M.S. Students Supervised by M. A. Azgomi

 

@IUST-CE (School of Computer Engineering):

Name

Discipline

Thesis Title

1.      TO BE UPDATED

 

 

2.      Kimia Karimian

SE

Representation, Inference and Evaluation of Trust in Composite Web Services Considering the QoS Parameters

3.      Banafsheh Khodaghadir

SE

A Game-Theoretic Method for Survivability Analysis of Cyber-Physical Systems

4.      Niloofar Piroozfar

SE

A Malware Propagation Model in Social Networks Considering the Parameters  Influencing the Pollution Process

5.      Ali Naghash Asadi

SE

A Software for Modeling the Behavior of Network Traffic for Evaluating the Measures of Deviation

from Normal Behavior

6.      Atoosa Shahhosseini

IT

Improving the Performance of Software-Defined Ntworks by Reducing Latency

7.      Parastou Naderi

SE

A Framework for Privacy-Preserving Publishing of Social Network Data

8.      Ehsan Asiabanzadeh

SE

A Program Transformation Technique Based on Software Diversification to Defense against Return-Oriented Programming Attacks

9.      Majid Hematian

SE

Behavior Analysis of Malware in Static Manner Using Model Checking

10.  Zahra Fatehi Marj

SE

Software Diversification for Intrusion-Tolerance Using Program Transformation Techniques

11.  Sima Koochaki

SE

Fluid Modeling of Fast Propagation Behavior of Malware in Scale-Free Networks

12.  Shima Hakimi

SE

A Model for Designing Trust Management Software Components Based on Uncertainty Theory

13.  Zeinab Nezami

SE

A Green Distributed Routing Protocol for Mobile Ad hoc Network (Co-supervised with Dr. Z. Movahedi)

14.  Hessam Ghaed Sharafi

SE

Design and Implementation of a RESTful Dependable Web Service

15.  Raha Sadeghi

SE

A Trust Model for Service Selection in Service-Oriented Environments

16.  Elnaz Mojahedi

SE

Modeling the Propagation of Peer-to-Peer Worms Considering Temporal Parameters

17.  Elaheh Ghassabani

SE

Security Verification of Concurrent Programs through Stateless Code Model Checking

18.  Abbas Assaf

SE

A Stochastic Model for the Estimation of Pollution Proliferation Intensity in Computer Networks

19.  Saeed Karimi

SE

A New Weighting Method for Persian Text Retrieval (Co-Supervised with Dr. Minaei)

20.  Shiva Movahhedi

SE

An SDES-Based Simulation Language for Attack Process Modeling

21.  Zeinab Hamzei

SE

Symbolic Model Checking of Real-Time Systems Based on State Class Graph and Temporal Logic

22.  Ali Sedaghatbaf

SE

Attack Process Modeling with the Capability of Characterizing the Factors Affecting Attacker’s Decisions

23.  Mehrdad Ashtiani

SE

An HLA-Based Approach for Distributed Interactive Simulation of Cyber Attacks

24.  Mohammad Saber Mirzaei

SE

A Timed Extension for Activity Networks and Its Analysis Techniques Based on Polyhedra Computation

25.  Shahrzad Torabi

SE

Implementing a Multi-Threaded Performance Model Solver

26.  Behrang Mehrparvar

SE

Implementation of Model Checking Techniques for SDES Descriptions

27.  Reza Fathi

SE

Implementation of a Symbolic State Space Generator for SDES Descriptions in PDETool Framework

28.  Reyhaneh Ghasem Esfahani

SE

An Intrusion Detection Technique for Web Service by Analysis of XML Messages 

29.  Roya Bahrami

SE

A Dependable Web Service Based on Single-Version Techniques with Prototyping and Evaluation

30.  Forough Jabbari

SE

A Solution for Software Dependability Engineering Using Stochastic Activity Networks

31.  Mohammad Taromi

SE

A Method for Quantitative Evaluation of Security Based on Attacker Abilities and the System Vulnerabilities Using by Attack Graph

32.  Tahereh Boroomandnezhad

SE

A  Method for Detection of Transient Errors in Embedded Software

33.  Abdolsattar Vakili

SE

A Solution for Quantitative Security Evaluation Using Stochastic Activity Networks and Game Theory

34.  Mojtaba Akbarzadeh

IT

A Solution for Probabilistic Verification of Security Protocols Using Coloured Stochastic Activity Networks

35.  Behzad Zare Moayedi

SE

A Stochastic Model for Combined Security and Dependability Evaluation by Incorporating Diversity in Behavior of Attackers

36.  Mehdi Honarmand Sari

SE

A Framework for Software Performance Evaluation Using Stochastic Activity Networks

37.  Ali Khalili

SE

An Object-Oriented Modeling Language for Stochastic Discrete-Event System

38.  Mahdi Moindarbari

IT

A Visual Language for Specification of Security Protocols: Design and Conversion Methods

39.  Mahdi Dashtbozorgi

IT

Design and Implementation of a High-Performance Packet Capturing Software

40.  Amir Jalaly

SE

New Techniques for Fast Simulation of Stochastic Petri Nets

41.  Omran Younesi

IT

A Scalable Architecture for Web-Based Public Voting System and Its Security Analysis

42.  Yalda Fazlalizadeh

SE

Accelerating Fault Detection in Software Regression Testing by Appropriate Reordering of Test Cases

43.  Aria Moshari

IT

An E-Commerce  Recommendation System Based on Customer Behaviour

44.  Faezeh Karamzadeh

IT

A System for Search and Retrieval of Trademarks Based on a Combination of Descriptors

45.  Atoosa Hodjati

IT

Design and Prototyping an E-Healthcare System Based on Context-Aware Access Control

46.  Maryam Zarreh

IT

A Privacy-Aware Access Control Architecture

47.  Mona Tavakolan

IT

A Web Service with Capabilities for Applying the User's Privacy Preferences

48.  Sara Hajian

IT

A Privacy Preserving Solution for Sensitive Data with Data Mining Capabilities

49.  Naeimeh Laleh

IT

Design and Prototyping a Fraud Detection System in Unlabeled Data with Emphasis on Minimizing False Alarms

50.  Hamideh Alaeddin

IT

Architecture of an E-Exam Management System for Security Improvement

51.  Fatemeh Javadi Mottaghi

SE

A Workflow Modeling Language Based on Stochastic Activity Networks

52.  Jaafar Almasizadeh

SE

Intrusion Process Modeling for Quantitative Evaluation of Security Measures

53.  Hamid M. Gholizadeh

IT

A Multi-Formalism Modeling Framework for Petri Nets and Related Models

54.  Alireza Homayuninezhad

SE

Solutions for Enhancing the Security of Steganographic File Systems

55.  Babak Naseh Chaffi

IT

A Tool for Dependability Evaluation with Coloured Stochastic Activity Networks

56.  Zobeideh Aliannezhadi

IT

Design and Modeling a Web Service Firewall

57.  Mehdi Khalesi

IT

Solutions for Improving Management and Security of E-mail List Services

58.  Saman Shishechi

SE

Model Checking Workflow Systems Using Bogor Tool

59.  Maryam Amouzegar

SE

A Solution for Performance Evaluation of Component-Based Software Architecture

60.  Soodeh Hosseini

SE

Specification of UML Model Refactoring with Regard to Preserving Consistency

 

@IUST-EL (E-Learning Center):

Name

Discipline

Thesis Title

1.      Tahereh Moradian

SE

A Model to Investigate the Impacts of the Time Zone of Nodes in Malware Propagation Performance in Cloud Computing Environment

2.      Ali Borjian Boroujeni

SE

Privacy-Preserving in Data Streams by Data Perturbation Method

3.      Mohammad Dianat

SE

Privacy-Preserving in Data Mining Using a Combination of Anonymization and Randomization Methods

4.      Hashem Mansoornezhad

IT

Design and Prototyping of a Telecommunication Fraud Detection System with Emphasis on Minimizing False Alarms

5.      Khashayar Dejamkhiz

IT

Infrastructural and Security Essentials of Implementing Virtual Data Centers in Organizations Case Study: Iran National Power Dispatching

6.      Mostafa Khallash

IT

A Software Framework for Privacy Preserving Data Publishing Based on Wavelet Transforms

7.      Zohreh Zarinvafa

IT

A Context-Aware Architecture for Learning Management Systems Based on Web Services

8.      Mohammad Khalilzadeh

IT

An Evolutionary Method to Improve the Solution of the System of Equations for Algebraic Cryptanalysis

9.      Jafar Azizi

IT

A Framework Based on Open Source Software for Securing Networks Using Layered Security Model

10.  Ahmad Jafarabadi

IT

Malware Propagation Modeling Based on Stochastic Epidemiological Models

11.  Farideh Tabatabee

IT

Design and Modeling of a Privacy Preserving E-Auction System Based on Software Security Life Cycle

12.  Paria Shirani

IT

A Method for Intrusion Detection in Web Services Based on Time Series

13.  Majid Moradi

IT

A Framework for Development of Intrusion-Tolerant Web Services Based on BPEL

14.  Zahra Mousavi

IT

New Methods for Determination of Effective History of Mutable Attributes and Checking the Fulfillment of Obligations in Usage Control Model

15.  Houri Shojaee

IT

Design and Prototyping of Steganography Detection System

16.  Mitra Omidvar

IT

A Secure Solution for Authentication in E-Exam Management Systems

17.  Ali Hosseini

IT

Combination of Duty Constraints and Historical Extensions for Role-Based Access Control

18.  Meisam S. A. Najjar

IT

Design and Modeling an Intrusion Detection System for Web Services

19.  Khatereh Khorrami

IT

A User Management System for Conversation-Based Web Services with Application in LMS

20.  Mehrnoosh Divsalar

IT

A Hybrid Trust Model for E-Commerce Systems

21.  Mehdi Rooholamini

IT

A Security Architecture for Enterprise Resource Planning (ERP) Systems

22.  Kiyan Yazdian

IT

Solutions for Information and Communication Security in Iran Electricity Market

23.  Zahra Aghajani

IT

A Multi-Layer Architecture for Intrusion Tolerant Web Services

24.  Golriz Khazan

IT

A Simulation-Based Framework for Quantitative Evaluation of Availability by Considering Intrusion and Attack Process

 

@Other Universities:

Name

Discipline

Thesis Title

1.      Maryam Dabaghchian

SE

A Framework for the Verification of Information Flow Security Using Temporal Logic

2.      Nasser Khanjari

SE

A Method for Modeling the Propagation of Passive Worms in Peer-to-Peer Networks

3.      Fatemeh Asghari

SE

A Dynamic Model for the Analysis of the Proliferation Process of Active Worms

4.      Mehdi Zafari

SE

A Bitmap-Based Method for Improving the Record Insertion Rate in Chaining Linear Probing Technique

5.      Ali Rad Khorrami

SE

Design and Implementation of Numerical Solvers for Coloured Stochastic Activity Networks

6.      Abolfazl Karimzadeh

SE

A Solution Based on Probabilistic Model Checking for Evaluation of Computer Systems Security

7.      Roya Zare Farkhady

SE

A Probabilistic Solution for Process Mining of Noisy and Incomplete Execution Logs

8.      Seyyed Hassan Aali

SE

A Solution for Enhancing the Performance of Web Services and Its Prototyping and Evaluation

9.      Hossein Daghaghzadeh

SE

A Semantic-Based Search Method to Improve the Precision of Search Results in Quranic Software

10.  Amir Omidi

SE

Design and Prototyping an E-Voting System Based on Dependable Web Services

11.  Esmaeil Nourani

SE

A Solution for Dependable Web Services Using Design Diversity Techniques and WS-BPEL

 

 

Return to Azgomi's Home Page