


default search action
Behrouz Tork Ladani
- > Home > Persons > Behrouz Tork Ladani
Publications
- 2024
- [j39]Atefeh Nirumand, Bahman Zamani, Behrouz Tork Ladani:
A comprehensive framework for inter-app ICC security analysis of Android apps. Autom. Softw. Eng. 31(2): 45 (2024) - 2023
- [j37]Hayyan Hasan
, Hasan Deeb, Behrouz Tork Ladani:
A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware. ISC Int. J. Inf. Secur. 15(1): 59-71 (2023) - [j36]Hayyan Hasan
, Behrouz Tork Ladani
, Bahman Zamani
:
Maaker: A framework for detecting and defeating evasion techniques in Android malware. J. Inf. Secur. Appl. 78: 103617 (2023) - [j35]Golbarg Hajian, Behrouz Shahgholi Ghahfarokhi
, Mehri Asadi Vasfi, Behrouz Tork Ladani
:
Privacy, trust, and secure rewarding in mobile crowd-sensing based spectrum monitoring. J. Ambient Intell. Humaniz. Comput. 14(1): 655-675 (2023) - [j34]Sanaz Zamani
, Behrouz Tork Ladani
, Maede Ashouri-Talouki:
Privacy, reputation, and incentive provision for vehicular social networks. J. Reliab. Intell. Environ. 9(4): 447-461 (2023) - [j33]Atefeh Nirumand, Bahman Zamani
, Behrouz Tork Ladani
, Jacques Klein
, Tegawendé F. Bissyandé:
A model-based framework for inter-app Vulnerability analysis of Android applications. Softw. Pract. Exp. 53(4): 895-936 (2023) - 2022
- [j31]Amirhosein Sayyadabdi, Behrouz Tork Ladani, Bahman Zamani:
Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System. ISC Int. J. Inf. Secur. 14(3): 61-69 (2022) - [j30]Afshin Karampour, Maede Ashouri-Talouki, Behrouz Tork Ladani:
Light-Weight Privacy-Preserving Data Aggregation Protocols in Smart Grid Metering Networks. ISC Int. J. Inf. Secur. 14(3): 101-112 (2022) - [j29]Zahra Zojaji
, Behrouz Tork Ladani:
Adaptive cost-sensitive stance classification model for rumor detection in social networks. Soc. Netw. Anal. Min. 12(1): 134 (2022) - [j28]Maryam Zarezadeh, Hamid Mala
, Behrouz Tork Ladani
:
Efficient Secure Pattern Matching With Malicious Adversaries. IEEE Trans. Dependable Secur. Comput. 19(2): 1407-1419 (2022) - [c19]Atefeh Nirumand, Bahman Zamani, Behrouz Tork Ladani:
A Model-Based Approach for Representing Data Sharing Mechanism in Android Applications. CSICC 2022: 1-7 - [i2]Amirhosein Sayyadabdi, Behrouz Tork Ladani, Bahman Zamani:
Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System. CoRR abs/2208.11062 (2022) - 2021
- [j26]Hayyan Hasan
, Behrouz Tork Ladani
, Bahman Zamani:
MEGDroid: A model-driven event generation framework for dynamic android malware analysis. Inf. Softw. Technol. 135: 106569 (2021) - [j25]Hayyan Hasan
, Behrouz Tork Ladani, Bahman Zamani:
Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware. ISC Int. J. Inf. Secur. 13(2): 131-143 (2021) - [c18]Hasan Deeb
, Hayyan Hasan
, Behrouz Tork Ladani, Bahman Zamani:
A machine learning approach for detecting and categorizing evasion sources in Android malware. ISCISC 2021: 28-34 - [d1]Hayyan Hasan, Hasan Deeb, Behrouz Tork Ladani, Bahman Zamani:
Android malware dynamic evasions. IEEE DataPort, 2021 - 2020
- [j22]Maryam Zarezadeh, Hamid Mala
, Behrouz Tork Ladani
:
Secure parameterized pattern matching. Inf. Sci. 522: 299-316 (2020) - [c17]Hayyan Hasan
, Behrouz Tork Ladani
, Bahman Zamani:
Enhancing Monkey to trigger malicious payloads in Android malware. ISCISC 2020: 65-72 - 2019
- [j17]Atefeh Nirumand, Bahman Zamani
, Behrouz Tork Ladani
:
VAnDroid: A framework for vulnerability analysis of Android applications using a model-driven reverse engineering technique. Softw. Pract. Exp. 49(1): 70-99 (2019) - 2017
- [j15]Marzieh Safarzadeh, Mahboubeh Taghizadeh, Bahman Zamani, Behrouz Tork Ladani:
An automatic test case generator for evaluating implementation of access control policies. ISC Int. J. Inf. Secur. 9(1): 73-91 (2017) - 2016
- [j14]Zahra Zojaji, Behrouz Tork Ladani
, Alireza Khalilian
:
Automated program repair using genetic programming and model checking. Appl. Intell. 45(4): 1066-1088 (2016) - 2015
- [j8]Fereidoun Moradi, Hamid Mala, Behrouz Tork Ladani
:
Security Analysis and Strengthening of an RFID Lightweight Authentication Protocol Suitable for VANETs. Wirel. Pers. Commun. 83(4): 2607-2621 (2015) - 2014
- [j6]Maryam Shojaei, Naser Movahhedinia, Behrouz Tork Ladani
:
DDoS attack detection in IEEE 802.16 based networks. Wirel. Networks 20(8): 2543-2559 (2014) - 2013
- [i1]Mohammad Mehdi Keikha, Mohammad Ali Nematbakhsh, Behrouz Tork Ladani:
Structural Weights in Ontology Matching. CoRR abs/1311.3800 (2013) - 2011
- [c13]Ehsan Mokhtari, Zeinab Noorian, Behrouz Tork Ladani
, Mohammad Ali Nematbakhsh:
A Context-Aware Reputation-Based Model of Trust for Open Multi-agent Environments. Canadian AI 2011: 301-312 - [c12]Maryam Shojaei, Naser Movahhedinia, Behrouz Tork Ladani
:
An Entropy Based Approach for DDoS Attack Detection in IEEE 802.16 Based Networks. IWSEC 2011: 129-143 - 2010
- [j2]Hesam Izakian, Ajith Abraham, Behrouz Tork Ladani
:
An auction method for resource allocation in computational grids. Future Gener. Comput. Syst. 26(2): 228-235 (2010) - [j1]Fatemeh Raji
, Behrouz Tork Ladani
:
Anonymity and security for autonomous mobile agents. IET Inf. Secur. 4(4): 397-410 (2010) - [c10]Mohammad Mehdi Keikha, Mohammad Ali Nematbakhsh, Behrouz Tork Ladani
:
Adaptive Similarity Aggregation Method for Ontology Matching. EMS 2010: 391-396 - 2009
- [c9]Hesam Izakian, Behrouz Tork Ladani
, Kamran Zamanifar, Ajith Abraham, Václav Snásel:
A continuous double auction method for resource allocation in computational grids. CISched 2009: 29-35 - [c7]Hesam Izakian, Behrouz Tork Ladani
, Kamran Zamanifar, Ajith Abraham:
A Novel Particle Swarm Optimization Approach for Grid Job Scheduling. ICISTM 2009: 100-109 - 2007
- [c5]Soheil Saifipoor, Behrouz Tork Ladani
, Naser Nematbakhsh:
A Dynamic Reconfigurable Web Service Composition Framework Using Reo Coordination Language. ECOWS 2007: 203-212 - [c4]Lena Mashayekhy, Mohammad Ali Nematbakhsh, Behrouz Tork Ladani:
Measuring of Strategies' Similarity in Automated Negotiation. IMECS 2007: 859-863 - [c3]Lena Mashayekhy, Mohammad Ali Nematbakhsh, Behrouz Tork Ladani:
Comparing Negotiation Strategies Based on Offers. DMBiz@PAKDD 2007: 87-98 - 2006
- [c2]Fatemeh Ghassemi, Naser Nematbakhsh, Behrouz Tork Ladani, Marjan Sirjani:
Specification and Implementation of Multi-Agent Organizations. WEBIST (1) 2006: 447-453

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
[+][–] Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
[+][–] Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-07-06 18:36 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint
