Loading...
Search for:
lajevardi--a--m
0.21 seconds
Total 25316 records
A semantic-based correlation approach for detecting hybrid and low-level APTs
, Article Future Generation Computer Systems ; Volume 96 , 2019 , Pages 64-88 ; 0167739X (ISSN) ; Amini, M ; Sharif University of Technology
Elsevier B.V
2019
Abstract
Sophisticated and targeted malwares, which today are known as Advanced Persistent Threats (APTs), use multi-step, distributed, hybrid and low-level patterns to leak and exfiltrate information, manipulate data, or prevent progression of a program or mission. Since current intrusion detection systems (IDSs) and alert correlation systems do not correlate low-level operating system events with network events and use alert correlation instead of event correlation, the intruders use low and hybrid events in order to distribute the attack vector, hide malwares behaviors, and therefore make detection difficult for such detection systems. In this paper, a new approach for detecting hybrid and...
Big knowledge-based semantic correlation for detecting slow and low-level advanced persistent threats
, Article Journal of Big Data ; Volume 8, Issue 1 , 2021 ; 21961115 (ISSN) ; Amini, M ; Sharif University of Technology
Springer Science and Business Media Deutschland GmbH
2021
Abstract
Targeted cyber attacks, which today are known as Advanced Persistent Threats (APTs), use low and slow patterns to bypass intrusion detection and alert correlation systems. Since most of the attack detection approaches use a short time-window, the slow APTs abuse this weakness to escape from the detection systems. In these situations, the intruders increase the time of attacks and move as slowly as possible by some tricks such as using sleeper and wake up functions and make detection difficult for such detection systems. In addition, low APTs use trusted subjects or agents to conceal any footprint and abnormalities in the victim system by some tricks such as code injection and stealing...
Multifaceted service identification: Process, requirement and data
, Article Computer Science and Information Systems ; Volume 13, Issue 2 , 2016 , Pages 335-358 ; 18200214 (ISSN) ; Parsa, S ; Mohammadzade Lajevardi, A ; Sharif University of Technology
ComSIS Consortium
2016
Abstract
Service Identification is one of the most important phases in serviceoriented development methodologies. Although several service identification methods tried to identify services automatically or semi-automatically, various aspects of business domain are not taken into account simultaneously. To overcome this issue, three strategies from three different aspects of business domain are combined for semi-automated identification of services in this article. At first, the tasks interconnections within the business processes are considered. Then, based on the common supporting requirements, another tasks dependency has been determined and finally, regarding the significant impact of data in...
Markhor: malware detection using fuzzy similarity of system call dependency sequences
, Article Journal of Computer Virology and Hacking Techniques ; 2021 ; 22638733 (ISSN) ; Parsa, S ; Amiri, M. J ; Sharif University of Technology
Springer-Verlag Italia s.r.l
2021
Abstract
Static malware detection approaches are time-consuming and cannot deal with code obfuscation techniques. Dynamic malware detection approaches, on the other hand, address these two challenges, however, suffer from behavioral ambiguity, such as the system calls obfuscation. In this paper, we introduce Markhor, a dynamic and behavior-based malware detection approach. Markhor uses system call data dependency and system call control dependency sequences to create a weighted list of malicious patterns. The list is then used to determine the malicious processes. Next, the similarity of a file system call sequences to a malicious pattern is extracted based on a fuzzy algorithm and the file nature is...
prediction of time to failure in stress corrosion cracking of 304 stainless steel in aqueous chloride solution by artificial neural network
, Article Protection of Metals and Physical Chemistry of Surfaces ; Volume 45, Issue 5 , 2009 , Pages 610-615 ; 20702051 (ISSN) ; Shahrabi, T ; Baigi, V ; Shafiei, A. M ; Sharif University of Technology
2009
Abstract
Despite the numerous researches in Stress Corrosion Cracking (SCC) risk of austenitic stainless steels in aqueous chloride solution, no formulation or reliable method for prediction of time to failure as a result of SCC has yet been defined. In this paper, the capability of artificial neural network for estimation of the time to failure for SCC of 304 stainless steel in aqueous chloride solution together with sensitivity analysis has been expressed. The output results showed that artificial neural network can predict the time to failure for about 74% of the variance of SCC experimental data. Furthermore, the sensitivity analysis also demonstrated the effects of input parameters (Temperature,...
Preparation, physicochemical properties, in vitro evaluation and release behavior of cephalexin-loaded niosomes
, Article International Journal of Pharmaceutics ; Volume 569 , 2019 ; 03785173 (ISSN) ; Akbarzadeh, I ; Tavakkoli Yaraki, M ; Lajevardi, A ; Fatemizadeh, M ; Heidarpoor Saremi, L ; Sharif University of Technology
Elsevier B.V
2019
Abstract
In this study, optimized cephalexin-loaded niosomal formulations based on span 60 and tween 60 were prepared as a promising drug carrier system. The niosomal formulations were characterized using a series of techniques such as scanning electron microscopy, Fourier transformed infrared spectroscopy, dynamic light scattering, and zeta potential measurement. The size and drug encapsulation efficiency are determined by the type and composition of surfactant. The developed niosomal formulations showed great storage stability up to 30 days with low change in size and drug entrapment during the storage, making them potential candidates for real applications. Moreover, the prepared niosomes showed...
Association between human leukocyte antigens and cutaneous adverse drug reactions to antiepileptics and antibiotics in the Iranian population
, Article Dermatologic Therapy ; Volume 35, Issue 5 , 2022 ; 13960296 (ISSN) ; Rostami, A ; Firooz, A ; Esmaili, N ; Ghiasi, M ; Lajevardi, V ; Amirzargar, A. A ; Sheykhi, I ; Khamesipour, A ; Akhdar, M ; Sharif University of Technology
John Wiley and Sons Inc
2022
Abstract
In this case–control study, class І and ІІ human leukocyte antigen (HLA) alleles in Iranian patients with benign and severe cutaneous adverse drug reactions (CADRs) due to aromatic anticonvulsants and antibiotics were evaluated. Patients diagnosed with CADRs (based on clinical and laboratory findings) with a Naranjo score of ≥ 4 underwent blood sampling and HLA-DNA typing. The control group comprised 90 healthy Iranian adults. Alleles with a frequency of more than two were reported. Deviations from Hardy–Weinberg equilibrium were not observed. Eighty patients with CADRs including 54 females and 26 males with a mean age of 41.49 ± 16.08 years were enrolled in this study. The culprit drugs...
Markhor: malware detection using fuzzy similarity of system call dependency sequences
, Article Journal of Computer Virology and Hacking Techniques ; Volume 18, Issue 2 , 2022 , Pages 81-90 ; 22638733 (ISSN) ; Parsa, S ; Amiri, M. J ; Sharif University of Technology
Springer-Verlag Italia s.r.l
2022
Abstract
Static malware detection approaches are time-consuming and cannot deal with code obfuscation techniques. Dynamic malware detection approaches, on the other hand, address these two challenges, however, suffer from behavioral ambiguity, such as the system calls obfuscation. In this paper, we introduce Markhor, a dynamic and behavior-based malware detection approach. Markhor uses system call data dependency and system call control dependency sequences to create a weighted list of malicious patterns. The list is then used to determine the malicious processes. Next, the similarity of a file system call sequences to a malicious pattern is extracted based on a fuzzy algorithm and the file nature is...
Investigation and Management of the Risk of Musculoskeletal Injury in Workers of Irankhodro Assembly Line by Using Qualitative and Quantitative Tools in Occupational Biomechanics
, M.Sc. Thesis Sharif University of Technology ; Arjmand, Navid (Supervisor)
Abstract
According to epidemiological studies, low back pain is the most prevalent musculoskeletal disease thus indicating the important role of biomechanical engineers to manage risk of injury. Different quantitative (i.e., biomechanical models) and qualitative (empirical) assessment tools are used to evaluate risk of musculoskeletal injuries. The present study uses various quantitative and qualitative risk assessment tools to investigate the risk of injury among workers in Iran Khodro Automaker company (IKCO) assembly hall No. 3 (Pars Peugeot car assembly). Moreover, different engineering and administrative interventions are suggested to manage risk of musculoskeletal injuries when needed. The...
Optimized doxycycline-loaded niosomal formulation for treatment of infection-associated prostate cancer: An in-vitro investigation
, Article Journal of Drug Delivery Science and Technology ; Volume 57 , 2020 ; Tavakkoli Yaraki, M ; Bourbour, M ; Noorbazargan, H ; Lajevardi, A ; Sadat Shilsar, S. M ; Heidari, F ; Mousavian, S. M ; Sharif University of Technology
Editions de Sante
2020
Abstract
Developing drug delivery systems with both antibacterial and anti-cancer effects is of importance in the treatment process of infection-associated cancers, especially prostate cancer. In this study, Span 60, Tween 60, and cholesterol were used to formulate doxycycline-loaded niosomes as a promising drug carrier system as either antibacterial or anticancer formulation. The formulation process was optimized by multi-objective response surface methodology (RSM), and then characterized. The developed niosomal formulation showed great storage stability for up to 2 weeks. In addition, they showed remarkable drug release in acidic solution (pH = 3) compared with physiological pH (7.4). The in-vitro...
Ontology-based Advanced Persistent Attacks Detection
, Ph.D. Dissertation Sharif University of Technology ; Amini, Morteza (Supervisor)
Abstract
Advanced Persistent Threats (APTs), use hybrid, slow, and low-level patterns to leak and exfiltrate information, manipulate data, or prevent progression of a program or mission. Since current intrusion detection systems (IDSs) and alert correlation systems do not correlate low-level operating system events with network events and use alert correlation instead of event correlation, the intruders use low and hybrid events in order to make detection difficult for such detection systems. In addition, these attacks use low and slow patterns to bypass intrusion detection and alert correlation systems. Since most of the attack detection approaches use a short time-window, the slow APTs abuse this...
Recent advances in porphyrin-based nanocomposites for effective targeted imaging and therapy
, Article Biomaterials ; Volume 232 , 2020 ; Tavakkoli Yaraki, M ; Mokhtari Garakani, S ; Mokhtari Garakani, S ; Ahmadi, S ; Lajevardi, A ; Bagherzadeh, M ; Rabiee, M ; Tayebi, L ; Tahriri, M ; Hamblin, M. R ; Sharif University of Technology
Elsevier Ltd
2020
Abstract
Porphyrins are organic compounds that continue to attract much theoretical interest, and have been called the “pigments of life”. They have a wide role in photodynamic and sonodynamic therapy, along with uses in magnetic resonance, fluorescence and photoacoustic imaging. There is a vast range of porphyrins that have been isolated or designed, but few of them have real clinical applications. Due to the hydrophobic properties of porphyrins, and their tendency to aggregate by stacking of the planar molecules they are difficult to work with in aqueous media. Therefore encapsulating them in nanoparticles (NPs) or attachment to various delivery vehicles have been used to improve delivery...
New Approuches to Logical Paradoxes
, M.Sc. Thesis Sharif University of Technology ; Ardeshir, Mohammad (Supervisor) ; Lajevardi, Kaave (Supervisor)
Abstract
This dissertation consists of five parts. In the fist part we draw a scheme of Logical Paradoxes: What is a paradox, what are logical paradoxes, different versions of logical paradoxes, etc. The three next parts are respectively about: Tarski’s Hierarchy Approach, Kripke’s Fixed Point Theory and Herzberger and Gupta’s Revision Theory of Truth. In the end of each of these three parts, we consider some critics. In the last part, we introduce our new approach. This is based on a new concept called Pseudo-Contradiction. Relative to a (consistent) set S of axioms, a sentence φ is a Pseudo-contradiction if and only if both φ and ¬φ are inconsistent with S. We try to show the Liar sentence can be...
Theoretical study of high repetition rate short pulse generation with fiber optical parametric amplification [electronic resource]
, Article Journal of Lightwave Technology ; May 2012, Volume 30, Issue 9, PP. 1263-1268 ; Ariaei, A. M ; Jadidi, M. M ; Salehi, J. A ; Sharif Unversity of Technology
Abstract
In this paper, we study theoretically the generation of high repetition rate short pulses using fiber optical parametric amplification. We show that the pulse shape and duration depend on the signal location relatively to the pump frequency. We demonstrate that in order to get the shortest pulse width, the signal must be located at one of the extremities of the gain spectrum associated with the pump peak power. We derive the analytical expression of the pulse shape in this case and compare it to the exponential gain regime case. Using numerical simulations, we also analyze the impact of walk-off and pump phase modulation that is required to suppress Stimulated Brillouin Scattering and derive...
A novel omega shaped microwave absorber with wideband negative refractive index for C-band applications
, Article Optik ; Volume 242 , 2021 ; 00304026 (ISSN) ; Baqir, M. A ; Iftikhar, A ; Ali, M. M ; Rahim, A. A ; Niaz Akhtar, M ; Mughal, M. J ; Naqvi, S. A ; Sharif University of Technology
Elsevier GmbH
2021
Abstract
This paper reports a polarization controllable and angle-insensitive perfect metamaterial absorber (PMA). The proposed PMA consists of periodically arranged asymmetric omega-shaped resonators made of metallic copper. The absorptivity was analyzed considering the microwave C-band from 4 GHz to 8 GHz. The proposed PMA shows an absorption peak with almost 100% absorptivity at 6.2 GHz. Also, wideband negative index of refraction is observed. Further, the absorber is inspected for the different rotation angles of the top metasurface (omega-shaped ring) along the optical axis, and obliquity of incidence angle for both TE and TM polarized waves. Moreover, surface electric field and surface current...
Formal process algebraic modeling, verification, and analysis of an abstract Fuzzy Inference Cloud Service
, Article Journal of Supercomputing ; Vol. 67, issue. 2 , February , 2014 , pp. 345-383 ; Online ISSN: 1573-0484 ; Rahmani, A. M ; Movaghar, A ; Teshnehlab, M
2014
Abstract
In cloud computing, services play key roles. Services are well defined and autonomous components. Nowadays, the demand of using Fuzzy inference as a service is increasing in the domain of complex and critical systems. In such systems, along with the development of the software, the cost of detecting and fixing software defects increases. Therefore, using formal methods, which provide clear, concise, and mathematical interpretation of the system, is crucial for the design of these Fuzzy systems. To obtain this goal, we introduce the Fuzzy Inference Cloud Service (FICS) and propose a novel discipline for formal modeling of the FICS. The FICS provides the service of Fuzzy inference to the...
Impact of holmium on structural, dielectric and magnetic properties of Cu–Zn spinel ferrites synthesized via sol–gel route
, Article Journal of Materials Science: Materials in Electronics ; Volume 32, Issue 2 , 2021 , Pages 2205-2218 ; 09574522 (ISSN) ; Khan, M. A ; Hussain, A ; Akhtar, M. N ; Ahmad, M ; Javid, M. A ; Sharif University of Technology
Springer
2021
Abstract
The mixed nano-ferrites materials Cu0.6Zn0.4HoxFe2−xO4 (0.00 ≤ x ≤ 0.12) were prepared via the sol–gel auto combustion technique. The TGA curve established the annealing temperature (500 °C) for phase formation. The single exothermic peak on the DSC plot occurred at 341 °C temperature. XRD patterns of these nano ferrites verified single phase formation of the FCC cubic structure. The lattice constant a was increased from 8.4244 to 8.4419 Å and then its value decreased to 8.4319 Å. Crystallite size was found in the range of 7 to 16 nm. The surface morphology of the samples was observed from the scanning electron microscope (SEM) images. The grain size was found within the range of 90 nm to...
Impact of holmium on structural, dielectric and magnetic properties of Cu–Zn spinel ferrites synthesized via sol–gel route
, Article Journal of Materials Science: Materials in Electronics ; Volume 32, Issue 2 , 2021 , Pages 2205-2218 ; 09574522 (ISSN) ; Khan, M. A ; Hussain, A ; Akhtar, M. N ; Ahmad, M ; Javid, M. A ; Sharif University of Technology
Springer
2021
Abstract
The mixed nano-ferrites materials Cu0.6Zn0.4HoxFe2−xO4 (0.00 ≤ x ≤ 0.12) were prepared via the sol–gel auto combustion technique. The TGA curve established the annealing temperature (500 °C) for phase formation. The single exothermic peak on the DSC plot occurred at 341 °C temperature. XRD patterns of these nano ferrites verified single phase formation of the FCC cubic structure. The lattice constant a was increased from 8.4244 to 8.4419 Å and then its value decreased to 8.4319 Å. Crystallite size was found in the range of 7 to 16 nm. The surface morphology of the samples was observed from the scanning electron microscope (SEM) images. The grain size was found within the range of 90 nm to...
A new dynamic optimal m2m rf interface setting in relay selection algorithm (dorsa) for iot applications
, Article IEEE Access ; Volume 10 , 2022 , Pages 5327-5342 ; 21693536 (ISSN) ; Hemmatyar, A. M. A ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2022
Abstract
Machine-to-Machine (M2M) communication is an important type of communication in the Internet-of-Things (IoT). How to send data in these high-density communications using relay selection can help improve the performance of this type of communication in various applications. In addition, the possibility of simultaneous use of different Radio Frequency (RF) interfaces helps to use the spectrum more efficiently. In this work, we try to further use machine communication RF equipment and improve the average data rate of networks in some applications such as the IoT, which have their own bandwidth requirements. Therefore, we provide an optimization algorithm for relay selection as well as the...
An experimental study on mechanical behavior of a calcite cemented gravelly sand
, Article Geotechnical Testing Journal ; Volume 41, Issue 3 , May , 2018 , Pages 494-507 ; 01496115 (ISSN) ; Haeri, S. M ; Shahrabi, M. M ; Khosravi, A ; Sajadi, A. A ; Sharif University of Technology
ASTM International
2018
Abstract
In the study presented herein, a simple method for laboratory calcite cementation of a reconstituted gravelly sand was presented. This method was used to prepare cemented gravelly sand specimens, which have similar natural characteristics to alluvial deposit of the city of Tehran. The formation and distribution of calcite bonds, as well as the effectiveness of the presented calcite cementation method in increasing interparticle cohesion, as observed in weakly to moderately cemented soil in Tehran, were evaluated by means of chemical analysis, X-ray diffraction technique, and unconfined compressive strength tests. The cementation technique was used to prepare triaxial specimens with calcite...