators are...