M.S. Students Supervised by M. A. Azgomi

 

@IUST-CE (School of Computer Engineering):

Name

Discipline

Thesis Title

1.      Kimia Karimian

SE

Representation, Inference and Evaluation of Trust in Composite Web Services Considering the QoS Parameters

2.      Banafsheh Khodaghadir

SE

A Game-Theoretic Method for Survivability Analysis of Cyber-Physical Systems

3.      Niloofar Piroozfar

SE

A Malware Propagation Model in Social Networks Considering the Parameters  Influencing the Pollution Process

4.      Ali Naghash Asadi

SE

A Software for Modeling the Behavior of Network Traffic for Evaluating the Measures of Deviation

from Normal Behavior

5.      Atoosa Shahhosseini

IT

Improving the Performance of Software-Defined Ntworks by Reducing Latency

6.      Parastou Naderi

SE

A Framework for Privacy-Preserving Publishing of Social Network Data

7.      Ehsan Asiabanzadeh

SE

A Program Transformation Technique Based on Software Diversification to Defense against Return-Oriented Programming Attacks

8.      Majid Hematian

SE

Behavior Analysis of Malware in Static Manner Using Model Checking

9.      Zahra Fatehi Marj

SE

Software Diversification for Intrusion-Tolerance Using Program Transformation Techniques

10.  Sima Koochaki

SE

Fluid Modeling of Fast Propagation Behavior of Malware in Scale-Free Networks

11.  Shima Hakimi

SE

A Model for Designing Trust Management Software Components Based on Uncertainty Theory

12.  Zeinab Nezami

SE

A Green Distributed Routing Protocol for Mobile Ad hoc Network (Co-supervised with Dr. Z. Movahedi)

13.  Hessam Ghaed Sharafi

SE

Design and Implementation of a RESTful Dependable Web Service

14.  Raha Sadeghi

SE

A Trust Model for Service Selection in Service-Oriented Environments

15.  Elnaz Mojahedi

SE

Modeling the Propagation of Peer-to-Peer Worms Considering Temporal Parameters

16.  Elaheh Ghassabani

SE

Security Verification of Concurrent Programs through Stateless Code Model Checking

17.  Abbas Assaf

SE

A Stochastic Model for the Estimation of Pollution Proliferation Intensity in Computer Networks

18.  Saeed Karimi

SE

A New Weighting Method for Persian Text Retrieval (Co-Supervised with Dr. Minaei)

19.  Shiva Movahhedi

SE

An SDES-Based Simulation Language for Attack Process Modeling

20.  Zeinab Hamzei

SE

Symbolic Model Checking of Real-Time Systems Based on State Class Graph and Temporal Logic

21.  Ali Sedaghatbaf

SE

Attack Process Modeling with the Capability of Characterizing the Factors Affecting Attacker’s Decisions

22.  Mehrdad Ashtiani

SE

An HLA-Based Approach for Distributed Interactive Simulation of Cyber Attacks

23.  Mohammad Saber Mirzaei

SE

A Timed Extension for Activity Networks and Its Analysis Techniques Based on Polyhedra Computation

24.  Shahrzad Torabi

SE

Implementing a Multi-Threaded Performance Model Solver

25.  Behrang Mehrparvar

SE

Implementation of Model Checking Techniques for SDES Descriptions

26.  Reza Fathi

SE

Implementation of a Symbolic State Space Generator for SDES Descriptions in PDETool Framework

27.  Reyhaneh Ghasem Esfahani

SE

An Intrusion Detection Technique for Web Service by Analysis of XML Messages 

28.  Roya Bahrami

SE

A Dependable Web Service Based on Single-Version Techniques with Prototyping and Evaluation

29.  Forough Jabbari

SE

A Solution for Software Dependability Engineering Using Stochastic Activity Networks

30.  Mohammad Taromi

SE

A Method for Quantitative Evaluation of Security Based on Attacker Abilities and the System Vulnerabilities Using by Attack Graph

31.  Tahereh Boroomandnezhad

SE

A  Method for Detection of Transient Errors in Embedded Software

32.  Abdolsattar Vakili

SE

A Solution for Quantitative Security Evaluation Using Stochastic Activity Networks and Game Theory

33.  Mojtaba Akbarzadeh

IT

A Solution for Probabilistic Verification of Security Protocols Using Coloured Stochastic Activity Networks

34.  Behzad Zare Moayedi

SE

A Stochastic Model for Combined Security and Dependability Evaluation by Incorporating Diversity in Behavior of Attackers

35.  Mehdi Honarmand Sari

SE

A Framework for Software Performance Evaluation Using Stochastic Activity Networks

36.  Ali Khalili

SE

An Object-Oriented Modeling Language for Stochastic Discrete-Event System

37.  Mahdi Moindarbari

IT

A Visual Language for Specification of Security Protocols: Design and Conversion Methods

38.  Mahdi Dashtbozorgi

IT

Design and Implementation of a High-Performance Packet Capturing Software

39.  Amir Jalaly

SE

New Techniques for Fast Simulation of Stochastic Petri Nets

40.  Omran Younesi

IT

A Scalable Architecture for Web-Based Public Voting System and Its Security Analysis

41.  Yalda Fazlalizadeh

SE

Accelerating Fault Detection in Software Regression Testing by Appropriate Reordering of Test Cases

42.  Aria Moshari

IT

An E-Commerce  Recommendation System Based on Customer Behaviour

43.  Faezeh Karamzadeh

IT

A System for Search and Retrieval of Trademarks Based on a Combination of Descriptors

44.  Atoosa Hodjati

IT

Design and Prototyping an E-Healthcare System Based on Context-Aware Access Control

45.  Maryam Zarreh

IT

A Privacy-Aware Access Control Architecture

46.  Mona Tavakolan

IT

A Web Service with Capabilities for Applying the User's Privacy Preferences

47.  Sara Hajian

IT

A Privacy Preserving Solution for Sensitive Data with Data Mining Capabilities

48.  Naeimeh Laleh

IT

Design and Prototyping a Fraud Detection System in Unlabeled Data with Emphasis on Minimizing False Alarms

49.  Hamideh Alaeddin

IT

Architecture of an E-Exam Management System for Security Improvement

50.  Fatemeh Javadi Mottaghi

SE

A Workflow Modeling Language Based on Stochastic Activity Networks

51.  Jaafar Almasizadeh

SE

Intrusion Process Modeling for Quantitative Evaluation of Security Measures

52.  Hamid M. Gholizadeh

IT

A Multi-Formalism Modeling Framework for Petri Nets and Related Models

53.  Alireza Homayuninezhad

SE

Solutions for Enhancing the Security of Steganographic File Systems

54.  Babak Naseh Chaffi

IT

A Tool for Dependability Evaluation with Coloured Stochastic Activity Networks

55.  Zobeideh Aliannezhadi

IT

Design and Modeling a Web Service Firewall

56.  Mehdi Khalesi

IT

Solutions for Improving Management and Security of E-mail List Services

57.  Saman Shishechi

SE

Model Checking Workflow Systems Using Bogor Tool

58.  Maryam Amouzegar

SE

A Solution for Performance Evaluation of Component-Based Software Architecture

59.  Soodeh Hosseini

SE

Specification of UML Model Refactoring with Regard to Preserving Consistency

 

@IUST-EL (E-Learning Center):

Name

Discipline

Thesis Title

1.      Tahereh Moradian

SE

A Model to Investigate the Impacts of the Time Zone of Nodes in Malware Propagation Performance in Cloud Computing Environment

2.      Ali Borjian Boroujeni

SE

Privacy-Preserving in Data Streams by Data Perturbation Method

3.      Mohammad Dianat

SE

Privacy-Preserving in Data Mining Using a Combination of Anonymization and Randomization Methods

4.      Hashem Mansoornezhad

IT

Design and Prototyping of a Telecommunication Fraud Detection System with Emphasis on Minimizing False Alarms

5.      Khashayar Dejamkhiz

IT

Infrastructural and Security Essentials of Implementing Virtual Data Centers in Organizations Case Study: Iran National Power Dispatching

6.      Mostafa Khallash

IT

A Software Framework for Privacy Preserving Data Publishing Based on Wavelet Transforms

7.      Zohreh Zarinvafa

IT

A Context-Aware Architecture for Learning Management Systems Based on Web Services

8.      Mohammad Khalilzadeh

IT

An Evolutionary Method to Improve the Solution of the System of Equations for Algebraic Cryptanalysis

9.      Jafar Azizi

IT

A Framework Based on Open Source Software for Securing Networks Using Layered Security Model

10.  Ahmad Jafarabadi

IT

Malware Propagation Modeling Based on Stochastic Epidemiological Models

11.  Farideh Tabatabee

IT

Design and Modeling of a Privacy Preserving E-Auction System Based on Software Security Life Cycle

12.  Paria Shirani

IT

A Method for Intrusion Detection in Web Services Based on Time Series

13.  Majid Moradi

IT

A Framework for Development of Intrusion-Tolerant Web Services Based on BPEL

14.  Zahra Mousavi

IT

New Methods for Determination of Effective History of Mutable Attributes and Checking the Fulfillment of Obligations in Usage Control Model

15.  Houri Shojaee

IT

Design and Prototyping of Steganography Detection System

16.  Mitra Omidvar

IT

A Secure Solution for Authentication in E-Exam Management Systems

17.  Ali Hosseini

IT

Combination of Duty Constraints and Historical Extensions for Role-Based Access Control

18.  Meisam S. A. Najjar

IT

Design and Modeling an Intrusion Detection System for Web Services

19.  Khatereh Khorrami

IT

A User Management System for Conversation-Based Web Services with Application in LMS

20.  Mehrnoosh Divsalar

IT

A Hybrid Trust Model for E-Commerce Systems

21.  Mehdi Rooholamini

IT

A Security Architecture for Enterprise Resource Planning (ERP) Systems

22.  Kiyan Yazdian

IT

Solutions for Information and Communication Security in Iran Electricity Market

23.  Zahra Aghajani

IT

A Multi-Layer Architecture for Intrusion Tolerant Web Services

24.  Golriz Khazan

IT

A Simulation-Based Framework for Quantitative Evaluation of Availability by Considering Intrusion and Attack Process

 

@Other Universities:

Name

Discipline

Thesis Title

1.      Maryam Dabaghchian

SE

A Framework for the Verification of Information Flow Security Using Temporal Logic

2.      Nasser Khanjari

SE

A Method for Modeling the Propagation of Passive Worms in Peer-to-Peer Networks

3.      Fatemeh Asghari

SE

A Dynamic Model for the Analysis of the Proliferation Process of Active Worms

4.      Mehdi Zafari

SE

A Bitmap-Based Method for Improving the Record Insertion Rate in Chaining Linear Probing Technique

5.      Ali Rad Khorrami

SE

Design and Implementation of Numerical Solvers for Coloured Stochastic Activity Networks

6.      Abolfazl Karimzadeh

SE

A Solution Based on Probabilistic Model Checking for Evaluation of Computer Systems Security

7.      Roya Zare Farkhady

SE

A Probabilistic Solution for Process Mining of Noisy and Incomplete Execution Logs

8.      Seyyed Hassan Aali

SE

A Solution for Enhancing the Performance of Web Services and Its Prototyping and Evaluation

9.      Hossein Daghaghzadeh

SE

A Semantic-Based Search Method to Improve the Precision of Search Results in Quranic Software

10.  Amir Omidi

SE

Design and Prototyping an E-Voting System Based on Dependable Web Services

11.  Esmaeil Nourani

SE

A Solution for Dependable Web Services Using Design Diversity Techniques and WS-BPEL

 

 

Return to Azgomi's Home Page