M.S. Students Supervised by M. A. Azgomi
@IUST-CE
(School of Computer Engineering):
Name |
Discipline |
Thesis Title |
1.
TO BE UPDATED |
|
|
2.
Kimia
Karimian |
SE |
Representation,
Inference and Evaluation of Trust in Composite Web Services Considering the
QoS Parameters |
3.
Banafsheh
Khodaghadir |
SE |
A Game-Theoretic
Method for Survivability Analysis of Cyber-Physical Systems |
4.
Niloofar
Piroozfar |
SE |
A Malware
Propagation Model in Social Networks Considering the Parameters Influencing the Pollution Process |
5.
Ali
Naghash Asadi |
SE |
A Software for
Modeling the Behavior of Network Traffic for Evaluating the Measures of
Deviation from Normal
Behavior |
6.
Atoosa
Shahhosseini |
IT |
Improving the
Performance of Software-Defined Ntworks by Reducing Latency |
7.
Parastou
Naderi |
SE |
A Framework for
Privacy-Preserving Publishing of Social Network Data |
8.
Ehsan
Asiabanzadeh |
SE |
A Program
Transformation Technique Based on Software Diversification to Defense against
Return-Oriented Programming Attacks |
9.
Majid
Hematian |
SE |
Behavior Analysis of
Malware in Static Manner Using Model Checking |
10. Zahra Fatehi Marj |
SE |
Software
Diversification for Intrusion-Tolerance Using Program Transformation
Techniques |
11. Sima Koochaki |
SE |
Fluid Modeling of
Fast Propagation Behavior of Malware in Scale-Free Networks |
12. Shima Hakimi |
SE |
A Model for
Designing Trust Management Software Components Based on Uncertainty Theory |
13. Zeinab Nezami |
SE |
A Green Distributed
Routing Protocol for Mobile Ad hoc Network (Co-supervised with Dr. Z.
Movahedi) |
14. Hessam Ghaed Sharafi |
SE |
Design and
Implementation of a RESTful Dependable Web Service |
15. Raha Sadeghi |
SE |
A Trust Model for
Service Selection in Service-Oriented Environments |
16. Elnaz Mojahedi |
SE |
Modeling the
Propagation of Peer-to-Peer Worms Considering Temporal Parameters |
17. Elaheh Ghassabani |
SE |
Security
Verification of Concurrent Programs through Stateless Code Model Checking |
18. Abbas Assaf |
SE |
A Stochastic Model
for the Estimation of Pollution Proliferation Intensity in Computer Networks |
19. Saeed Karimi |
SE |
A New Weighting Method
for Persian Text Retrieval (Co-Supervised with Dr. Minaei) |
20. Shiva Movahhedi |
SE |
An SDES-Based
Simulation Language for Attack Process Modeling |
21. Zeinab Hamzei |
SE |
Symbolic Model
Checking of Real-Time Systems Based on State Class Graph and Temporal Logic |
22. Ali Sedaghatbaf |
SE |
Attack Process
Modeling with the Capability of Characterizing the Factors Affecting
Attacker’s Decisions |
23. Mehrdad Ashtiani |
SE |
An HLA-Based
Approach for Distributed Interactive Simulation of Cyber Attacks |
24. Mohammad Saber Mirzaei |
SE |
A Timed Extension
for Activity Networks and Its Analysis Techniques Based on Polyhedra
Computation |
25. Shahrzad Torabi |
SE |
Implementing a
Multi-Threaded Performance Model Solver |
26. Behrang Mehrparvar |
SE |
Implementation of
Model Checking Techniques for SDES Descriptions |
27. Reza Fathi |
SE |
Implementation of a
Symbolic State Space Generator for SDES Descriptions in PDETool Framework |
28. Reyhaneh Ghasem Esfahani |
SE |
An Intrusion Detection Technique for Web Service by Analysis of XML Messages |
29. Roya Bahrami |
SE |
A Dependable Web Service Based on Single-Version Techniques with Prototyping and Evaluation |
30. Forough Jabbari |
SE |
A Solution for Software Dependability Engineering Using Stochastic Activity Networks |
31. Mohammad Taromi |
SE |
A Method for Quantitative Evaluation of Security Based on Attacker Abilities and the System Vulnerabilities Using by Attack Graph |
32. Tahereh Boroomandnezhad |
SE |
A Method for Detection of Transient Errors in Embedded Software |
33. Abdolsattar Vakili |
SE |
A Solution for Quantitative Security Evaluation Using Stochastic Activity Networks and Game Theory |
34. Mojtaba Akbarzadeh |
IT |
A Solution for Probabilistic Verification of Security Protocols Using Coloured Stochastic Activity Networks |
35. Behzad Zare Moayedi |
SE |
A Stochastic Model for Combined Security and Dependability Evaluation by Incorporating Diversity in Behavior of Attackers |
36. Mehdi Honarmand Sari |
SE |
A Framework for Software Performance Evaluation Using Stochastic Activity Networks |
37. Ali Khalili |
SE |
An Object-Oriented Modeling Language for Stochastic Discrete-Event System |
38. Mahdi Moindarbari |
IT |
A Visual Language for Specification of Security Protocols: Design and Conversion Methods |
39. Mahdi Dashtbozorgi |
IT |
Design and Implementation of a High-Performance Packet Capturing Software |
40. Amir Jalaly |
SE |
New Techniques for Fast Simulation of Stochastic Petri Nets |
41. Omran Younesi |
IT |
A Scalable Architecture for Web-Based Public Voting System and Its Security Analysis |
42. Yalda Fazlalizadeh |
SE |
Accelerating Fault Detection in Software Regression Testing by Appropriate Reordering of Test Cases |
43. Aria Moshari |
IT |
An E-Commerce Recommendation System Based on Customer Behaviour |
44. Faezeh Karamzadeh |
IT |
A System for Search and Retrieval of Trademarks Based on a Combination of Descriptors |
45. Atoosa Hodjati |
IT |
Design and Prototyping an E-Healthcare System Based on Context-Aware Access Control |
46. Maryam Zarreh |
IT |
A Privacy-Aware Access Control Architecture |
47. Mona Tavakolan |
IT |
A Web Service with Capabilities for Applying the User's Privacy Preferences |
48. Sara Hajian |
IT |
A Privacy Preserving Solution for Sensitive Data with Data Mining Capabilities |
49. Naeimeh Laleh |
IT |
Design and Prototyping a Fraud Detection System in Unlabeled Data with Emphasis on Minimizing False Alarms |
50. Hamideh Alaeddin |
IT |
Architecture of an E-Exam Management System for Security Improvement |
51. Fatemeh Javadi Mottaghi |
SE |
A Workflow Modeling Language Based on Stochastic Activity Networks |
52. Jaafar Almasizadeh |
SE |
Intrusion Process Modeling for Quantitative Evaluation of Security Measures |
53. Hamid M. Gholizadeh |
IT |
A Multi-Formalism Modeling Framework for Petri Nets and Related Models |
54. Alireza Homayuninezhad |
SE |
Solutions for Enhancing the Security of Steganographic File Systems |
55. Babak Naseh Chaffi |
IT |
A Tool for Dependability Evaluation with Coloured Stochastic Activity Networks |
56. Zobeideh Aliannezhadi |
IT |
Design and Modeling a Web Service Firewall |
57. Mehdi Khalesi |
IT |
Solutions for Improving Management and Security of E-mail List Services |
58. Saman Shishechi |
SE |
Model Checking Workflow Systems Using Bogor Tool |
59. Maryam Amouzegar |
SE |
A Solution for Performance Evaluation of Component-Based Software Architecture |
60. Soodeh Hosseini |
SE |
Specification of UML Model Refactoring with Regard to Preserving Consistency |
@IUST-EL
(E-Learning Center):
Name |
Discipline |
Thesis Title |
1.
Tahereh
Moradian |
SE |
A Model to
Investigate the Impacts of the Time Zone of Nodes in Malware Propagation Performance
in Cloud Computing Environment |
2.
Ali
Borjian Boroujeni |
SE |
Privacy-Preserving
in Data Streams by Data Perturbation Method |
3.
Mohammad
Dianat |
SE |
Privacy-Preserving
in Data Mining Using a Combination of Anonymization and Randomization Methods |
4.
Hashem
Mansoornezhad |
IT |
Design and
Prototyping of a Telecommunication Fraud Detection System with Emphasis on
Minimizing False Alarms |
5.
Khashayar
Dejamkhiz |
IT |
Infrastructural and
Security Essentials of Implementing Virtual Data Centers in Organizations
Case Study: Iran National Power Dispatching |
6.
Mostafa
Khallash |
IT |
A Software
Framework for Privacy Preserving Data Publishing Based on Wavelet Transforms |
7.
Zohreh
Zarinvafa |
IT |
A Context-Aware
Architecture for Learning Management Systems Based on Web Services |
8.
Mohammad
Khalilzadeh |
IT |
An Evolutionary
Method to Improve the Solution of the System of Equations for Algebraic
Cryptanalysis |
9.
Jafar
Azizi |
IT |
A Framework Based
on Open Source Software for Securing Networks Using Layered Security Model |
10. Ahmad Jafarabadi |
IT |
Malware Propagation
Modeling Based on Stochastic Epidemiological Models |
11. Farideh Tabatabee |
IT |
Design and Modeling
of a Privacy Preserving E-Auction System Based on Software Security Life
Cycle |
12. Paria Shirani |
IT |
A Method for
Intrusion Detection in Web Services Based on Time Series |
13. Majid Moradi |
IT |
A Framework for
Development of Intrusion-Tolerant Web Services Based on BPEL |
14. Zahra Mousavi |
IT |
New Methods for
Determination of Effective History of Mutable Attributes and Checking the
Fulfillment of Obligations in Usage Control Model |
15. Houri Shojaee |
IT |
Design and
Prototyping of Steganography Detection System |
16. Mitra Omidvar |
IT |
A Secure Solution for Authentication in E-Exam
Management Systems |
17. Ali Hosseini |
IT |
Combination of Duty Constraints and Historical Extensions for Role-Based Access Control |
18. Meisam S. A. Najjar |
IT |
Design and Modeling an Intrusion Detection System for Web Services |
19. Khatereh Khorrami |
IT |
A User Management System for Conversation-Based Web Services with Application in LMS |
20. Mehrnoosh Divsalar |
IT |
A Hybrid Trust Model for E-Commerce Systems |
21. Mehdi Rooholamini |
IT |
A Security Architecture for Enterprise Resource Planning (ERP) Systems |
22. Kiyan Yazdian |
IT |
Solutions for Information and Communication Security in Iran Electricity Market |
23. Zahra Aghajani |
IT |
A Multi-Layer Architecture for Intrusion Tolerant Web Services |
24. Golriz Khazan |
IT |
A Simulation-Based Framework for Quantitative Evaluation of Availability by Considering Intrusion and Attack Process |
@Other
Universities:
Name |
Discipline |
Thesis Title |
1.
Maryam
Dabaghchian |
SE |
A Framework for the
Verification of Information Flow Security Using Temporal Logic |
2.
Nasser
Khanjari |
SE |
A Method for
Modeling the Propagation of Passive Worms in Peer-to-Peer Networks |
3.
Fatemeh
Asghari |
SE |
A Dynamic Model for
the Analysis of the Proliferation Process of Active Worms |
4.
Mehdi
Zafari |
SE |
A Bitmap-Based
Method for Improving the Record Insertion Rate in Chaining Linear Probing
Technique |
5. Ali Rad Khorrami |
SE |
Design and Implementation of Numerical Solvers for Coloured Stochastic Activity Networks |
6. Abolfazl Karimzadeh |
SE |
A Solution Based on Probabilistic Model Checking for Evaluation of Computer Systems Security |
7. Roya Zare Farkhady |
SE |
A Probabilistic Solution for Process Mining of Noisy and Incomplete Execution Logs |
8. Seyyed Hassan Aali |
SE |
A Solution for Enhancing the Performance of Web Services and Its Prototyping and Evaluation |
9. Hossein Daghaghzadeh |
SE |
A Semantic-Based Search Method to Improve the Precision of Search Results in Quranic Software |
10. Amir Omidi |
SE |
Design and Prototyping an E-Voting System Based on Dependable Web Services |
11. Esmaeil Nourani |
SE |
A Solution for Dependable Web Services Using Design Diversity Techniques and WS-BPEL |