Pure-Call Oriented Programming (PCOP): chaining the gadgets using call instructions AA Sadeghi, S Niksefat, M Rostamipour Journal of Computer Virology and Hacking Techniques 14, 139-156, 2018 | 49 | 2018 |
Network attack origin forensics with fuzzy logic M Rostamipour, B Sadeghiyan 2015 5th International Conference on Computer and Knowledge Engineering …, 2015 | 12 | 2015 |
A fuzzy Intrusion Detection System based on categorization of attacks A Varshovi, M Rostamipour, B Sadeghiyan 2014 6th Conference on Information and Knowledge Technology (IKT), 50-55, 2014 | 5 | 2014 |
An architecture for host-based intrusion detection systems using fuzzy logic M Rostamipour, B Sadeghiyan Journal of Network and Information Security 2 (2), 2014 | 2 | 2014 |
Confine: Fine-grained system call filtering for container attack surface reduction M Rostamipoor, S Ghavamnia, M Polychronakis Computers & Security 132, 103325, 2023 | 1 | 2023 |