شهریاری, حمید رضا
پژوهشکده پدافند غیرعامل، دانشگاه صنعتی امیرکبیر
[ 1 ] - مروری بر امنیت سایبری سیستمهای کنترل صنعتی
امروزه کلیه زیرساختهای حیاتی، واحدهای صنعتی و تجهیزات مدرن شهری و کشوری از سیستمهای کنترل و اتوماسیون مبتنی بر شبکه، برای پایش و کنترل فرآیندهای خود استفاده مینمایند. این سیستمها امکان مدیریت، هماهنگی و بهرهبرداری ایمن، مؤثر و کارآمد از این واحدها را امکان پذیر میسازند. به بیان دیگر سیستمهای کنترل و اتوماسیون نقش مغز و سیستم عصبی پیکره زیرساختهای حیاتی و سیستمهای صنعتی را ایفا میکنن...
[ 2 ] - A Survey of Anomaly Detection Approaches in Internet of Things
Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion Detection System is required to detect and to prevent attacks from malicious nodes. In this ...
[ 3 ] - BotRevealer: Behavioral Detection of Botnets based on Botnet Life-cycle
Nowadays, botnets are considered as essential tools for planning serious cyberattacks. Botnets are used to perform various malicious activities such as DDoSattacks and sending spam emails. Different approaches are presented to detectbotnets; however most of them may be ineffective when there are only a fewinfected hosts in monitored network, as they rely on similarity in...
[ 4 ] - Aggrandizing the beast's limbs: patulous code reuse attack on ARM architecture
Since smartphones are usually personal devices full of private information, they are a popular target for a vast variety of real-world attacks such as Code Reuse Attack (CRA). CRAs enable attackers to execute any arbitrary algorithm on a device without injecting an executable code. Since the standard platform for mobile devices is ARM architecture, we concentrate on available ARM-based CRAs. Cu...
[ 5 ] - A hybrid approach for database intrusion detection at transaction and inter-transaction levels
Nowadays, information plays an important role in organizations. Sensitive information is often stored in databases. Traditional mechanisms such as encryption, access control, and authentication cannot provide a high level of confidence. Therefore, the existence of Intrusion Detection Systems in databases is necessary. In this paper, we propose an intrusion detection system for detecting attacks...
[ 6 ] - Prediction of user's trustworthiness in web-based social networks via text mining
In Social networks, users need a proper estimation of trust in others to be able to initialize reliable relationships. Some trust evaluation mechanisms have been offered, which use direct ratings to calculate or propagate trust values. However, in some web-based social networks where users only have binary relationships, there is no direct rating available. Therefore, a new method is required t...
Co-Authors