Mehrdad Ashtiani

Phd Candidate-Software Engineering-IUST

I am currently a Phd candidate in Iran University of Science and Technology-school of computer engineering. My active research interest is about providing computational models of trust.

My industrial interest mainly involves computer game development.Please feel free to contact me upon your need.

Picture

Education

Iran University of Science and Technology

Phd Candidate in Software Engineering, Computer Engineering Department,

Iran University of Science and Technology, Tehran, Iran

2011 - Now
(GPA: 19.91 on a 20 scale).

Supervisor: Dr Mohammad Abdollahi azgomi (http://webpages.iust.ac.ir/azgomi/)
Proposal Title: A Computational Model of Trust

 

Iran University of Science and Technology

M.S. in Software Engineering – Distributed Systems branch,
Computer Engineering Department, Iran University of Science and

Technology, Tehran, Iran

2009 - 2011

(GPA: 18.43 on a 20 scale)
Supervisor: Dr Mohammad Abdollahi azgomi (http://webpages.iust.ac.ir/azgomi/)
Seminar title: A survey on Distributed Interactive Simulations
Thesis title: A Distributed Cyber Attack Simulator based on HLA.

Iran University of Science and Technology

B.Sc. in Software Engineering, Computer Engineering Department,

Iran University of Science and Technology, Tehran, Iran

2005-2009

(GPA: 16.70 on a 20 scale)
Supervisor: Dr Mohammad Abdollahi azgomi (http://webpages.iust.ac.ir/azgomi/)
Thesis title: Design and implementation of a platformer game engine based
on XNA framework

 

Research Activities

DCAS

A Distributed Cyber Attack Simulator (pdel.iust.ac.ir/Projects/DCAS.html)

1 year project with ministry of Science and Research

We have developed a simulation framework for distributed cyber attack modelling based on high-level architecture (HLA), which is de facto standard for distributed interactive simulation (DIS). The proposed framework and the corresponding simulator, which is called distributed cyber attack simulator (DCAS), help administrators to model and evaluate the security measures of networks. We have developed a distributed cyber attack simulation engine based on Portico, which is an open source HLA run-time infrastructure.

Penetration testing and static code analysis

of Network Management infrastructure

 

1 year project with ITRC

In this project OpenNMS and YUMA were penetration tested and analyzed with static code analysis techniques.

Papers

[1] M. Ashtiani and M. Abdollahi Azgomi, "Cyber Attack Simulation for Operational Security Evaluation Using Coloured Petri Nets", International Journal of Information & Communication Technology Research, Vol 4, No.3,pp.45-58, June 2012.

 

 

[2] M. Ashtiani and M. Abdollahi Azgomi, "A multi-criteria decision making formulation of trust using fuzzy analytic hierarchy process," Cognition Technology and Work, Springer, Published Online: Oct. 14, 2014, In Press.

 

[3] M. Ashtiani and M. Abdollahi Azgomi, "Trust modeling based on a combination of fuzzy analytic hierarchy process and fuzzy VIKOR," Soft Computing, Springer, Published Online: Nov. 13, 2014, In Press.

 

[4] M. Ashtiani and M. Abdollahi Azgomi, "A survey of quantum-like approaches to decision making and cognition," Mathematical Social Sciences, Vol. 75, Elsevier, May 2015, pp. 49-80.

 

[5] M. Ashtiani and M. Abdollahi Azgomi, "A Formulation of Computational Trust Based on Quantum Decision Theory," Information Systems Frontiers, Springer, Published Online: April 30, 2015, In Press

 

[6] M. Ashtiani and M. Abdollahi Azgomi, "Contextuality, incompatibility and biased inference in a quantum-like formulation of computational trust," Advances in Complex Systems, Vol. 17, No. 5, World Scientific, Sept. 4, 2014, 1450020 (61 pages).

 

[7] M. Ashtiani and M. Abdollahi Azgomi, "A Distributed Simulation Framework for Modeling Cyber Attacks and the Evaluation of Security Measures," Simulation: Transactions of the Society for Modeling and Simulation International, Vol. 90, No. 9, SAGE, Sept. 03, 2014, pp. 1071-1102

 

[8] M. Ashtiani and M. Abdollahi Azgomi, "A computational model of trust based on a multi-criteria decision making approach," Proc. of the 2013 International Symposium on Computer Science and Software Engineering (CSSE'13), Sharif University of Technology, Tehran, Iran, Dec. 25–27, 2013, pp. 1-12.

 

[ 9] آشتیانی، مهرداد، و محمد عبداللهی ازگمی، 1390، چارچوب شبیه­سازی سطح بالای حملات سایبری به منظور ارزیابی دسترس پذیری،  هشتمین کنفرانس انجمن رمز ایران، مشهد، انجمن رمز ایران، دانشگاه فردوسی مشهد، http://www.civilica.com/Paper-ISCC08-ISCC08_003.html

[10]  مینایی بیدگلی، بهروز، صحاف نائینی، علیرضا، آقاجانی عماد و آشتیانی مهرداد، 1391، روشی نوین برای محاصره هدف توسط یک سیستم چندعاملی مبتنی بر رویداد در بازی­های رایانه­ای، بازدهمین کنفرانس سیستم­های هوشمند ایران، دانشگاه خوارزمی.

Books and Authorship

هوش مصنوعی بازی های کامپیوتری - ترجمه بابک نمازیان، مریم شیرمحمدی و مهرداد آشتیانی - انتشارات دنیای بازی

 

 

 

 

 

دانشنامه و فرهنگ واژگان بازی های رایانه ای - تالیف و گردآوری مهرداد آشتیانی - مژگان خزانه داری

 

 

 

 

 

 

کتاب پابلیشرها- مهرداد آشتیانی و مژگان خزانه داری- انتشارات بنیاد ملی بازی های رایانه ای

 

 

 

 

 

Skills

 

Workshops & Presentations

Teaching Experience

.

Awards

.

 

Memberships

.

 

This page is compatible with CSS3