M. Abdollahi Azgomi's Publications
·
Other
Peer-Reviewed Journal Papers
·
Book
Chapters/Electronic Notes
·
Papers in
International Conferences/Workshops
·
Papers in National (Iranian) Conferences
·
M.
Abdollahi Azgomi and H. Motallebi, Performance Evaluation of Computer Systems: A
Model-Based Approach, 2017 (in Persian) (In Press)
ISI-JCR Journal Papers:
1. S. Hosseini and M. Abdollahi Azgomi, “Dynamical analysis of a malware propagation model considering the impacts of mobile devices and software diversification,” Physica A: Statistical Mechanics and its Applications, Elsevier, Published Online: April 2019 (In Press)
2. A. Naghash Asadi, M. Abdollahi Azgomi and R. Entezari-Maleki, "Evaluation of the impacts of failures and resource heterogeneity on the power consumption and performance of IaaS clouds," The Journal of Supercomputing, Springer, Published Online: Nov. 2018 (In Press)
3.
M.
Ashtiani and M. Abdollahi Azgomi, "A novel trust evolution
algorithm based on a quantum-like model of computational trust," Cognition
Technology and Work, Springer, Published Online: June 2018 (In Press)
4.
A. Sedaghatbaf and M.
Abdollahi Azgomi, "SQME: A
Framework for Modelling and Evaluation of Software Architecture Quality
Attributes," Software and Systems
Modeling (SoSyM), Springer, Published Online: May 2018 (In Press)
5.
A. Naghash
Asadi, M.
Abdollahi Azgomi and R. Entezari-Maleki, "Unified
power and performance analysis of cloud computing infrastructure using
stochastic reward nets," Computer
Communications (ComCom), Vol.
138, Elsevier, April 2019, pp. 67-80
6.
K. Karimian, M. Ashtiani and M. Abdollahi Azgomi, "An approach based on the
transferrable belief model for trust evaluation in web services," Soft
Computing, Vol. 22, No. 21, Springer, Nov.
2018, pp. 7293-7311
7. S. Hosseini and M. Abdollahi Azgomi, “The dynamics of an SEIRS-QV malware propagation model in heterogeneous networks,” Physica A: Statistical Mechanics and its Applications, Vol. 512, Elsevier, Dec. 2018, pp. 803-818
8. J. Amasizadeh and M. Abdollahi Azgomi, "A probabilistic model for anonymity analysis of anonymous communication networks," Telecommunication Systems, The Special Issue on Secure Communications, Vol. 69, No. 2, Springer, 2018, pp. 171-186
9.
H. Orojloo and M.
Abdollahi Azgomi, "A Stochastic Game Model for Evaluating the Impacts of Security Attacks Against
Cyber-Physical Systems," Journal
of Network and Systems Management,
Vol. 26, No. 4, Springer, 2018, pp. 929-965
10.
A. Sedaghatbaf and M. Abdollahi Azgomi, "Reliability
evaluation of UML/DAM software architectures under parameter uncertainty," IET Software,
Vol. 12, No. 3, The IET,
June 2018, pp. 236-244
11.
M. Ashtiani, Sh. Hakimi-Rad, and M. Abdollahi Azgomi, "A Model of Trust Based on
Uncertainty Theory," International Journal
of Uncertainty, Fuzziness and Knowledge-Based Systems, Vol. 26, No. 2,
World Scientific Publishing Company, 2018, pp. 269–298
12.
A. Sedaghatbaf and M. Abdollahi Azgomi, "A method for dependability
evaluation of software architectures," Computing, Vol.
100, Springer, 2018, pp. 119-150
13.
H.
Orojloo and M. Abdollahi Azgomi, "A game-theoretic
approach to model and quantify the security of cyber-physical systems,"
Computers in Industry, Vol. 88, Elsevier, 2017, pp. 44-57
14.
H.
Orojloo and M. Abdollahi Azgomi, "A method for evaluating
the consequence propagation of security attacks in cyber-physical systems,"
Future
Generation Computer Systems (FGCS), Vol. 67, Elsevier, Feb. 2017, pp.
57-71
15.
H. Orojloo and M. Abdollahi Azgomi, "Predicting the
Behavior of Attackers and the Consequences of Attacks against Cyber-Physical
Systems," Security and Communication Networks, Wiley, Vol. 9, Dec. 2016, pp. 6111-6136
16. S. Hosseini and M. Abdollahi Azgomi, “A model for malware propagation in scale-free networks based on rumor spreading process,” Computer Networks, Vol. 108, Elsevier, Oct. 2016, pp. 97-107
17.
S.
Hosseini, M. Abdollahi Azgomi and A. Torkaman Rahmani, “Agent-based simulation
of the dynamics of malware propagation in scale-free networks,”Simulation: Transactions of the Society for Modeling and
Simulation International, Vol. 92, No. 7, SAGE, July 2016,
pp. 709-722
18.
M. Ashtiani and M. Abdollahi Azgomi, "A formulation of
computational trust based on quantum decision theory," Information
Systems Frontiers, Vol. 18, No. 4, Springer, August 2016, pp. 735-764
19. M. Ashtiani and M. Abdollahi Azgomi, "A hesitant fuzzy model of computational trust considering hesitancy, vagueness and uncertainty," Applied Soft Computing, Vol. 42, Elsevier, May 2016, pp. 18-37
20.
S.
Hosseini, M. Abdollahi Azgomi and A. Torkaman Rahmani, “Malware propagation
modeling considering software diversity and immunization” Journal of
Computational Science, Vol.
13, Elsevier, March 2016, pp. 49-67
21.
M.
Ashtiani and M. Abdollahi Azgomi, "Trust modeling based on a
combination of fuzzy analytic hierarchy process and fuzzy VIKOR," Soft
Computing, Vol. 20, No. 1, Springer, Jan.
2016, pp. 399-421
22.
S.
Hosseini, M. Abdollahi Azgomi and A. Torkaman Rahmani, “Dynamics
of a rumor spreading model with diversity of configurations in scale-free
networks,” International
Journal of Communication Systems, Vol.
28, No. 18, Wiley, Dec. 2015, pp. 2255-2274
23.
M.
Dabaghchian and M. Abdollahi Azgomi, "Model checking the
observational determinism security property using PROMELA and SPIN," Formal
Aspects of Computing, Vol.
27, No. 5, Springer, Nov. 2015, pp. 789-804
24.
M.R.
Ebrahimi Dishabi and M.
Abdollahi Azgomi, "Differential
privacy preserving clustering in distributed datasets using Haar wavelet
transform," Intelligent
Data Analysis, Vo. 19, No. 6, IOS Press, Nov. 2015, pp.
1323-1353
25.
M.
Ashtiani and M. Abdollahi Azgomi, "A multi-criteria decision
making formulation of trust using fuzzy analytic hierarchy process," Cognition
Technology and Work, Vol. 17, No. 4, Springer, Nov. 2015, pp. 465-488
26.
A.
Jafarabadi and M. Abdollahi Azgomi, "A stochastic
epidemiological model for the propagation of active worms considering the
dynamicity of network topology," Peer-to-Peer Networking and Applications, Vol. 8, No. 6, Springer, Nov. 2015, pp. 1008-1022
27.
M.R. Ebrahimi Dishabi and M. Abdollahi Azgomi, “Differential privacy preserving
clustering using Daubechies-2 wavelet transform,” International
Journal on Wavelets, Multiresolution and Information Processing (IJWMIP), Vol. 13, No. 4,
World Scientific, July 2015, 1550028 (35 pages)
28.
M.
Ashtiani and M. Abdollahi Azgomi, "A Survey of Quantum-Like
Approaches to Decision Making and Cognition," Mathematical
Social Sciences, Vol. 75, Elsevier, May 2015, pp. 49-80
29.
H.
Motallebi and M. Abdollahi Azgomi, "Parametric multisingular
hybrid Petri nets: Formal definitions and analysis techniques," Information
& Computation, Vol. 241C, Elsevier, 2015, pp. 321-348
30.
E.
Mojahedi and M. Abdollahi Azgomi, "Modeling the
propagation of topology-aware P2P worms considering temporal parameters," Peer-to-Peer Networking and Applications, Vol. 8,
No. 1, Springer, Jan. 30, 2015, pp. 171-180
31.
M.
Ashtiani and M. Abdollahi Azgomi, "Contextuality,
Incompatibility and Biased Inference in a Quantum-Like Formulation of
Computational Trust," Advances
in Complex Systems, Vol. 17, No. 5, World Scientific, Sept. 4, 2014, 1450020 (61 pages)
32.
M. Ashtiani and M. Abdollahi Azgomi, "A
Distributed Simulation Framework for Modeling Cyber Attacks and the Evaluation
of Security Measures," Simulation: Transactions of the Society for Modeling and
Simulation International, Vol. 90, No. 9, SAGE, Sept. 03, 2014, pp. 1071-1102
33.
J. Amasizadeh and M. Abdollahi Azgomi, "Mean privacy: a metric
for security of computer systems," Computer
Communications, Vol. 54C, Elsevier, July 2014, pp. 47-59.
34.
M. R.
Ebrahimi Dishabi and M. Abdollahi Azgomi, "Differential
Privacy Preserving Clustering Based on Haar Wavelet Transform," Intelligent Data Analysis, Vol. 18, No. 4, IOS Press, July 23, 2014, pp.
583–608
35.
A.
Sedaghatbaf and M. Abdollahi Azgomi, "Attack
Modeling and Security Evaluation Based on Stochastic Activity Networks,"
Security and Communication Networks, Vol. 7, No. 4, Wiley, April 2014, pp. 714-737
36.
H.
Motallebi and M. Abdollahi Azgomi, "Translation
from Multisingular Hybrid Petri Nets to Multisingular Hybrid Automata," Fundamenta Informaticae, Vol. 130, No. 3, IOS Press, Feb. 2014, pp.
275-315
37.
M.R. Ebrahimi Dishabi, M. Abdollahi
Azgomi and A. M. Rahmani, "An
Improved Technique for Privacy Preserving Clustering Based on Daubechies-2
Wavelet Transform," International Journal
on Wavelets, Multiresolution and Information Processing (IJWMIP), Vol. 11, No. 5, World Scientific, Oct. 2013,
1350039 (42 pages)
38.
H. Motallebi, M. Abdollahi Azgomi,
M. S. Mirzaei and A. Movaghar, "A
New Extension of Activity Networks for Modelling and Verification of Timed
Systems," Turkish Journal of
Electrical Engineering & Computer Sciences (TJEECS),Vol. 21, No. 6, TÜBİTAK, Oct. 2013, pp.
1751-1779
39.
J. Almasizadeh and M. Abdollahi
Azgomi, "A
Stochastic Model of Attack Process for the Evaluation of Security Metrics,"
Computer
Networks, Vol. 57, No. 10, Elsevier, 2013, pp. 2158-2179
40.
T. Broomandnezhad and M. Abdollahi
Azgomi, "An
Efficient Control-Flow Checking Technique for the Detection of Soft-Errors in
Embedded Software," Computers
& Electrical Engineering, Vol. 39, No. 4, Elsevier, 2013, pp.
1318-1330
41.
A. Khalili, M. Abdollahi Azgomi and
A. Jalaly, "SimGine:
A Simulation Engine for Stochastic Discrete-Event Systems Based on SDES
Description," Simulation: Transactions of the Society for Modeling and
Simulation International, Vol. 89, No. 4, SAGE, April 2013, pp. 539-555
42.
A. Jalaly Bidgoly and M. Abdollahi
Azgomi, "A
New Technique for Rare-Event Simulation Based on Partition of the Region,"
Turkish Journal
of Electrical Engineering & Computer Sciences (TJEECS),
TÜBİTAK, ISSN: 1300-0632, Vol. 21, No. 2, March 2013, pp. 309-329
43.
A. Khalilian, M. Abdollahi Azgomi
and Y. Fazlalizadeh "An Improved Method for
Test Case Prioritization by Incorporating Historical Test Case Data," Science
of Computer Programming (SCP), Vol. 78, No. 1, Elsevier, 2012, pp.
93-118
44. H. Motallebi and M. Abdollahi
Azgomi, "Modelling and Verification of Hybrid
Dynamic Systems Using Multisingular Hybrid Petri Nets," Theoretical
Computer Science (TCS), Elsevier, ISSN: 0304-3975, Vol. 446, Aug. 2012,
pp. 48-74
45. B. Zare Moayedi and M. Abdollahi Azgomi, "A Game Theoretic Framework
for Evaluation of the Impacts of Hackers Diversity on Security Measures,"
Reliability
Engineering & System Safety (RESS), Elsevier, ISSN: 0951-8320, Vol.
99, No. 1, March 2012, pp. 45-54
46.
M. Dashtbozorgi and M. Abdollahi
Azgomi, "A
High-Performance and Scalable Multi-Core Aware Software Solution for Network
Monitoring," The Journal of
Supercomputing, Springer, ISSN: 0920-8542, Vol. 59, No. 2, Feb. 2012,
pp. 720-743
47.
S. Hajian and M. Abdollahi Azgomi,
"On the Use of Haar
Wavelet Transform and Scaling Data Perturbation for Privacy Preserving
Clustering of Large Datasets," International Journal of
Wavelets, Multiresolution and Information Processing (IJWMIP), World
Scientific, ISSN: 0219-6913, Vol. 9, No. 6, Dec. 2011, pp. 867-904
48.
S. Hajian and M. Abdollahi Azgomi,
"A Privacy Preserving
Clustering Technique for Horizontally and Vertically Distributed Datasets,"
Intelligent
Data Analysis: An International Journal (IDA), IOS Press, ISSN:
1088-467X, Vol. 15, No. 4, 2011, pp. 503-532
49.
N. Laleh and M. Abdollahi Azgomi,
"A Hybrid Fraud Scoring
and Spike Detection Technique in Streaming Data," Intelligent
Data Analysis: An International Journal (IDA), IOS Press, ISSN:
1088-467X, Vol. 14, No. 6, 2010, pp. 773-800
50.
M. Abdollahi Azgomi and R. Entezari
Maleki, "Task
Scheduling Modeling and Reliability Evaluation of Grid Services Using Coloured
Petri Nets," Future
Generation Computer Systems (FGCS), Elsevier, ISSN: 0167-739X, Vol. 26,
No. 8, 2010, pp. 1141-1150
51.
H. Ghasemzadeh, E. Behrangi and M.
Abdollahi Azgomi, "Conflict-Free
Scheduling and Routing of Automated Guided Vehicles in Mesh Topologies,"
Robotics and Autonomous
Systems, Elsevier, ISSN: 0921-8890, Vol. 57, Issues: 6-7, 2009, pp.
738-748
52.
M. Abdollahi Azgomi and A. Movaghar,
"A Modelling Tool
for Hierarchical Stochastic Activity Networks," Simulation Modelling
Practice and Theory, Elsevier, ISSN: 1569-190X, Vol. 13, No. 6, 2005,
pp. 505-524
53.
M. Abdollahi Azgomi and A. Movaghar,
"A Modeling
Tool for a New Definition of Stochastic Activity Networks," Iranian Journal of
Science and Technology, Transaction B (Technology), Shiraz
University Press, ISSN: 1028-6284, Vol. 29, No. B1, 2005, pp. 79-92
ISC
Journal Papers:
1.
E. Ghanad Tavakoly and M. Abdollahi Azgomi,
"A Software System for Large-Scale Simulation of
Malware Propagation in Computer Networks," ECDJ, Accepted: Fall 2018, In
Press (in Persian)
2.
A. Naghash Asadi and M. Abdollahi Azgomi,
" Modeling the Inter-arrival Time of Packets in
Network Traffic and Anomaly Detection Using the Zipf’s Law," Journal of Information Systems and Telecommunication
(JIST), Vo. 6, No. 2, ACECR, April-June. 2018, pp. 72-87
3.
S. Hosseini and M. Abdollahi Azgomi, "Malware Propagation Modeling Considering
Software Diversity Approach in Weighted Scale-Free Networks," ECDJ,
Vol. 6, No. 3, Fall 2018, pp. 131-140 (in Persian)
4.
N. H. Gharavi, A. Mirghadri, M. Abdollahi
Azgomi, S. A. Mousavi, "Expected Coverage
of Perfect Chains in the Hellman Time Memory Trade-Off," Journal of Computing and Security, Vol.
3, N. 3, July 2016, pp. 155-162
5.
A. Sedaghatbaf and M. Abdollahi Azgomi, "Quantitative
Evaluation of Software Security: An Approach Based on UML/SecAM and Evidence
Theory," The
ISC International Journal of Information Security (ISeCure),
Vol. 8, No. 2, Summer and Autumn 2016, pp. 137-149.
6.
S. Koochaki and M. Abdollahi Azgomi, "A Method for
Fluid Modeling of the Propagation Behavior of Malware in Scale-Free Networks," ECDJ,
Vol. 4, No. 4, Winter 2016, pp. 1-10 (in Persian)
7.
A. Naghash-Asadi and M. Abdollahi Azgomi,
"A Method for
Modeling and Generating Normal Network Traffic Based on the Features of Length
and Arrival Time of Packets Using the Zipf's Law," ECDJ,
Vol. 4, No. 3, Fall 2016, pp. 37-46 (in Persian)
8.
M. Fathian, M. Abdollahi Azgomi and H.
Dehghani, "Modeling
Browsing Behavior Analysis for Malicious Robot Detection in Distributed Denial
of Service Attacks," ECDJ, Vol. 4, No. 2, Summer 2016,
pp. 81-89 (in Persian)
9.
N. H. Gharavi, A. Mirghadri, M. Abdollahi
Azgomi, H. Soltani, "Analysis of
Hellman Chains Based on the Graph of Random Functions," ECDJ,
Vol. 4, No. 1, Spring 2016, pp. 81-89 (in Persian)
10.
S. Bejani and M. Abdollahi Azgomi, “A New Architecture for
Intrusion-Tolerant Web Services Based on Design Diversity Techniques”, Journal of Information Systems and Telecommunication
(JIST), Vo. 3, No. 4, ACECR, Dec. 2015, pp. 238-247
11.
M. Divsalar, M. Abdollahi Azgomi and M.
Ashtiani, “A
Computational Trust Model for E-Commerce Systems: Concepts, Definitions and
Evaluation Method,” International
Journal of Information and Communication Technology Research (IJICTR),
Vol. 7, No. 2, ITRC, Spring 2015, pp. 41-58
12.
Z.
Nazemian and M. Abdollahi Azgomi, “A Trust Model
Tolerating the Behavior of Malicious Users,” ADSTJ, Vol. 5, No. 2, Summer 2014, pp. 117-130 (in Persian)
13.
S. Bejani and M. Abdollahi Azgomi, "Improving the
Security of Web Services Using Fault Tolerance Techniques with Emphasis on
Design Diversity Technique,” ECDJ, Vol. 1, No. 3, Oct. 2013, pp.
13-24 (in Persian)
14.
R. Fathi
and M. Abdollahi Azgomi, "Implementation
of a Symbolic State Space Generator for SDES Descriptions in PDETool Framework,"
Soft Computing Journal, Kashan
University Press, Vol. 2, No. 1, Spring-Summer 2013, pp. 12-21 (in Persian)
15.
M. Abdollahi Azgomi and E. Nourani,
"A Dependable Web
Service Architecture Based on Design Diversity Techniques and WS-BPEL," Iranian Journal of
Electrical and Computer Engineering (IJECE), ISSN: 1682-0053, Vol. 11,
No. 1, Winter-Spring 2013, pp. 1-10
16.
T. Broomandnezhad, M. Abdollahi Azgomi and Sh. Jalilian, "A Survey on Software
Techniques for Transient Fault Tolerance," Journal
of Space Science and Technology, ARI, Vol. 5. No. 4, Winter 2013, pp.
9-18 (in Persian)
17.
S.
Bejani and M. Abdollahi Azgomi, "Intrusion
Tolerance: A New Approach for the Development of Secure Software Systems,” PDJ, Vol. 3, No. 3, Oct. 2012, pp. 41-50 (in Persian)
18.
M. Ashtiani and M. Abdollahi Azgomi,
"Cyber Attack Simulation
for Operational Security Evaluation Using Coloured Petri Nets," Information & Communication
Technology Research Journal (IJICTR), Vol. 4, No. 3, ITRC, 2012, pp.
45-63
19.
Sh. Torabi and M. Abdollahi Azgomi, "A Parallel Numerical Solver
of CTMCs and Its Implementation on Multi-Core Processors," The CSI Journal on Computing Science and
Information Technology (CSIT),
Vol. 9. No. 1-3, March 2012, pp. 39-51 (in Persian)
20.
M. Abdollahi Azgomi and A. Movaghar, "Design
and Implementation of SharifSAN and Its Features for Performance Evaluation of
Computer Systems," Sharif Journal of Science and Technology,
Sharif University of Technology Press, No. 25, 2003, pp. 29-41 (in Persian)
Other Peer-Reviewed Journal Papers:
1. H. Orojloo and M.
Abdollahi Azgomi, "Modeling
and Evaluation of the Security of Cyber-Physical Systems Using Stochastic Petri
Nets," IET
Cyber-Physical Systems: Theory & Applications, Vol. 4, No. 1, The IET, March 2019, pp. 50-57
2.
A. Sedaghatbaf and M. Abdollahi Azgomi, "Analysis of Non-Determinism in Software Architecture Evaluation
Based on Evidence Theory,” Computing
Science Journal, ISI, Vol. 9,
Summer 2018, pp. 3-12 (in Persian)
3.
R.
Sadeghi and M. Abdollahi Azgomi, "A method for fair
propagation of user perceptions for trust management in composite services," Service
Oriented Computing and Applications,Vol. 9,
No. 2, Springer, June 2015, pp. 157-176 (Index: SJR/Scopus)
4. A. Khalili and M. Abdollahi Azgomi, "Modeling and Evaluation
of Stochastic Discrete-Event Systems with RayLang," Journal of Advances in
Computer Research, Vol. 3, No. 4, Nov. 2012, pp. 1-16 (Index; SID)
5. H. M. Gholizadeh and M. Abdollahi Azgomi, "A Multi-Formalism Modeling Framework: Formal Definitions, Model Composition and Solution Strategies," Journal of Advances in Computer Research (JACR), Vol. 2, No. 3, Aug. 2011, pp. 47-62 (Index; SID)
6.
H. M. Gholizadeh, M. Abdollahi
Azgomi, “A meta-model based
approach for definition of a multi-formalism modeling framework,” International Journal of Computer Theory and
Engineering, Vol. 2, No. 1, Feb. 2010, pp. 1793-8201
7. J. Almasizadeh and M. Abdollahi Azgomi, "A Method for Estimation of the Success Probability of an Intrusion Process by Considering the Temporal Aspects of the Attacker Behavior," LNCS Transactions on Computational Science IV – Special Issue on Security in Computing, Springer, Vol. 5430, 2009, pp. 200-21 (Index: SJR/Scopus)
8.
M. Tavakolan, M. Zarreh and M. Abdollahi
Azgomi, "Web Service Discovery Based on Privacy Preferences," International
Journal of Web Services Practices, Vol. 4, No.1, Web Services Research
Foundation, ISSN: 1738-6535, 2009, pp. 28-35
9.
Z. Aghajani and M. Abdollahi Azgomi,
"A
Multi-Layer Architecture for Intrusion Tolerant Web Services," International Journal of u- and
e- Service, Science and Technology, Vol. 1, No. 1, SERSC, ISSN:
2005-4246, 2008, pp. 73-80 (Index: Scopus)
10.
G. Khazan and M. Abdollahi Azgomi,
"DNS
Spoofing Attack Simulation for Model-Based Security Evaluation," International Journal of Advanced
Science and Technology, Vol. 1, No. 1, SERSC, ISSN: 2005-4238, 2008,
pp. 1-8 (Index: Scopus)
11.
M. Abdollahi Azgomi and A. Movaghar,
"An Introduction to High-Level Stochastic Activity Networks," International
Reviews on Computers and Software, Vol. 1, No. 1, Praise Worthy Prize,
ISSN: 1828-6003, 2006, pp. 20-30 (Index: SJR)
12.
M. Abdollahi Azgomi and A. Movaghar,
"Hierarchical
Stochastic Activity Networks: Formal Definitions and Behaviour," International Journal of Simulation, Systems,
Science and Technology, UK Simulation Society, Vol. 6, No. 1-2, 2005,
pp. 56-66 (Index: SJR/Scopus)
Book Chapters/Electronic Notes:
1. A. Sedaghatbaf and M. Abdollahi Azgomi, “Software Architecture
Modeling and Evaluation Based on Stochastic Activity Networks,” In: M. Dastani and M. Sirjani (Eds.), Lecture Notes in
Computer Science (LNCS), Vol.
9392, Proc. of the 6th IPM International Conference on Fundamentals of
Software Engineering (FSEN’15), IPM,
Tehran, Iran, April 22-24, Revised Selected Papers, Springer, ISBN
978-3-642-02423-8, 2015,
pp. 46-53
2. M.
Divsalar and M. Abdollahi Azgomi, "A
Computational Trust Model for E-Commerce Systems," In: T. Luigi, K. Stanoevska-Slabeva, and V.
Rakocevic (Eds.), Lecture Notes of
ICST (LNICST), Vol. 21, Proc. of the International Conference on
Digital Businesses (DigiBiz'09),
London, UK, June 17-19, 2009, Revised Selected Papers, Springer, ISSN:
1867-8211, 2010, pp. 9-18
3. Y. Fazlalizadeh, A. Khalilian, M.
Abdollahi Azgomi and S. Parsa, "Incorporating
Historical Test Case Performance Data and Resource Constraints into Test Case
Prioritization,"
In: C. Dubois (Ed.), Lecture Notes in
Computer Science (LNCS), Vol. 5668, Proc. of the 3rd International
Conference on Tests And Proofs (TAP'09),
ETH Zurich, Switzerland, July 2-3, 2009, Springer, ISSN: 0302-9743, 2009, pp. 43-57
4. Z. Aghajani and M. Abdollahi Azgomi,
"Security
Evaluation of an Intrusion Tolerant Web Service Architecture Using Stochastic
Activity Networks,"
In: J.H. Park et al. (Eds.), Lecture Notes in
Computer Science (LNCS), Vol. 5576, Proc. of the 3rd
International Conference on Information Security and Assurance (ISA'09), Korea University, Seoul,
Korea, June 25-27, 2009, Springer, ISSN: 0302-9743, 2009,
pp. 260-269
5. A. Khalili, A. Jalaly Bidgoly and M. Abdollahi
Azgomi, "PDETool: A
Multi-Formalism Modeling Tool for Discrete-Event Systems Based on SDES
Description," In: G. Franceschinis and K. Wolf (Eds.), Lecture Notes in
Computer Science (LNCS), Vol. 5606, Proc. of the 30th
International Conference on Application and Theory of Petri Nets and Other Models
of Concurrency (ICATPN'09), Paris,
France, June 22-26, 2009, Springer, ISSN: 0302-9743, 2009,
pp. 343-352
6. M. Abdollahi Azgomi and A. Khalili,
"Performance Evaluation of
Sensor Medium Access Control Protocol Using Coloured Petri Nets," In: J. Chr. Godskesen and M.
Merro (Eds.), Electronic
Notes in Theoretical Computer Science (ENTCS), Vol. 242, Proc. of
the 1st International Workshop on Formal Methods for Wireless
Systems (FMWS'08), Satellite Workshop of CONCUR’08, Toronto, Canada, August 23, 2008,
Elsevier, ISSN: 1571-0661, 2009, pp. 31-42
7. F. Javadi Mottaghi and M. Abdollahi
Azgomi, "Workflow Modeling
Using Stochastic Activity Networks," In: S.K.
Prasad et al. (Eds.), Communications
in Computer and Information Science (CCIS), Vol. 31, Proc. of the 3rd
International Conference on Information Systems, Technology and Management (ICISTM'09), IMT, Ghaziabad, India, March
12-13, 2009, Springer, ISSN: 1865-0929, 2009, pp.
220-231
8. N. Laleh, M. Abdollahi Azgomi,
"A Taxonomy of
Frauds and Fraud Detection Techniques," In: S.K. Prasad et al. (Eds.), Communications in Computer and
Information Science (CCIS), Vol. 31, Proc. of the 3rd International
Conference on Information Systems, Technology and Management (ICISTM'09), IMT, Ghaziabad, India, March 12-13, 2009, Springer, ISSN: 1865-0929, 2009, pp.
256-267
9. N. Laleh, M. Abdollahi Azgomi,
"An Overview of a
Hybrid Fraud Scoring and Spike Detection Technique for Fraud Detection in
Streaming Data," In: S.K.
Prasad et al. (Eds.), Communications
in Computer and Information Science (CCIS), Vol. 31, Proc. of the 3rd
International Conference on Information Systems, Technology and Management (ICISTM'09), IMT, Ghaziabad, India, March 12-13, 2009, Springer, ISSN: 1865-0929, 2009, pp.
356-357
10. H. Mohammad Gholizadeh and M. Abdollahi Azgomi, "An Overview of a
New Multi-Formalism Modeling Framework," In: S.K. Prasad et al. (Eds.), Communications in Computer and
Information Science (CCIS), Vol. 31, Proc. of the 3rd
International Conference on Information Systems, Technology and Management (ICISTM'09), IMT, Ghaziabad, India, March 12-13, 2009, Springer, ISSN: 1865-0929, 2009, pp.
360-361
11. M. Nasri, S. Shariati and M. Abdollahi Azgomi,
"Performance
Modeling of a Distributed Web Crawler using Stochastic Activity Networks,"
In: H. Sarbazi-Azad, B. Parhami, S.-G. Miremadi and S. Hessabi (Eds.), Communications in Computer and
Information Science (CCIS), Vol. 9, Proc. of the 13th International
CSI Computer Conference (CSICC'08),
Sharif University of Technology, Kish Island, Iran, March 9-11, 2008, Revised
Selected Papers, Springer, ISSN: 1865-0929, 2008, pp. 535-542
12. A.
Kamandi, M. Abdollahi Azgomi and A. Movaghar. "Transformation of UML
Models into Analyzable OSAN Models," In: F. Arbab and M. Sirjani
(Eds.), Electronic Notes in
Theoretical Computer Science (ENTCS), Vol. 159, Proc. of the IPM
International Workshop on Foundations of Software Engineering (FSEN'05), Tehran, Iran, Oct. 1-3,
2005, Revised Papers, Elsevier, ISSN: 1571-0661, 2006,
pp. 3-22
1. E. Ghassabani and M. Abdollahi Azgomi, Stateless Code Model Checking of
Information Flow Security, CoRR
abs/1603.03533, 2016
2. E.
Ghassabani and M. Abdollahi Azgomi, A
New Approach to Stateless Model Checking of LTL Properties, CoRR abs/1603.03535, 2016
3. E.
Ghassabani and M. Abdollahi Azgomi, DSCMC:
Distributed Stateless Code Model Checker, CoRR abs/1603.03536, 2016
4. R. Ghassem
Esfahani, M. Abdollahi Azgomi and R. Fathi, Anomaly Detection in XML-Structured SOAP Messages Using
Tree-Based Association Rule Mining, CoRR
abs/1605.06466, 2016
5. A.
Hosseini and M. Abdollahi Azgomi, An
Extension for Combination of Duty Constraints in Role-Based Access Control,
CoRR abs/1001.2268, 2010
Papers in International Conferences/Workshops:
1.
H.
Orojloo and M. Abdollahi Azgomi, "Evaluating the Complexity
and Impacts of Attacks on Cyber-Physical Systems," Proc. of
the CSI Symposium on Real-Time and Embedded Systems and Technologies (RTEST'15), Sharif University of Technology, Tehran,
Iran, Oct. 7-8, IEEE Press, 2015, pp. 1-8
2.
P. Shirani, M. Abdollahi Azgomi and S.
Alrabaee, “A Method for Intrusion
Detection in Web Services Based on Time Series,” Proc. of
the 28th Annual IEEE Canadian Conference on Electrical and Computer Engineering
(CCECE’2015),
Halifax, Nova Scotia, Canada, May 3-6, IEEE Press, 2015, pp. 836-841
3. S.
Hosseini, M. Abdollahi Azgomi and A. T. Rahmani, "On the global dynamics of
an SEIRS epidemic model of malware propagation," Proc. of the 7th International
Symposium on Telecommunications (IST'14), ICT
Research Institute (ITRC), Tehran, Iran, Sept. 09–11, IEEE Press, 2014, pp.
646-651
4. H. Orojloo and M. Abdollahi Azgomi, "A Method for Modeling and Evaluation of the Security of Cyber-Physical Systems," Proc. of the 11th International ISC Conference on Information Security and Cryptology (ISCISC'14), University of Tehran, Tehran, Iran, Sept. 03–04, IEEE Press, 2014, pp. 131-136
5.
S. Hosseini, M. Abdollahi Azgomi and A. T.
Rahmani, "A Malware Propagation
Model Considering Software Diversity and Topology Dynamics," Proc. of the
11th International ISC Conference on Information Security and
Cryptology (ISCISC'14), University
of Tehran, Tehran, Iran, Sept. 03–04, IEEE Press, 2014, pp. 73-78
6. M. Ashtiani and M. Abdollahi Azgomi, "A Computational Model of Trust
Based on a Multi-Criteria Decision Making Approach," Proc. of the 2013
International Symposium on Computer Science and Software Engineering (CSSE'13), Sharif University of Technology, Tehran,
Iran, Dec. 25–27, 2013, pp. 1-12
7.
A.
Jafarabadi and M. Abdollahi Azgomi, "An SIR Model for the
Propagation of Topology-Aware Active Worms Considering the Join and Leave of
Hosts," Proc. of the 7th
International Conference On Information Assurance and Security (IAS'11), Malacca, Malaysia, Dec.
5-8, IEEE Press, 2011, pp. 204-029
8.
A. Jafarabadi and M. Abdollahi Azgomi, "On the Impacts
of Join and Leave on the Propagation Ratio of Topology-Aware Active Worms," Proc.
of the 4th International Conference on Security of Information and
Networks (SIN'11),
Sydney, Australia, Nov. 14-19, ACM Press, 2011, pp. 209-214
9.
B. Mehrparvar, M. Abdollahi Azgomi, "Towards a Multi-Formalism Model Checker Based on SDES Description," Proc.
of the 7th International Conference on Foundations of Computer
Science (FCS'11),
Las Vegas, Nevada, USA, July 18-21, 2011, pp. 115-121
10.
M. Akbarzadeh and M. Abdollahi Azgomi, "A Framework
for Quantitative Evaluation of Security Protocols Using Coloured Stochastic
Activity Networks and PDETool," Proc.
of the 5th International Symposium on Telecommunications (IST'10), ITRC,
Tehran, Iran, Dec. 4-6, IEEE Press, 2010, pp. 210-215
11.
M.S.A.
Najjar and M. Abdollahi Azgomi, "A
Distributed Multi-Approach Intrusion Detection System for Web Services," Proc. of the 3rd
International Conference on Security of Information and Networks (SIN'10), Sept. 7-11, Taganrog, Rostov-on-Don, Russia,
ACM Press, 2010, pp. 238-244
12.
M. Akbarzadeh and M. Abdollahi Azgomi, "Modeling and
Analysis of Agent-Based Specifications of Security Protocols Using CSANs and
PDETool," Proc. of the 6th
International Conference on Innovations in Information Technology (Innovations'09), UAEU, Al Ain, Emirates, Dec.
15-17, IEEE Press, 2009, pp. 11-15 (Best
Paper Award)
13.
R. Ghasem Esfahani and M. Abdollahi Azgomi, "Towards an
Anomaly Detection Technique Based on Kernel Methods for Web Services," Proc. of the 6th
International Conference on Innovations in Information Technology (Innovations'09), UAEU, Al Ain, Emirates, Dec.
15-17, IEEE Press, 2009, pp. 345-349
14.
Z. Aghajani and M. Abdollahi Azgomi, "A Majority
Voter for Intrusion Tolerant Software Based on N-Version Programming Techniques," Proc. of the 6th
International Conference on Innovations in Information Technology (Innovations'09), UAEU, Al Ain, Emirates, Dec.
15-17, IEEE Press, 2009, pp. 304-308
15.
A. Hosseini and M. Abdollahi Azgomi, "Combination of
Duty and Historical Constraints in Role-Based Access Control," Proc. of the 6th
International Conference on Innovations in Information Technology (Innovations'09), UAEU, Al Ain, Emirates, Dec.
15-17, IEEE Press, 2009, pp. 309-313
16.
E. Nourani and M. Abdollahi Azgomi, "A Design
Pattern for Dependable Web Services Using Design Diversity Techniques and
WS-BPEL," Proc. of the 6th
International Conference on Innovations in Information Technology (Innovations'09), UAEU, Al Ain, Emirates, Dec. 15-17,
IEEE Press, 2009, pp. 325-329
17.
A. Omidi and M. Abdollahi Azgomi, "An
Architecture for E-Voting Systems Based on Dependable Web Services," Proc. of the 6th
International Conference on Innovations in Information Technology (Innovations'09), UAEU, Al Ain, Emirates, Dec.
15-17, IEEE Press, 2009, pp. 200-204
18.
B. Zare Moayedi and M. Abdollahi Azgomi, "A Game Theoretic
Approach for Quantitative Evaluation of Security by Considering Hackers with
Diverse Behaviors," Proc. of the 2nd IEEE
International Symposium on Ubisafe Computing (UbiSafe'09)), 8th
IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC'09), Chengdu, China,
Dec. 12-14, IEEE Press, 2009, pp. 508-513
19.
B. Zare Moayedi and M. Abdollahi Azgomi, "A Game Theoretic
Approach for Quantitative Evaluation of Strategic Interactions between Hacker's
Motivations," Proc. of the 3rd European
Symposium Computer Modelling and
Simulation (EMS'09), Athens,
Greece, Nov. 25-27, IEEE Press, 2009, pp. 552-557
20.
F. Javadi Mottaghi and M.
Abdollahi Azgomi, "SWML: A Workflow Modeling
Language Based on Stochastic Activity Networks," Proc. of
the 14th International CSI Computer Conference (CSICC'09), Amirkabir University of
Technology, Tehran, Iran, October 20-21, IEEE Press, 2009, pp. 17-22
21.
M. Dashtbozorgi and M. Abdollahi Azgomi, "A Scalable Multi-Core Aware
Software Architecture for High-Performance Network Monitoring," Proc.
of the 2nd International Conference on Security of
Information and Networks (SIN'09),
Salamis Bay Conti Resort Hotel, Gazimagusa, North Cyprus, October 6-10, ACM
Press, 2009, pp. 117-122
22.
A. Jalaly Bidgoly, M. Abdollahi Azgomi and A.
Khalili, "An Advanced Technique for Rare-Event
Simulation Based on Partition of the Region," Proc. of the 10th
International Middle Eastern Simulation Multiconference (MESM'09), Lebanese American University, Beirut, Lebanon, September
27-29, 2009, pp. 5-10
23.
Z. Aghajani and M. Abdollahi Azgomi, "Modeling and Simulation of an Intrusion Tolerant Web Service
Architecture Using Coloured Petri Nets," Proc. of the 10th
International Middle Eastern Simulation Multiconference (MESM'09), Lebanese American University, Beirut, Lebanon,
September 27-29, 2009, pp. 60-66
24.
G. Khazan and M. Abdollahi Azgomi, "Cyber Attack Simulation by SimEvents for Quantitative Security
Evaluation," Proc. of the 10th
International Middle Eastern Simulation Multiconference (MESM'09), Lebanese American University, Beirut, Lebanon,
September 27-29, 2009, pp. 67-71
25.
A. Khalili and M. Abdollahi Azgomi, "RayLang: A Modeling Language for Performance Evaluation of
Stochastic Discrete-Event Systems," Proc. of the 10th
International Middle Eastern Simulation Multiconference (MESM'09), Lebanese American University, Beirut, Lebanon,
September 27-29, 2009, pp. 119-130
26.
F. Karamzadeh and M. Abdollahi Azgomi, "An Automated System for
Search and Retrieval of Trademarks," Proc. of the 11th
International Conference on Electronic Commerce (ICEC'09), August 12-14, Taipei, Taiwan,
ACM Press, 2009, pp. 374-377
27.
M. Dashtbozorgi and M. Abdollahi Azgomi, "A
High-Performance Software Solution for Packet Capture and Transmission," Proc. of the 2nd IEEE International
Conference on Computer Science and Information Technology (ICCSIT'09), Aug. 8-11, Beijing, China, IEEE Press, 2009,
pp. 407-411
28.
Y. Fazlalizadeh, A. Khalilian, M. Abdollahi
Azgomi and S. Parsa, "Prioritizing
Test Cases for Resource Constraint Environments Using Historical Test Case
Performance Data," Proc. of
the 2nd IEEE International Conference on Computer Science and
Information Technology (ICCSIT'09), August
8-11, Beijing, China, IEEE Press, 2009, pp. 190-195
29.
O. Abedi, R. Berangi and M. Abdollahi Azgomi,
"Improving
Route Stability and Overhead on AODV Routing Protocol and Make It Usable for
VANET," Proc. of the 29th IEEE
International Conference on Distributed Computing Systems (ICDCS'09), Montreal,
Quebec, Canada, June 22-26, IEEE Press, 2009, pp. 464-467
30.
A. Jalaly Bidgoly, A. Khalili and M. Abdollahi
Azgomi, "Implementation of Coloured
Stochastic Activity Networks within the PDETool Framework," Proc. of the 3rd Asia International
Conference on Modelling and Simulation (AMS'09),
Bandung 25-26 May, Bali 29 May, IEEE Press, 2009, pp. 710-715
31.
M. Ghalambor Dezfuli, A. A. Safaeei and M. Abdollahi Azgomi, "DSMS Scheduling Regarding
Complex QoS Functions," Proc. of
the 7th ACS/IEEE International Conference on Computer Systems and
Applications (AICCSA'09), Rabat, Morocco, May 10-13, IEEE Press, 2009,
pp. 587-594
32.
G. Khazan and M.
Abdollahi Azgomi, "A Distributed Attack
Simulation for Quantitative Security Evaluation Using SimEvents," Proc. of the 7th ACS/IEEE
International Conference on Computer Systems and Applications (AICCSA'09), Rabat, Morocco, May 10-13, IEEE Press, 2009,
pp. 382-385
33.
H. Mohammad Gholizadeh and M.
Abdollahi Azgomi, "An Object-Oriented
Modeling Framework for Petri Nets and Related Models," Proc. of the 7th ACS/IEEE
International Conference on Computer Systems and Applications (AICCSA'09), Rabat, Morocco, May 10-13, IEEE Press, 2009,
pp. 546-549
34.
J. Almasizadeh and M. Abdollahi Azgomi, "Intrusion Process Modeling for
Security Quantification," Proc. of the 4th International
Conference on Availability, Reliability and Security (ARES'09), March 16-19, Fukuoka Institute of Technology (FIT), Fukuoka, Japan, IEEE Press, 2009, pp. 114-121
35.
S. Hajian and M. Abdollahi Azgomi,
"A Privacy Preserving Clustering
Technique Using Haar Wavelet Transform and Scaling Data Perturbation," Proc. of the 5th International
Conference on Innovations in Information Technology (Innovations'08), Al Ain, Emirates, Dec. 16-18, IEEE Press, 2008, pp. 218-222
36.
M. Tavakolan, M. Zarreh and M.
Abdollahi Azgomi, "An Extensible Model
for Improving the Privacy of Web Services," Proc. of
the 5th International Conference on Innovations in Information
Technology (Innovations'08), Al Ain, Emirates, Dec. 16-18, IEEE Press, 2008, pp. 175-179
37.
J. Almasizadeh and M. Abdollahi
Azgomi, "A New Method
for Modeling and Evaluation of the Probability of Attacker Success," Proc. of the 2008 International Conference on
Security Technology (SecTech'08), Horizon Resort, Sanya, Hainan Island, China, Dec. 13-15, IEEE
Press, 2008, pp. 49-53
38.
S. L. Mirtaheri, E. Mousavi, M.
Sharifi and M. Abdollahi Azgomi, "The Influence
of Efficient Message Passing Mechanisms on High Performance Distributed
Scientific Computing," Proc. of
the 2008 IEEE International Symposium on Advances in Parallel and Distributed
Computing Techniques (APDCT'08), in conjunction with the 2008 IEEE International Symposium
on Parallel and Distributed Processing with Applications (ISPA'08), Sydney, Australia, Dec. 10-12, IEEE Press, 2008, pp. 663-668
39.
Z. Aliannezhadi and M. Abdollahi
Azgomi, "Modeling and Analysis of a Web
Service Firewall Using Coloured Petri Nets," Proc. of
the 2008 IEEE Asia-Pacific Services Computing Conference (APSCC'08), Jiaosi, Yilan, Taiwan, Dec. 9-12, IEEE Press, 2008, pp. 548-553
40.
M. Khalesi and M. Abdollahi Azgomi,
"Towards
a Trust-Based Model for Administration of Mailing Lists," Proc. of the 2008 IEEE Global
Telecommunications Conference (GLOBECOM'08), World
Telecommunications Congress (WTC’08), New Orleans, LA, USA, Dec. 1-2, IEEE Press, 2008, pp. 1-6
41.
M. Abdollahi Azgomi and A. Khalili,
"Performance Evaluation of Sensor Medium Access Control Protocol
Using Coloured Petri Nets," Preliminary Proc. of
the First International. Workshop on Formal Methods for Wireless Systems (FMWS'08), Satellite Workshop of CONCUR’08, Toronto, Canada, August
23, 2008, pp. 66-76
42.
A. Jalaly Bidgoly and M. Abdollahi
Azgomi, "Rare Event Simulation of Stochastic
Activity Networks Using Partition of the Region Technique," Proc. of the 24th UK Performance
Engineering Workshop (UKPEW'08), Imperial College London, UK, July 3-4, 2008, pp. 107-122
43.
S. Hosseini and M. Abdollahi Azgomi,
"UML Model
Refactoring with Emphasis on Behavior Preservation," Proc. of the 2nd IFIP/IEEE
International Symposium on Theoretical Aspects of Software Engineering (TASE'08), Nanjing, China, June 17-19, IEEE Press, 2008, pp. 125-128
44.
M.
Sharifi, M. Abdollahi Azgomi and O. Kashefi, "A New Approach to Mutual
Authentication without Password Exchange," Proc. of the International Conference
on App. of Information Communication Technologies in Science and
Education (AICTSE'07),
Baku, Azerbaijan, 1-2 Nov., 2007)
45.
M. Fanaeepour, L. Naghavian and M.
Abdollahi Azgomi, "Modeling
and Evaluation of Call Centers with GSPN Models," Proc. of the 2007 ACS/IEEE International Conference on
Computer Systems and Applications (AICCSA-2007), Amman, Jordan, May 13-16, IEEE
Press, 2007, pp. 619-622
46.
M. Abdollahi Azgomi and A. Movaghar,
"Efficient Evaluation of CSAN Models
by State Space Analysis Methods," Proc. of the
International Conference on Software Engineering Advances (ICSEA'06),
Tahiti, French Polynesia, Oct. 29 – Nov. 1, IEEE Press, 2006)
47.
M. Abdollahi Azgomi and A. Movaghar,
"Modeling and
Evaluation of Software Systems with Object Stochastic Activity Networks," Proc. of the International Conference on Software
Engineering Advances (ICSEA'06), Tahiti, French Polynesia, Oct. 29-Nov. 1,
IEEE Press, 2006)
48.
M. Abdollahi Azgomi and A. Movaghar,
"A Case Study on Application of CSAN Models on Network Modeling," Proc. of the 5th International Symposium on
Communication Systems, Networks and Digital Signal Processing (CSNDSP'06),
Patras, Greece, July 19-21, 2006, pp. 270-274
49.
A. Kamandi, M. Abdollahi Azgomi and A.
Movaghar. "Derivation and Evaluation of OSAN
Models from UML Models of Business Processes," Preliminary Proc. of the IPM
International Workshop on Foundations of Software Engineering (FSEN'05),
Tehran, Iran, Oct. 1-3, 2005, pp. 287-305
50.
M. Abdollahi Azgomi and A. Movaghar,
"Modeling and Evaluation of a Packet-Based Telecommunication
Switching Center with HSAN Models," Proc. of the 13th
International Conference on Software, Telecommunications and Computer Networks
(SoftCOM'05), Split, Marina Frapa, Croatia, Sept. 15-17, 2005, pp.
182-186
51.
M. Abdollahi Azgomi and A. Movaghar,
"Modeling and Evaluation with
Object Stochastic Activity Networks," Proc. of the 1st
International Conference on Quantitative Evaluation of Systems (QEST'04),
Enschede, The Netherlands, IEEE Press, Sept. 27-30, 2004, pp. 326-327
52.
M. Abdollahi Azgomi and A. Movaghar,
"Coloured Stochastic Activity Networks: Definitions and Behaviour," Proc. of the 20th Annual UK Performance
Engineering Workshop (UKPEW'04), Bradford, UK, July 7-8, 2004, pp. 297-308
53.
M. Abdollahi Azgomi and A. Movaghar,
"An
Interchange Format for Stochastic Activity Networks Based on PNML," Proc. of the ICATPN'04 Satellite Workshop on the
Definition, Implementation and Application of a Standard Interchange Format for
Petri Nets (XML4PN'04), Bolonga, Italy, June 26, 2004)1-10
54.
M. Abdollahi Azgomi and A. Movaghar,
"A Modelling Tool for Hierarchical Stochastic Activity Networks," Proc. of the 11th International Conference on
Analytical and Stochastic Modelling Techniques and Applications (ESM/ASMTA'04),
Magdeburg, Germany, June 13-16, 2004)141-146
55.
M. Abdollahi Azgomi and A. Movaghar,
"Towards an Object-Oriented Extension for Stochastic Activity
Networks," Proc. of the 10th Workshop on Algorithms and
Tools for Petri Nets (AWPN'03), Eichstätt, Germany, Sept. 26-27, 2003, pp.
144-155
56.
M. Abdollahi Azgomi and A. Movaghar,
"Coloured Stochastic Activity Networks: Preliminary Definitions and
Properties," Proc. of the ICALP'03
Satellite Workshop on Stochastic Petri Nets and Related Formalisms,
Eindhoven, The Netherlands, June 28-29, 2003, pp. 154-169
57.
M. Abdollahi Azgomi and A. Movaghar,
"Hierarchical Stochastic Activity Networks," Proc. of the 10th International Conference on
Analytical and Stochastic Modelling Techniques and Applications (ESM/ASMTA'03),
Nottingham, UK, June 9-11, 2003, pp. 169-174
58.
M. Abdollahi Azgomi and A. Movaghar,
"Application
of Stochastic Activity Networks on Network Modeling," Proc. of the 10th International Conference on
Software, Telecommunications and Computer Networks (SoftCOM'02), Split,
Dubrovnik, Croatia, 2002, pp. 678-682
59.
M.
Abdollahi Azgomi and A. Movaghar, "An Introduction to
New Extensions for Stochastic Activity Networks," Proc. of the 14th
IASTED International Conference on Parallel and Distributed Computing and
Systems (PDCS'02), Cambridge, Massachusetts, USA, 2002, pp. 405-410
60.
M. Abdollahi Azgomi and A. Movaghar,
"SharifSAN: A Tool for Verification
and Performance Evaluation Based on a New Definition of SANs," Proc. of the 13th IASTED International Conference on
Parallel and Distributed Computing and Systems (PDCS'01), Anaheim, CA, 2001, pp. 667-672
Papers in National (Iranian) Conferences:
1. M. Ashtiani and M. Abdollahi Azgomi, "Quantum-Like
Models: A Mathematical Model for Modeling Computational Trust," Proc. of the 14th
International ISC Conference on Information Security and Cryptology (ISCISC'17), Shiraz University, Shiraz, Iran, Sept. 06–07,
2014 (in Persian)(Invited Paper)
2. Y.
Abdolmaleki and M. Abdollahi Azgomi, “A Method for Anomaly Detection in Cyber-Physical Systems
through the Analysis of Sensor Data,” Proc. of
the 22nd Annual National CSI Computer Conference (CSICC'17), Sharif University of Technology, Tehran,
Iran, March 2017 (in Persian)
3. Sh. Rezaee
and M. Abdollahi Azgomi, “A Solution Software Protection Based on Hardware Dangle
Using Augmented Methods,” Proc. of
the 22nd Annual National CSI Computer Conference (CSICC'17), Sharif University of Technology, Tehran,
Iran, March 2017 (in Persian)
4. M.R. Ebrahimi Dishabi and M. Abdollahi Azgomi, "Privacy-Preserving
Classification in Distance-Based Algorithms," Proc. of the 11th
International ISC Conference on Information Security and Cryptology (ISCISC'14), University of Tehran, Tehran, Iran, Sept.
03–04, 2014 (in Persian)
5. E. Sargolzaee and M. Abdollahi Azgomi, "Preserving the Privacy of Published Social Networks Data Based on Graph Modification," Proc. of the 10th International ISC Conference on Information Security and Cryptology (ISCISC'13), Yazd University, Yazd, Iran, Aug. 29-30, 2013, pp. 30-37 (in Persian)
6.
R. Fathi
and M. Abdollahi Azgomi, "Implementation of a Symbolic State Space Generator for SDES
Descriptions in PDETool Framework,"
Proc. of the 17th Annual National CSI Computer Conference (CSICC'17),
Sharif University of Technology, Tehran, Iran, March 6-8, 2012, pp. 614-619 (in
Persian) (Best Paper)
7.
A. Rad
Khorrami, H. Motallebi and M. Abdollahi Azgomi, "Improving the Locality of Data in
WZ Factorization for Solution of the System of Linear Equations," Proc. of the 17th Annual
National CSI Computer Conference (CSICC'12), Sharif University of
Technology, Tehran, Iran, March 6-8, 2012, pp. 609-613 (in Persian)
8.
Z. Mousavi and M. Abdollahi Azgomi, "New Method for Determination of Effective History of Mutable
Attributes in Usage Control Model," Proc. of the First Conference on
Intelligent Computer Systems and Applications (ITICS'11), Tehran, Iran, Dec. 21,
2011 (in Persian)
9.
M. Ashtiani and M. Abdollahi Azgomi, "A Framework for High-Level Modeling and Simulation of Cyber
Attacks for Evaluation of Availability," Proc. of the 8th
International ISC Conference on Information Security and Cryptology (ISCISC'11), Ferdowsi University of
Mashhad, Mashhad, Iran, Sept. 14-15, 2011, pp. 93-98 (in Persian)
10.
Sh. Torabi and M. Abdollahi Azgomi, "Implementing a Parallel Numerical Solver of CTMCs on Multi-Core
Processors," Proc. of the 2nd International
Conference on Contemporary Issues in Computer and Information Sciences (CICIS'11), IASBS,
Zanjan, Iran, May 31-June 2, 2011, pp.
39-42 (in Persian)
11.
M.S. Mirzaei and M. Abdollahi Azgomi, "On the Use of Convex Polyhedra in
the State Space Analysis of Computational Models," Proc. of the 2nd
International Conference on Contemporary Issues in Computer and Information
Sciences (CICIS'11),
IASBS, Zanjan, Iran, May 31-June 2,
2011, pp. 620-623 (in Persian)
12.
R. Fathi and M. Abdollahi Azgomi, "Implementing a Symbolic State Space Generator for SDES
Descriptions," Proc. of the 2nd
International Conference on Contemporary Issues in Computer and Information
Sciences (CICIS'11),
IASBS, Zanjan, Iran, May 31-June 2,
2011, pp. 470-475 (in Persian)
13.
Sh.
Torabi and M. Abdollahi Azgomi, "A New Parallel Numerical Solver for CTMCs," Proc. of the 16th Annual
National CSI Computer Conference (CSICC'11),
Sharif University of Technology, Tehran, Iran, March 7-9, 2011, pp. 84-89 (in
Persian)
14.
R. Fathi
and M. Abdollahi Azgomi, "Symbolic State Space Generation using
ROBDDs for SDES Descriptions,"
Proc. of the 16th Annual National CSI Computer Conference (CSICC'11), Sharif University of
Technology, Tehran, Iran, March 7-9, 2011, pp. 181-186 (in Persian)
15.
H. Motallebi, R. Zare Farkhady and M. Abdollahi
Azgomi, "A Probabilistic Solution for
Process Mining of Incomplete Noisy Execution Logs in BPMSs," Proc.
of the First Iranian Information and Communication Technology Congress (IICTC'10),
Tehran Metropolitan, Tehran, Iran, May. 22-24, 2010 (in Persian)
16.
A. Vakili, M. Abdollahi Azgomi and M. Taromi,
"A Solution for Security Modeling and Evaluation Based on Game
Theory and Generalized Stochastic Petri Nets," Proc. of the First Iranian
Information and Communication Technology Congress (IICTC'10),
Tehran Metropolitan, Tehran, Iran, May. 22-24, 2010 (in Persian)
17.
M. Taromi, M. Abdollahi Azgomi and A. Vakili,
"Security Risk Estimation by Considering the Dependencies of the
System Vulnerabilities," Proc. of the First Iranian
Information and Communication Technology Congress (IICTC'10),
Tehran Metropolitan, Tehran, Iran, May. 22-24, 2010 (in Persian)
18.
T. Broomandnezhad and M.
Abdollahi Azgomi, "A New Technique for Optimizing
Software-Implemented Methods for Detection of Transient Faults in Embedded Software," Proc. of the 15th Annual
National CSI Computer Conference (CSICC'10), Niroo Research Institute, Tehran, Iran, Feb. 20-22, 2010 (in
Persian)
19.
A. Jalaly Bidgoly and M.
Abdollahi Azgomi, "Rare Event Simulation Based on
Advanced Partition of the Region Technique," Proc. of
the 15th Annual National CSI Computer Conference (CSICC'10), Niroo Research Institute,
Tehran, Iran, Feb. 20-22, 2010 (in Persian)
20.
M.S.A. Najjar and M. Abdollahi
Azgomi, "A New Technique for Anomaly
Detection in Web Services using Hidden Markov Models," Proc. of the 15th Annual
National CSI Computer Conference (CSICC'10), Niroo Research Institute, Tehran, Iran, Feb. 20-22, 2010 (in
Persian)
21.
T. Broomandnezhad, M. Abdollahi
Azgomi and Sh. Jalilian, "A Survey on Software-Implemented
Techniques for Tolerating Transient Faults in Satellite Software," Proc. of the 9th Iranian
Aerospace Society Conference (AERO'10), The Science and Research Branch, Islamic Azad University, Tehran,
Iran, Feb. 8-10, 2010 (in Persian)
22.
R. Ghasem Esfahani and M. Abdollahi Azgomi, "A Method for Intrusion Detection in Web Services by Employing XML
Mining," Proc. of the 3rd Iranian Data
Mining Conference (IDMC'09), Amirkabir University of Technology, Tehran, Iran, Dec. 15-16,
2009 (in Persian)
23.
H. Daghaghzadeh and M. Abdollahi Azgomi, "A Semantic Based Search Method to
Improve the Precision of Search Results in Qur'anic Software," Proc. of the 3rd Iranian Data
Mining Conference (IDMC'09), Amirkabir University of Technology, Tehran, Iran, Dec. 15-16,
2009 (in Persian)
24.
M. Akbarzadeh and M. Abdollahi Azgomi, "Modeling and Analysis of Security
Protocols Based on Role-Based Specifications Using Coloured Petri Nets
and CPN Tools," Proc. of the 3rd Conference of Iranian Society
for Command and Control (C4I'09), Tehran, Iran, Nov.
16-18, 2009, pp. 481-488 (in Persian)
25.
M. Akbarzadeh and M. Abdollahi Azgomi, "Modeling and Quantitative
Analysis of Security Protocols Based on Probabilistic Model Checking and the
PRISM Tool,"Proc. of the 6th International
ISC Conference on Information Security and Cryptology (ISCISC'09), University of Isfahan, Isfahan,
Iran, Oct. 7-8, 2009, pp. 189-196 (in Persian)
26.
M.S.A. Najjar and M. Abdollahi Azgomi, "A Distributed Intrusion Detection
System for Web Services by Anomaly and Misuse Detection Approaches," Proc. of the 6thInternational
ISC Conference on Information Security and Cryptology (ISCISC'09), University of Isfahan, Isfahan,
Iran, Oct. 7-8, 2009, pp. 205-212 (in Persian)
27.
R. Entezari Maleki and M. Abdollahi Azgomi, "Modeling Scheduling and Task
Execution in Grid Environment Using Distributed Timed Petri Nets," Proc. of the 3rd Joint Congress
on Fuzzy and Intelligent Systems (IFS'09), Yazd University, Yazd, Iran, July 14-16, 2009 (in Persian)
28.
J. Almasizadeh and M. Abdollahi Azgomi, "Security Analysis by Considering the Temporal Aspects of the
Behavior of Attacker and System," Proc. of the 17th Iranian
Conference on Electrical Engineering (ICEE'09), Iran University of Science and Technology, Tehran, Iran, May
12-14, 2009 (in Persian)
29.
Y. Fazlalizadeh, A. Khalilian, M.
Abdollahi Azgomi and S. Parsa, "Accelerating the Process of Fault
Detection in Software Regression Testing for Environments with Time and
Resource Constraints," Proc. of the 17th Iranian
Conference on Electrical Engineering (ICEE'09), Iran University of Science and Technology, Tehran, Iran, May
12-14, 2009 (in Persian)
30.
S. Hajian and M. Abdollahi
Azgomi, "A Privacy Preserving Clustering
Technique for Distributed Datasets," Proc. of the 17th Iranian
Conference on Electrical Engineering (ICEE'09), Iran University of Science and Technology, Tehran, Iran, May
12-14, 2009 (in Persian)
31.
K. Yazdian and M. Abdollahi Azgomi, "Analysis of the Security Challenges of Iran Electricity Market," Proc. of
the 17th Iranian Conference on Electrical Engineering (ICEE'09), Iran University of Science and
Technology, Tehran, Iran, May 12-14, 2009 (in Persian)
32.
J. Almasizadeh and M. Abdollahi Azgomi, "A Efficient Method for Computing Mean-Time-To-Security-Failure of
Computer Systems," Proc. of the 14th Annual
National CSI Computer Conference (CSICC'09), Amirkabir University of Technology, Tehran, Iran, March 10-11,
2009 (in Persian)
33.
A. Jalaly Bidgoly and M.
Abdollahi Azgomi, "Rare Event Simulation Based on
Stochastic Activity Networks and Partition of the Region Technique," Proc. of
the 14thAnnual National CSI Computer Conference (CSICC'09), Amirkabir University of Technology, Tehran, Iran, March 10-11,
2009 (in Persian)
34.
R. Homauninezhad and M. Abdollahi
Azgomi, "A Security Checklist for Evaluation
of Steganographic File Systems," Proc.
of the 14th Annual National CSI Computer Conference (CSICC'09), Amirkabir University of Technology, Tehran, Iran, March 10-11,
2009 (in Persian)
35.
R. Asadi, M. Fathian and M.
Abdollahi Azgomi, "A Context-Based Extension for
Bell-La Padula Access Control Model," Proc. of the 14th Annual
National CSI Computer Conference (CSICC'09), Amirkabir University of Technology, Tehran, Iran, March 10-11,
2009 (in Persian)
36.
N. Laleh and M. Abdollahi Azgomi,
"Design and Implementation of a Tool for Monitoring and Detection of
Spikes in Data Streams," Proc. of the 14th Annual
National CSI Computer Conference (CSICC'09), Amirkabir University of Technology, Tehran, Iran, March 10-11,
2009 (in Persian)
37.
B. Zare Moayedi and M. Abdollahi
Azgomi, "An Efficient Scheme for Self-Sorting
WSNs with Binary Tree Topology," Proc. of the 14th Annual
National CSI Computer Conference (CSICC'09), Amirkabir University of Technology, Tehran, Iran, March 10-11,
2009 (in Persian)
38.
F. Javadi Mottaghi and M.
Abdollahi Azgomi, "A Workflow Modeling Language Based
on Stochastic Activity Networks," Proc. of the 14th Annual
National CSI Computer Conference (CSICC'09), Amirkabir University of Technology, Tehran, Iran, March 10-11,
2009 (in Persian)
39.
S. Hajian and M. Abdollahi
Azgomi, "A New Privacy Preserving Technique
for Data Mining Algorithms Based on Euclidian Distance," Proc. of
the 14th Annual National CSI Computer Conference (CSICC'09), Amirkabir University of Technology, Tehran, Iran, March 10-11,
2009 (in Persian)
40.
Y. Fazlalizadeh, A. Khalilian, M.
Abdollahi Azgomi and S. Parsa, "History-Driven Prioritization of
Test Cases Based on Fault Detection Performance and Aging in Software
Regression Test," Proc. of the 14th Annual
National CSI Computer Conference (CSICC'09), Amirkabir University of Technology, Tehran, Iran, March 10-11,
2009 (in Persian)
41.
Z. Aghajani and M. Abdollahi
Azgomi, "A Binary Majority Voting Scheme for
Multi-Version Programming Technique with Regarding Malicious Attacks," Proc. of
the 14thAnnual National CSI Computer Conference (CSICC'09), Amirkabir University of Technology, Tehran, Iran, March 10-11,
2009 (in Persian)
42.
M. Khalesi and M. Abdollahi
Azgomi, "A Direct Mechanism to Support
Exchanged Plaintext in E-Mail List Services," Proc. of the 14th Annual
National CSI Computer Conference (CSICC'09), Amirkabir University of Technology, Tehran, Iran, March 10-11,
2009 (in Persian)
43.
A. Rezaee and M. Abdollahi
Azgomi, "Modeling and Analysis of System
Based on Virtualization with Respect to Rejuvenation using SRNs," Proc. of
the 14th Annual National CSI Computer Conference (CSICC'09), Amirkabir University of Technology, Tehran, Iran, March 10-11,
2009 (in Persian)
44.
R. Entezari Maleki and M.
Abdollahi Azgomi, "Modeling Task Distribution and
Evaluation of Reliability in Grid Services Using CPNs," Proc. of
the 14th Annual National CSI Computer Conference (CSICC'09), Amirkabir University of Technology, Tehran, Iran, March 10-11,
2009 (in Persian)
45.
S. M. Rooholamini and M. Abdollahi
Azgomi, "Enterprise Resource Planning Systems: Security Issues and the Proposed
Solution" Proc. of the Conference on Enterprise Resource
Planning Systems (IRERP'09), Tehran, Iran, Jan. 21-22, 2009 (in Persian)
46.
K. Yazdian and M. Abdollahi Azgomi,
"Solutions for Enhancing the Security of Iran Power Market," Proc. of the 23rd International
Power System Conference (PSC'08), Tehran, Iran, Nov. 30-Dec. 1, 2008 (in Persian)
47.
K. Yazdian and M. Abdollahi Azgomi,
"Analysis of Iran Power Market Based on B2B Model of E-Commerce," Proc. of the 23rd International
Power System Conference (PSC'08), Tehran, Iran, Nov. 30-Dec. 1, 2008 (in Persian)
48.
S. Hajian and M. Abdollahi Azgomi,
"A New Data Transformation Method for Privacy Preserving
Clustering," Proc. of
the 2nd Iranian Data Mining Conference (IDMC'08), Amirkabir University of Technology, Tehran, Iran, Nov. 11-12,
2008 (in Persian)
49.
S. Hajian, M. Abdollahi Azgomi and
B. Minaei-Bidgoli, "A Framework for Privacy
Preserving Data Mining," Proc. of
the 2nd Iranian Data Mining Conference (IDMC'08), Amirkabir University of Technology, Tehran, Iran, Nov. 11-12,
2008 (in Persian)
50.
N. Laleh, M. Abdollahi Azgomi, B.
Minaei Bidgoli, "A New Fraud Detection Method in
Unlabeled Data with Emphasis on Minimizing False Alarms Proc.
of the 2nd Iranian Data Mining Conference (IDMC'08), Amirkabir University of Technology, Tehran, Iran, Nov. 11-12,
2008 (in Persian)
51.
J. Almasizadeh and M. Abdollahi
Azgomi, "Definition of an Appropriate
Probability Distribution Function for Modeling Security Failure," Proc. of the 5th International
ISC Conference on Information Security and Cryptography (ISCISC'08), Tehran, Iran, Oct. 6-7, 2008, pp. 117-127 (in Persian)
52.
S. Hajian and M. Abdollahi Azgomi, "A Technique for Privacy Preservation
of Sensitive Data by Preserving Their Statistical Properties," Proc. of the 5th International
ISC Conference on Information Security and Cryptography (ISCISC'08), Tehran, Iran, Oct. 6-7, 2008, pp. 164-171 (in Persian)
53.
S.M. Rooholamini and M. Abdollahi
Azgomi, "Security Issues in Implementation of
ERP Systems," Proc. of
the 1st Iranian Conference on Information Technology Project
Management (ITPMC'08), Tehran, Iran, June 15-16, 2008 (in Persian)
54.
A. Khalili and M. Abdollahi Azgomi,
"Formal Modeling and Performance Evaluation of a Medium Access
Control Protocol in Wireless Sensor Networks," Proc. of
the 16th Iranian Conference on Electrical Engineering (ICEE'08), Computer Track, Tarbiat Modares University, Tehran, May 13-15,
2008, pp. 38-43 (in Persian)
55.
S. Hosseini and M. Abdollahi Azgomi,
"Formal Specification of UML Model Refactoring with Regard to
Preserving Consistency," Proc. of
the 16th Iranian Conference on Electrical Engineering (ICEE'08), Computer Track, Tarbiat Modares University, Tehran, May 13-15,
2008, pp. 254-259 (in Persian)
56.
S. Shariati, M. Sharifi and M. Abdollahi
Azgomi, "Topology Approximation in Mobile Ad
Hoc Networks using Stochastic Activity Networks and Neural Networks," Proc.
of the 13th National CSI Computer Conference (CSICC'08), Sharif University of
Technology, Kish Island, Iran, March 9-11, 2008 (in Persian)
57.
H. Mohammad Gholizadeh and M. Abdollahi Azgomi, "A Framework Based on Object-Oriented
Technology for Modeling and Evaluation of Systems," Proc. of the 5thInternational
Conference on Information and Knowledge Technology (IKT'07), Ferdowsi of Mashhad University,
Mashhad, Iran, 27-29 Nov., 2007 (in Persian)
58.
A. Khalili and M.
Abdollahi Azgomi, "Formal Modeling and Probabilistic
Verification of an Intrusion Alert System in Wireless Sensor Networks," Proc. of the 5th International
Conference on Information and Knowledge Technology (IKT'07), Ferdowsi of Mashhad University,
Mashhad, Iran, 27-29 Nov., 2007 (in Persian)
59.
F. Ramezani and M. Abdollahi Azgomi,
"Modeling and Performance Evaluation of Flexible Manufacturing
Systems with Resource Sharing using Stochastic Petri Nets,"Proc. of the 5th International Industrial
Engineering Conference (IIEC'07), Iran University of Science and
Technology, Tehran, Iran, 11-12 July, 2007 (in Persian)
60.
H. Ghasemzadeh, E. Behrangi and M.
Abdollahi Azgomi, "An Algorithm for Routing and
Scheduling Automated Guided Vehicles in Mesh Systems," Proc. of the 15thIranian Electrical
Engineering Conference (ICEE'07), Computer Track, Iran Telecommunication
Research Center (ITRC), Tehran, May 15-17, 2007 (in Persian)
61.
S. Shirvani, S. Almassi and M.
Abdollahi Azgomi, "Modeling and Analysis of Digital
Library Preprocessing System Using Generalized Stochastic Petri Nets," Proc. of the 12th Annual
International CSI Computer Conference (CSICC'07), Tehran, Iran, Feb.20-22,,
2007, pp. 995-1002 (in Persian)
62.
M. Nasri and M. Abdollahi Azgomi,
"Designing Agents by Market Mechanism for e-Commerce Automation," Proc. of the 12th Annual International
CSI Computer Conference (CSICC'07), Tehran, Iran, Feb.20-22, , 2007,
pp. 2098-2102 (in Persian)
63.
A. Kamandi, M. Abdollahi Azgomi and
A. Movaghar, "A Tool for Modeling with Object
Stochastic Activity Networks," Proc. of the 9th Annual
International CSI Computer Conference (CSICC'04), Tehran, Iran, 2004, pp.
408-419 (in Persian)
64.
M. Abdollahi Azgomi and A.
Movaghar, "Performance Evaluation of Computer
and Communication Systems with SharifSAN," Proc. of the 6th Annual
International CSI Computer Conference (CSICC'01), Isfahan, Iran, 2001, pp.
133-143 (in Persian)
65.
M. Abdollahi Azgomi and A.
Movaghar, "A Tool for Verification of
Concurrent Systems Using Activity Networks," Proc. of 5th Annual
International CSI Computer Conference (CSICC'00), Tehran, Iran, 2000, pp.
305-314 (in Persian)
66.
A. Movaghar and M. Abdollahi Azgomi,
"An Overview on Some Design and Implemental Features of SharifSAN," Research Proc. of Sharif University of Technology:
Department of Computer Engineering, Tehran, Iran, 2000, pp. 65-72 (in
Persian)
67.
A. Movaghar and M. Abdollahi Azgomi,
"Introducing Various Solvers Used in SharifSAN," Research Proc. of Sharif University of Technology:
Department of Computer Engineering, Tehran, Iran, 1999, pp. 147-155 (in
Persian)
68.
A. Movaghar, K. Davoodi and M.
Abdollahi Azgomi, "Design and Implementation of a
Firewall in Computer Networks," Research Proc. of
Sharif University of Technology: Department of Computer Engineering,
Tehran, Iran, 1999, pp. 137-145 (in Persian)
69.
A. Movaghar, M. Abdollahi Azgomi and
K. Davoodi, "Solutions for Enhancing the Security
of Computer Networks," Research Proc. of
Sharif University of Technology: Department of Computer Engineering,
Tehran, Iran, 1998, pp. 179-191 (in Persian)
70.
M. Abdollahi Azgomi and A. Movaghar, "Security Enhancement for Network
Services," Proc. of the 3rd Annual
International CSI Computer Conference (CSICC'97), Tehran, Iran, 1997, pp.
450-457 (in Persian)
Last Updated: April 11,
2019