درباره دکتر رسول جلیلی

شرح کامل رزومه

سوابق و تجربیات دکتر رسول جلیلی

رییس جمهور
پرتال شخصی دکتر رسول جلیلی

سوابق آموزشی، اجرایی، پژوهشی

رسول جلیلی در اقلید، از توابع استان فارس به دنیا آمده‌ است همچنین ایشان دوره لیسانس رشته علوم کامپیوتر را در دانشگاه فردوسی مشهد گذراندند. در سال ۱۳۶۶، رسول جلیلی در دوره کارشناسی ارشد علوم کامپیوتر دانشگاه صنعتی شریف پذیرفته شد. او برای ادامه تحصیل در رشته علوم کامپیوتر به دانشگاه سیدنی استرالیا رفت و در گرایش «سیستم‌های عامل توزیع شده»، موفق به دریافت مدرک دکترا گردید. رسول جلیلی از سال ۱۳۷۴ تا کنون در دانشگاه صنعتی شریف مشغول به تدریس و پژوهش است. وی از مهر ۱۳۸۸ تا مرداد ۱۳۸۹ در دانشگاه دیویس کالیفرنیا در ایالات متحده آمریکا نیز به عنوان استاد مدعو حضور داشته ‌است.

رسول جلیلی علاوه بر عضویت در شورای عالی فضای مجازی، سوابق دیگری چون معاون صنایع امور اقتصاد سازمان صنعت، معدن و تجارت آذربایجان غربی، عضو هیئت علمی دانشکده مهندسی کامپیوتر دانشگاه صنعتی شریف، عضو هیئت مؤسس و رئیس هیئت مدیره شرکت امن افزار گستر شریف و عضو گروه نرم‌افزار صنایع پیشرفته وزارت صنعت و معدن را در کارنامه دارد.

آخرین مدرک تحصیلی
دكتری در علوم كامپیوتر، دانشگاه سیدنی، استرالیا و فرصت مطالعاتی، در زمینه رایانش امن، دانشگاه کالیفرنیا، دیویس،‌ کالیفرنیا، امریکا
آخرین سمت
مدیر گروه فناوری اطلاعات دانشگاه صنعتی شریف و مدیر گروه نرم افزار در ستاد فناوری اطلاعات و ارتباطات، معاونت علمی و فناوری ریاست جمهوری
سوابق مدیریتی
عضو حقیقی شورای عالی فضای مجازی و موسس و دبیر سمن «جمعیت توسعه گران فضای مجازی پاک» دارای مجوز قطعی از وزارت کشور www.famp.ir
آموزش فضای مجازی پاک
  • شناسه در پیام رسان‌های ایرانی بله، سروش، گپ، ایتا:  @rjalili
  • شناسه در اسکوپوس (Scopous): ‫‪8662536200
  • شناسه پژوهشگری در آی اس آی (ISI): Y-4494-2019
  • شناسه اُرک (OrcID): https://orcid.org/0000-0002-9853-1955

پی‌داد‌نمایی (تایملاین) علمی رسول جلیی

پی داد نمایی دکتر جلیلی

سوابق شغلی دکتر رسول جلیلی

  • ۱۳۹۸ – تاکنون : مدیر گروه فناوری اطلاعات، دانشكده مهندسی كامپیوتر، دانشگاه صنعتی شریف
  • ۱۳۹۶ – تاکنون : راه اندازی و همکاری در اجرای گرایش ارشد «رایانش امن» در دانشکده مهندسی کامپیوتر، دانشگاه صنعتی شریف
  • ۱۳۹۶ – ۱۳۹۵ : عضو کمیته مشورتی فضای مجازی وزیر علوم، تحقیقات، و فناوری
  • ۱۳۹۶ – ۱۳۹۴ : مدیر گروه نرم افزار در ستاد فناوری اطلاعات و ارتباطات، معاونت علمی و فناوری ریاست جمهوری
  • ۱۳۹۴ – تاکنون : عضو شورای فناوری اطلاعات دانشگاه صنعتی شریف
  • ۱۳۹۳ – تاکنون : موسس و دبیر سمن «جمعیت توسعه گران فضای مجازی پاک» دارای مجوز قطعی از وزارت کشور www.famp.ir 
  • ۱۳۹۳ – تاکنون : عضو کمیته علمی، دبیر، و عضو کمیته اجرایی شش کنفرانس ملی «فضای مجازی پاک» www.famp.ir
  • ۱۳۹۳ – ۱۳۹۱ : رییس انجمن (علمی) رمز ایران
  • ۱۳۹۰ – تاکنون : عضو حقیقی شورای عالی فضای مجازی
  • ۱۳۹۲ – ۱۳۸۹ : مدیر کمیته برنامه‌ریزی فناوری اطلاعات، شورایعالی برنامه ریزی آموزش عالی، وزارت علوم، تحقیقات، و فناوری
  • ۱۳۸۶ – تاکنون : دانشیار دانشكده مهندسی كامپیوتر، دانشگاه صنعتی شریف
  • ۱۳۸۷ – ۱۳۸۸ : مدیر گروه فناوری اطلاعات، دانشكده مهندسی كامپیوتر، دانشگاه صنعتی شریف
  • ۱۳۸۶ – تاکنون : از موسسین، سردبیر، و عضو هیات تحریریه مجله بین المللی انجمن رمز ایران ( آیسکیور)، علمی-پژوهشی، نمایه شده در اسکوپوس و آی اس آی (ISI)، www.isecure-journal.org , www.isecure.ir
  • ۱۳۹۱ – ۱۳۸۹ : مدیر روابط بین الملل دانشگاه صنعتی شریف
  • ۱۳۸۹ – ۱۳۸۸ : فرصت مطالعاتی به عنوان پژوهشگر میهمان در دانشکده مهندسی برق و کامپیوتر دانشگاه کالیفرنیا – دیویس
  • ۱۳۷۴ – ۱۳۸۶ : استادیار دانشكدة مهندسی كامپیوتر، دانشگاه صنعتی شریف
  • ۱۳۸۶ – ۱۳۸۸ : عضو کمیته علمی پژوهشکده؛ مرکز تحقیقات مخابرات ایران.
  • ۱۳۸۶ – ۱۳۸۲ : مدیر کمیته نرم‌افزار مرکز صنایع نوین – وزارت صنایع و معادن
  • ۱۳۸۴ – تاکنون : عضو هیات تحریره مجله علمی پژوهشی برق و کامپیوتر- جهاد دانشگاهی ایران
  • ۱۳۸۳ – ۱۳۸۱ : مجری پروژه‌های مرتبط با تولید و عملیاتی نمودن مرکز کوته پیام “پیک آسا” (PeykAsa SMS Center)
  • ۱۳۸۳ – ۱۳۸۲ : مجری پروژه فتا (فرهنگ سازی و تربیت نیروی انسانی در زمینه افتا)؛ مرکز تحقیقات مخابرات ایران.
  • ۱۳۸۳ – ۱۳۸۳ : مجری پروژه “برنامه رهبردی افتا”؛ دبیرخانه شورای عالی افتا.
  • ۱۳۸۳ – ۱۳۸۳ : دبیر کنفرانس “نقد و بررسی برنامه رهبردی افتار”، دانشگاه صنعتی شریف.
  • ۱۳۸۴ – ۱۳۸۱ : عضو کمیته راهبردی گروه مدیریت و فنآوری افتا؛ مرکز تحقیقات مخابرات ایران.
  • ۱۳۸۲ – ۱۳۸۲ : دبیر کنفرانس علمی/حرفه‌ای “سیستم عامل و امنیت”، دانشگاه صنعتی شریف.
  • ۱۳۸۱ – تاکنون : موسس، کارآفرین، و عضو هیات مدیره شرکت‌های فناور حوزه فضای مجازی شامل پنج شرکت دانش بنیان، یک پژوهشکده، دو شرکت فعال در حوزه محتوی، و یک هلدینگ
  • ۱۳۷۶ – ۱۳۷۶ : دبیر چهارمین کنفرانس انجمن کامپیوتر ایران؛ دانشگاه صنعتی شریف.
  • ۱۳۷۹ – ۱۳۷۵ : معاون پژوهشی دانشكدة مهندسی كامپیوتر، دانشگاه صنعتی شریف.
  • ۱۳۷۵ – ۱۳۷۴ : مشاور در پروژة عملیات بین شبكه‌‌ای در بخش نرم‌‌افزار شركت داده‌‌پردازی ایران
  • ۱۳۷۳ – ۱۳۷۳ : مدیر شبكه در سطح دانشكده، دانشگاه سیدنی استرالیا
  • ۱۳۶۹ – ۱۳۶۶ : كارشناس تحقیقاتی شركت داده‌‌پردازی ایران
  • ۱۳۶۴ – ۱۳۶۲ : فعال فرهنگی – اجتماعی در دوران دانشجویی کارشناسی
  • ۱۳۶۱ – ۱۳۵۹ : فعال فرهنگی – اجتماعی در سطح شهرستان

افتخارات

  • نه سال عضویت در شورایعالی فضای مجازی (تاکنون) و حضور در عرصه سیاست گزاری سطح عالی کشور در حوزه بسیار مهم و تخصصی فضای مجازی.
  • حضور بیش از دو دهه در عرصه‌های «آموزش و پژوهش دانشگاهی»، «تربیت نیروی انسانی نخبه»، «صنعت دانش بنیان»، و «کمیته‌های راهبردی و کارشناسی پنج دولت گذشته».
  • تاسیس و راهبری پنج شرکت دانش بنیان خصوصی در راستای توسعه فناوری‌های بومی فضای مجازی با پوشش جمعیت کارشناسی حدود ۶۵۰ نفر.
  • تاسیس و راهبری یک پژوهشکده خصوصی فضای مجازی با حدود چهل نفر پژوهشگر دکتری و ارشد، دارنده مجوز قطعی از وزارت علوم، تحقیقات و فناوری.
  • راه اندازی و انتشار سیزده ساله (تا کنون) مجله بین المللی انجمن رمز ایران (ISeCure) و نمایه شده در پایگاه ISI و اسکوپوس به زبان انگلیسی.
  • فارغ التحصیل برتر کارشناسی ارشد رشته مهندسی کامپیوتر دانشگاه صنعتی شریف در سال ۱۳۶۹.
  • فارغ التحصیل برتر کارشناسی علوم کامپیوتر دانشگاه فردوسی مشهد در سال ۱۳۶۵.
  • استاد راهنمای ۱۵ دانش آموخته و دانشجوی دکتری و همچنین ۸۰ دانش آموخته و دانشجوی ارشد.
  • انتشار بیش از ۲۰۰ مقاله علمی در نشریات و کنفرانس‌های بین‌المللی و ملی

مقالات علمی پژوهشی

[32]   Sadeghzadeh, A.M., Dehghan, F., AM Sobhanian, A.M., Jalili, R. “Hardness of Samples Is All You Need: Protecting Deep Learning Models Using Hardness of Samples”, arXiv preprint arXiv:2106.11424, 2021.

[31]   Sadeghzadeh, A.M., Tajali, B.,  Jalili, R. “AWA: Adversarial Website Adaptation”, IEEE Transactions on Information Forensics and Security 16, 3109-3122, 2021.

[30]   Sadeghzadeh, A.M., Tajali, B.,  Jalili, R. “Adversarial Network Traffic: Towards Evaluating the Robustness of Deep-Learning-Based Network Traffic Classification” , IEEE Transactions on Network and Service Management 18 (2), 1962-1976, 2021

[29]   Noferesti, M. and Jalili, R. “ACoPE: An Adaptive Semi-Supervised Learning Approach for Complex-Policy Enforcement in High-Bandwidth Networks”, Computer Networks, October 2019.

[28]   Noferesti, M. and Jalili, R. “Inline High-Bandwidth Network Analysis Using A Robust Stream Clustering Algorithm”, IET Information Security, Vol 13, No. 5, March 2019.

[27]   Gharehchamani; J., Dousti; M.S., Jalili, R. and Papadopoulos, D. “SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing”, ISeCure, Vol. 11, No. 1, 2019.

[26]   Dorri Nogoorani, S. and Jalili, R. “TIRIAC: A trust-driven risk-aware access control framework for Grid environments”, in Future Generation Computer Systems, Vol.  55, pp 238-254, January 2016.

[25]   Dorri Nogoorani, S. and Jalili, R. “Uncertainty in Trust: A Risk-Aware Approach”, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems (IJUFKS), 2016

[24]   Dousti, M.S. and Jalili, R., “FORSAKES: A Forward-Secure Authenticated Key Exchange Protocol Based on Symmetric Key-Evolving Schemes,” Advances in Mathematics of Communications, Volume 9, No. 4, pp. 471–514, 2015

[23]   Hadavi, M.A., Jalili, R., Karimi, L. “Access control aware data retrieval for secret sharing based database outsourcing”, Distributed and Parallel Databases, pp 1-30, Published Online 2015.

[22]   Boorghany, A., Sarmadi, S.B., and R. Jalili, R. “On constrained implementation of lattice-based cryptographic primitives and schemes on smart cards”, ACM Transactions in Embedded Computing Systems – TECS, Vol. 14, No. 3, pp 42-67, 2015.

[21]   M. Niknafs, S.D. Nogoorani, R. Jalili, “A Collusion Mitigation Scheme for Reputation Systems”, ISeCure, The ISC International Journal of Information Security, Vol. 7, No. 2, 2015.

[20]   Asayesh, A., Hadavi, M.A., and Jalili, R.,”(t, k)‐Hypergraph anonymization: an approach for secure data publishing”, Security and Communication Networks, Vol. 8, No. 7, P.P. 1306-1317, 10 May 2015.

[19]   Dousti, M.S. and Jalili, R., “An efficient statistical zero-knowledge authentication protocol for smart cards”, International Journal of Computer Mathematics, Vol. 93, No. 3, pp 1-30,  March 2015.

[18]   Hadavi, M.A., Jalili, R., Damiani, E. and Cimato, S. “Security and Searchability in Secret Sharing-based Data Outsourcing”, International Journal of Information Security, Vol. 14, No. 6, pp 513-529, November 2015.

[17]   Noferesti, M., Ghasemi, S., Hadavi, M.A, and Jalili, R. “A Trust-Based Approach for Correctness verification of Query Results in Data Outsourcing”, Journal of Computing and Security (JCS), Vol. 1, No. 1, pp 3-14, 2014.

[16]   Mahrooghi, H.R.  and  Jalili, R. “An Algebraic Theory of Epistemic Processes”, Journal of Universal Computer Science (JUCS), Vol 19, No. 10, pp 1396-1432, 2013.

[15]   Amini, M., Jalili, R., and Mousa Amir Ehsan, and Fathyieh Faghih, “Cooperative Security Administration in Multi-Domain Environments Using a Variant of Deontic Logic”, Scientia Iranica, Transaction on Computer Science & Engineering and Electrical Engineering, Vol. 19, No 3, pp 635-653, June 2012.

[14]   Soltani, S., Hadavi, M.A. and Jalili, R. “Separating Indexes from Data: A Distributed Scheme for Secure Database Outsourcing”, ISeCure, The ISC International Journal of Information Security, Vol. 3, No.2. pp 121-133, 2011.

[13]   Amini, M. and Jalili, R., “A Multi-Level Authorization Model and Framework for Distributed Semantic-Aware Environments”, IET Information Security, Special Issue on Multi-Agent and Distributed Information Security, Vol. 4, No 4, pp. 301-321, Dec. 2010.

[12]   Norolahi-Ravari, A., Jafarian,J.H., Amini, M. and Jalili, R. “GTHBAC: A Generalized Temporal History Based Access Control Model”, Telecommunication Systems Journal, Vol. 45, No. 2, pp 111-125, 2010.

[11]   Shahriari, H.R., Makarem, M.S., Sirjani, M., Jalili, R.,  and Movaghar, A. “Vulnerability Analysis of Networks to Detect Multiphase Attack Using the Actor-based Language Rebeca”, Elsevier Computers & Electrical Engineering journal,  Vol. 36, No. 5, pp. 874-885, 2010.

[10]   Mohammadi-Nodooshan, A., Darmani, Y., Jalili, R. , Nourani, M. and Sayad Haghighi, M. ” A Robust and Efficient SIP Authentication Scheme”, Scientia Iranica Scientia Transactions on Computer Science and Engineering, Vol. 17, No. 1, pp 551-558, January 2009.

[9]     Niamanesh, M. and Jalili, R. “A Framework for Automatic Reconfigurations of Protocol Stacks in Ubiquitous Computing Systems”, Ubiquitous Computing and Communication Journal, Vol. 4, No. 3, pp 758-769, 2009.

[8]     Niamanesh, M. and Jalili, R. “A Solution for Backward-Compatible Reconfigurations of Running Protocol Components in Protocol Stacks”, Ubiquitous Computing and Communication Journal, Vol. 4, No. 3, pp. 784-793, 2009.

[7]     Niamanesh, M. and Jalili, R. “DRAPS: A Framework for Dynamic Reconfigurable Protocol Stacks”, Journal of Information Science and Engineering (JISE), Vol. 25, pp 827-841, May 2009.

[6]     Asadpour, M. and Jalili, R. “Double Voting Problem of some Anonymous E-Voting Schemes”, Journal of Information Science and Engineering (JISE), Vol. 25, pp 895-906, 2009

[5]     Shahriari, H.R. Ganji-Saffar, Y., Jalili, R., Habibi, J. “Topological Analysis of Multi-phase Attacks using Expert Systems”, Journal of Information Science and Engineering (JISE), Vol. 24, No. 3; pp 743-767. May 2008.

[4]     Shahriari, H.R. and Jalili, R. “Vulnerability Take Grant (VTG): An Efficient Approach to Analyze Network Vulnerabilities”, Elsevier Computers and Security Journal, Vol. 26, No. 5, pp 349-360, 2007.

[3]     Yusefi, A., Jalili, R. and Niamanesh, M. “Multi-Determiner Protection of Private Data in Pervasive Computing Environments”, IJCSNS International Journal of Computer Science and Network Security, Vol. 16, No. 12, pp 239-249, Dec. 2006.

[2]     Rafiei, M.E., Jalili, R. and Moosavi, H. “Vulnerability Analysis trough a Graph-based Protection System”, IJCSNS International Journal of Computer Science and Network Security, , Vol. 16, No. 12, pp 311-319, Dec. 2006.

[1]     Amini, M., Jalili, R., and Shahriari, H.R. “RT-UNNID: A Practical Solution to Real-Time Network-Based Intrusion Detection Using Unsupervised Neural Networks”, Elsevier Computers and Security Journal, Vol. 25, No. 6, pp 459-468, Sept. 2006.

 

Refereed Conferences:

[171] Gharahchamani, J., Papadopoulos, D., Papamanthou, C., Jalili, R. “New Constructions for Forward and Backward Private Symmetric Searchable Encryption”, ACM SIGSAC Conference, 2018

[170] Karimi, L., Javadi, S.A., Hadavi, M.A., and Jalili, R. “Missing a Trusted Reference Monitor: How to Enforce Confidential and Dynamic Access Policies?” Computer Networks and Distributed Systems, 2014.

[169] A. Boorghany, S.B. Sarmadi, P. Yousefi, P. Gorji, R. Jalili, “Random data and key generation evaluation of some commercial tokens and smart cards”, Information Security and Cryptology (ISCISC), 3-4 Sept. 2014.

[168] M. Soltani, S. Najafi, R. Jalili, “Mid-defense: Mitigating protocol-level attacks in TOR using indistinguishability obfuscation”, Information Security and Cryptology (ISCISC), 3-4 Sept. 2014.

[167] E. Mohammadian, M. Noferesti, R. Jalili, “FAST: Fast Anonymization of Big Data Streams”, Big Data Science and Computing, 2014.

[166] A. Najafi, A. Sepahi, R. Jalili, “Web driven alert verification”, Information Security and Cryptology (ISCISC), 3-4 Sept. 2014.

 

[165] V. Khodabakhshi, M. Soltani, R. Jalili, M. Rezvani, “Chaos-based selective key (CSK) Cryptosystem: A new direction to secure VPN”, Information Security and Cryptology (ISCISC), Aug. 2013.

[164] S.A. Mirheidari, S. Arshad, S. Khoshkdahan, R. Jalili, “A Comprehensive Approach to Abusing Locality in Shared Web Hosting Servers”, Trust, Security and Privacy in Computing and Communications, 16-18 July 2013.

[163] S.A. Mirheidari, S. Arshad, R. Jalili, “Alert Correlation Algorithms: A Survey and Taxonomy”, Cyberspace Safety and Security, 2013.

[162] Y. Sobhdel, R. Jalili, “A UC-Secure Authenticated Contributory Group Key Exchange Protocol Based on Discrete Logarithm”, Information Systems Security, ICISS 2013: pp 390-401, 2013.

[161] A.T. Haghighat, M.A. Kargar, M.S. Dousti, R. Jalili, “Minimal assumptions to achieve privacy in e-voting protocols”, Information Security and Cryptology (ISCISC), pp 1-5, Aug. 2013.

[160] Toroghi Haghighat, A., Dousti, M.S., Jalili, R.” An Efficient and Provably-Secure Coercion-Resistant E-Voting Protocol”, The PST2013 International Conference on Privacy, Security and Trust (PST), pp 161-168, 2013

[159] Karimi, L.,  Javadi, S.A. , Hadavi, M.A., Jalili, R. “Selective-Encryption based Access Control for Data Outsourcing“, Symposium on Computer Networks and Distributed Systems (CNDS 2013), 2013.

[158] Y. Sobhdel; Jalili, R.” A UC-Secure Authenticated Contributory Group Key Exchange Protocol Based on Discrete Logarithm”, 9th International Conference on Information Systems Security (ICISS 2013), Lecture Notes in Computer Science Volume 8303, pp 390-401, India, 2013

 

[157] Emamdoost, N., Dousti, M. S., & Jalili, R. “Statistical Disclosure: Improved, Extended, and Resisted”, In proceedings of SECURWARE 2012, The Sixth International Conference on Emerging Security Information, Systems and Technologies, pp 119-125, 2012.

[156] Taheri Soodejani, A., Hadavi, M.A., Jalili, R. “k-Anonymity-based Horizontal Fragmentation to Preserve Privacy in Data Outsourcing”, In Proceedings of The 26th Annual WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2012)”, pp 263-273, 2012.

[155] Hadavi, M.A., Ernesto Damiani, E., Jalili, R., Cimato, S., and Ganjei, Z. “AS5: A Secure Searchable Secret Sharing Scheme for Privacy Preserving Database Outsourcing”, In Proceedings of the 5th SETOP International Workshop on Autonomous and Spontaneous Security (SETOP 2012), pp 201-216, 2012

[154] Simin Ghasemi, Morteza Noferesti, Mohammad Ali Hadavi, Sadegh Dorri Nogoorani and Rasool Jalili, “Correctness Verification in Database Outsourcing: A Trust Based Fake Tuples Approach”, 8th International Conference on Information Systems Security (ICISS2012), pp343-251, 2012.

[153] Najmeh S. MirAmirKhani, Rasool Jalili, “Formalization of Blind Signature using the Inductive Method. 5th International Information Security and Cryptology Conference – ISCTURKEY 2012, pp 148-154, 2012

[152] Mohammad Ali Hadavi, Morteza Noferesti, Rasool Jalili, Ernesto Damiani, “Database as a Service: Towards a Unified Solution for Security Requirements”, In Proceedings if the 4th IEEE International Workshop on Security Aspects in Processes and Services Engineering (SAPSE 2012) under COMPSAC 2012

[151] Sadegh Dorri Nogoorani, Rasool Jalili, “Uncertainty in Probabilistic Trust Models”, 26th IEEE International Conference on Advanced Information Networking and Applications (AINA), 2012

[150] Dorri Nogoorani, S. ; Hadavi, M.A. ; Jalili, R.Measuring software security using SAN models”, 9th International ISC Conference on Information Security and Cryptography (ISCISC2012), pp 80-86, 2012

 [149] Javadi, S.A., Amini, M. and Jalili, R. “Non-monotonocity in OrBAC Through Default and Exception Policy Rules”, In Proceedings of the 9th International ISC Conference on Information Security and Cryptology, pp. 87-94, 2012, Tabriz, Iran.

[148] Alizadeh, M., Javadi, S.A., Amini, M. and Jalili, R. “Policy Specification and Enforcement in Online Social Networks Using MKNF+”, In Proceedings of the 9th International ISC Conference on Information Security and Cryptology, pp. 48-53, 2012, Tabriz, Iran.

[147] Arasteh, M., Amini, M. and Jalili, R. “A Trust and Reputation-based Access Control Model for Virtual Organizations”, In Proceedings of the 9th International ISC Conference on Information Security and Cryptology (ISCISC2012), pp. 121-127, 2012, Tabriz, Iran.

[146] N.S. Miramirkhani, R. Jalili, M. Yarmohamadi, “FOO e-voting protocol: Inductive analysis of the eligibility property”, Information Security and Cryptology (ISCISC), 13-14 Sept. 2012.

[145] S. A. Mirheidari, S. Arshad, S. Khoshkdahan, R. Jalili, “Two novel server-side attacks against log file in Shared Web Hosting servers”, Internet Technology And Secured Transactions, 10-12 Dec, 2012.

 

[144] P. Tourani, M.A. Hadavi, R. Jalili, “Access control enforcement on outsourced data ensuring privacy of access control policies”, High Performance Computing and Simulation (HPCS), 4-8 July, 2011

[143] M.H. Haghighat, H.R. Mahrooghi, R. Jalili, “Automatic checking of eligibility in electronic voting protocolsusing mCRL2”, Computer Science and Software Engineering (CSSE), 15-16 June 2011

[142] Noferesti, M., Hadavi, M.A., and Jalili, R. “A Signature-Based Approach of Correctness Assurance in Data Outsourcing Scenarios”, In Proceedings if the Seventh International Conference on Information Systems Security-LNCS Published (ICISS 2011), India, 2011

[141] Amirkhani, N., Mahrooghi, H.R., Jalili, R. “Analysis of an E-voting Protocol using the Inductive Method”, In Proceedings of the Fundamentals of Software Engineering (FSEN-2011), Tehran, 2011.

[140]  مهدی اسحاقی  ورسول جلیلی ” ارزیابی ویژگی بی رسیدی در برخی پروتکل های رای گیری الکترونیکی اینترنتی”، نهمین کنفرانس انجمن رمز ایران، مشهد، 1391

[139]  مریم کریمی ورسول جلیلی ” روشی کارآ و امن جهت پرس و جوی بازه ای روی داده رمز شده XML”، هشتمین کنفرانس انجمن رمز ایران، تهران، 1390

[138]  بنیامین تختایی، حمید رضا محروقی، رسول جلیلی ” تحلیل صوری وارسی پذیری میکس نت با استفاده از حساب پی کاربردی”، هشتمین کنفرانس انجمن رمز ایران، تهران، 1390

[137]  نجمه میرامیرخانی ، حمیدرضا محروقی، رسول جلیلی، ” ارایه ی مدل صوری طرح امضای کور با استفاده از روش استقرایی”، هشتمین کنفرانس انجمن رمز ایران، تهران، 1390

 

[136] Faghih, F., Amini, M. and Jalili, R. “Specification of History Based Constraints for Access Control in Conceptual Level”, In Proceedings of the 6th International Conference on Information Systems Security (ICISS10), Lecture Notes in Computer Science (LNCS), Vol. 6503, pp. 186-200, 2010, Gandhinaga, India.

[135] Sobhdel, Y., Dousti, M.S., Jalili, R. “Universally Composable Priced Oblivious Transfer”, In Proceedings of the 7th International ISC Conference on Information Security and Cryptography -ISCISC2010, Yazd, 2010.

[134] Toorani, P, Hadavi, M.A., Jalili, R. “A Secure Solution for Access Control Management on Outsourced Data”, In Proceedings of the 7th International ISC Conference on Information Security and Cryptography -ISCISC2010, Yazd, pp 85-92, 2010.

[133] Amoli, A.S., Kharrazi, S.M., Jalili, R. “2PLoc: Preserving Privacy in Location-Based Services”, In Proceedings of the The Second IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT2010), USA, 2010.

[132] Toorani, P, Hadavi, M.A., Jalili, R. “ACCESS CONTROL ENFORCEMENT ON OUTSOURCED DATA ENSURING PRIVACY OF ACCESS CONTROL POLICIES”, In Proceedings of the 5th International Workshop on Data Privacy Management (DPM-2010), Greece, pp 85-92, 2010.

[131] Hadavi, M.A. and Jalili, R. “Secure Data Outsourcing Based on Threshold Secret Sharing; Towards a More Practical Solution”, In Proceedings of The 36th Conference on Very Large Databases (VLDB2010), Singapore, 2010.

[130] Mahrooghi, H.R., Haghighat, M.H., and Jalili, R. “Formal Verification of Authentication-Type Properties of an Electronic Voting Protocol Using mCRL2”, In Proceedings of The Fourth International Workshop on Verification and Evaluation of Computer and Communication Systems (VECoS 2010), France, 2010.

[129]  نوید امام دوست، محمد صادق دوستی،و رسول جلیلی، “بهبود حمله افشای آماری در پروتکل های گمنامی”، هفتمین کنفرانس انجمن رمز ایران، یزد، 1389

[128] Faghih, F., Amini, M. and Jalili, R. “A Temporal Description Logic Based Access Control Model for Expressing History Constrained Policies in Semantic Web Environments”, In Proceedings of the IEEE Workshop on Policies for Distributed Systems and Networks, 2009, London, UK.

[127] Ehsan A.M.,  Amini, M. and Jalili, R. “Handling Context in a Semantic-based Access Control Framework”, In Proceedings of the 5th International Symposium on Frontiers of Information Systems and Network Applications (FINA09) to be held with the IEEE 23rd International Conference on Advanced Information Networking and Applications(AINA’09), 2009, Bradford, UK.

[126] Sedighian, A. and Jalili, R. “AFMAP: Anonymous Forward-Secure Mutual Authentication Protocols for RFID Systems”, In Proceedings of the 3rd International Conference on Emerging Security Information, Systems and Technologies (SecureWare 2009), Greece, 2009.

[125] Ehsan A.M.,  Amini, M. and Jalili, R. “A Semantic-based Access Control Mechanism Using Semantic Technologies”, Proceedings of the 2nd International Conference on Security of Information and Networks (SIN 2009), 2009, Gazimagusa, North Cyprus.

[124] AmirHaeri, M. and Jalili, R. “RTEAS: A Real-Time Algorithm for Extracting Attack Scenarios from Intrusion Alert Stream”, In Proceedings of the 6th ISC International Conference on Information Security and Cryptology (ISCISC 2009), Isfahan, pp 39-46, 2009.

[123] Asgharian, A., Amini, M., and Jalili, R. “An Efficient DC-Net Based Anonymous Message Transmission Protocol”, In Proceedings of the 6th ISC International Conference on Information Security and Cryptology (ISCISC 2009), Isfahan, pp 23-30, 2009.

[122] Dousti, M.S., AmirHaeri, M., and Jalili, R. “Privacy-Preserving Single Layer Perceptron”, In Proceedings of the 6th ISC International Conference on Information Security and Cryptology (ISCISC 2009), Isfahan, pp 31-38, 2009.

[121] Karimi, M., Hadavi, M.A., and Jalili, R. “A Secure Range Query Enabled Approach for Encrypted XML Documents”, In Proceedings of the 6th ISC International Conference on Information Security and Cryptology (ISCISC 2009), Isfahan, pp 13-22, 2009.

 

[120] ShirAliNia, A. and Jalili, R. “The Data Affecting Model for Detecting Source Code Security Vulnerabilities”, Proceedings of the 5th ISC International Conference on Information Security and Cryptology (ISCISC 2008), Tehran, 2008.

[119] Ehsan, A.M., Amini, M. and Jalili, R. “Using Semantic Annotation for Designing Security Mechanisms based on MA(DL)2”, Proceedings of the 5th ISC International Conference on Information Security and Cryptology (ISCISC 2008), Tehran, 2008.

[118] Mansoori, F. and Jalili, R. “A Method for Query Processing On Encrypted String Data”, Proceedings of the 5th ISC International Conference on Information Security and Cryptology (ISCISC 2008), Tehran, 2008.

[117] Asl-Asgharian, A., Amini, M. and Jalili, R. “Access Control in Updating XML Documents Using Static Analysis”, Proceedings of the 5th ISC International Conference on Information Security and Cryptology (ISCISC 2008), Tehran, 2008.

[116] Asl-Asgharian, A., Amini, M. and Jalili, R. “Access Control in Updating XML Documents Using Static Analysis”, Proceedings of the 5th ISC International Conference on Information Security and Cryptology (ISCISC 2008), Tehran, 2008.

[115] Jafarian, J.H., Amini, M. and Jalili, R. “A Context Sensitive Information Flow Model”, Proceedings of the 5th ISC International Conference on Information Security and Cryptology (ISCISC 2008), Tehran, 2008.

[114] Noorollahi, A., Amini, M. and Jalili, R. “Using Logical Time and Semantics in A History Based Access Control Model”, Proceedings of the 5th ISC International Conference on Information Security and Cryptology (ISCISC 2008), Tehran, 2008.

[113] Bahreyni, P., AmirHaeri, M., and Jalili, R. “A Probabilistic Approach to Intrusion Alert Correlation”, Proceedings of the 5th ISC International Conference on Information Security and Cryptology (ISCISC 2008), Tehran, 2008.

[112] Jafarian, J.H., Amini, M. and Jalili, R. “Context-Aware Mandatory Access Control Model for Multilevel Security Environments”, Proceedings of the 27th International Conference on Computer Safety, Reliability and Security SAFECOMP2008, UK, 2008.

[111]  IranManesh, Z., Amini, M. and Jalili, R. “A Logic for Multi-Domain Authorization Considering Administrators”, Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY-2008), USA, 2008.

[110] Noorollahi, A., Amini, M. and Jalili, R. “A Semantic Aware Access Control Model with Real Time Constraints on History of Accesses”, Proceedings of the International Multiconference on Computer Science and Information Technology –(IMCSIT-2008), Poland, 2008.

[109] Amini, M. and Jalili, R. “A Calculus for Composite Authorities’ Policy Derivation in Shared Domains of Pervasive Computing Environments”, Proceedings of the IEEE International Workshop on Internet and Distributed Computing Systems (IDCS 2008), Bangeladesh, 2008.

[108] Noorollahi, A., Jafarian, J.H , Amini, M. and Jalili, R. “A History Based Semantic Aware Access Control Model Using Logical Time Approach”, Proceedings of the IEEE International Workshop on Internet and Distributed Computing Systems (IDCS 2008), Bangeladesh, 2008.

[107] Sadighian, A.R.  and Jalili, R. “FLMAP: A Fast Lightweight Mutual Authentication Protocol for RFID System”, Proceedings of the 16th IEEE International Conference on Networks (ICON 2008), India, 2008.

[106] Taherian, M. Jalili, R. and Amini, M. “Trust  Inference in Web-Based Social Networks using Resistive Networks”, Proceedings of the The Third International Conference on Internet and Web Applications and Services (ICIW-2008), Greece, 2008.

[105] Jafarian, J.H., Amini, M. and Jalili, R. “Protecting Location Privacy through a Graph-based Location Representation and a Robust Obfuscation Technique”, Proceedings of the The 11th International Conference on Information Security and Cryptology- ICISC 2008, Korea, 2008.

[104] Niamanesh, M. and Jalili, R. “A Formalism for Reconfigurability Analysis in Distributed Non- Blocking Components”, Proceedings of the 28th International Conference on Distributed Computing Systems (ICDCS-08), China, 2008.

[103] IranManesh, Z., Amini, M. and Jalili, R. “A Logic for Inclusion of Administrative Domains and Administrators in Multi-Domain Authorization”, Proceedings of the International Conference on Global e-Security, ICGeS-08, UK, 2008.

[102] Abasi-Moghadam, S., Shah-Karami, A. and Jalili, R.“Mapping of Access Control Models in XML-Based DataBases Using Anthology Based Mapping in Semantic Web”, Proceedings of the 13th CSI National Computer Conference (CSICC2008), Kish Island, IRAN, 2008.

[101] Saremi, F., Mashayekhi, H., Jalili, R., and Movaghar, A. “CEBAC: A Decentralized Cooperation Enforcement Based Access Control Framework in MANETs”, Proceedings of the 13th CSI International Computer Conference (CSICC2008), Kish Island, IRAN, 2008.

[100] Mohammadi-Nodooshan, A. Darmani, Y. Jalili, R. and Nourani, M. “A Robust and Efficient SIP Authentication Scheme”, Proceedings of the 13th CSI International Computer Conference (CSICC2008), Kish Island, IRAN, 2008.

[99]   Mohammadi-Nodooshan, A. Darmani, Y. Jalili, R. and Nourani, M. “A Robust and Efficient SIP Authentication Scheme”, Proceedings of the 13th CSI International Computer Conference (CSICC2008), Kish Island, IRAN, 2008.

[98]   Noorollahi, A., Amini, M. and Jalili, R. “A Temporal Semantic-based Access Control Model”, Proceedings of the 13th CSI International Computer Conference (CSICC2008), Kish Island, IRAN, 2008.

[97]   Jafarian, J.H., Amini, M. and Jalili, R. “CAMAC: A Context-Aware Mandatory Access Control Model”, Proceedings of the 13th CSI International Computer Conference (CSICC2008), Kish Island, IRAN, 2008.

[96]   Taherian, M. Jalili, R. and Amini, M. “A Semantic-Aware Ontology-Based Trust Model for Pervasive Computing Environments”, Proceedings of the International Conference on Autonomic and Trusted Computing (ATC-08) (LNCS  5060), Netherland, 2008.

[95]   Hemmati, H. and Jalili, R. “Self-Reconfiguration in Highly Available Pervasive Computing Systems”, Proceedings of the International Conference on Autonomic and Trusted  Computing (ATC-08) (LNCS  5060), Netherland, 2008.

[94]   Taherian, M. Jalili, R., Abolhassani, H. and Amini, M. “PTO: A Trust Ontology for Pervasive Environments”, Proceedings of the IEEE AINA-2008 International Conference, Japan, 2008.

[93]   Taherian, M. and Jalili, R. “An Anthology-based and Sematic-Aware Trust Model for Pervasive Computing Environments”, Proceedings of the Forth Iranian Society of Cryptography Conference (ISCC2007), IRAN, 2007.

[92]   Golyaei, S. and Jalili, R. “A Certificate Based Client Based Access Control Model and its Associating Policy Description Language”, Proceedings of the Forth Iranian Society of Cryptography Conference (ISCC2007), IRAN, 2007.

[91]   Amini, M. and Jalili, R. “Specification and Inference of Access Policies and Obligations Based on The Deontic Logics in Semantic-Aware Environments”, Proceedings of the Forth Iranian Society of Cryptography Conference (ISCC2007), IRAN, 2007 (The Best Paper Award).

[90]   Takabi, H, Amini, M. and Jalili, R. “Enhancing Role-Based Access Control Model through Fuzzy Relations”, Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007 (Published by IEEE), UK, 2007.

[89]   Takabi, H, Amini, M. and Jalili, R. “Separation of Duty in Role-Based Access Control Model through Fuzzy Relations”, Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007 (Published by IEEE), UK, 2007.

[88]   Niamanesh, M. and Jalili, R. “A Dynamic-Reconfigurable Architecture for Protocol Stacks of Networked Systems”, Proceedings of the 31st IEEE Computers, Software, and Applications Conference (COMPSAC 2007), China, 2007.

[87]   Niamanesh, M. Sabet-Ghadam, S., Yusefzadeh, R. and Jalili, R. “Design and Implementation of a Dynamic Reconfigurable Architecture for Protocol Stack”, Proceedings of the IPM International Workshop on Foundations of Software Engineering (FSEN 2007.) (LNCS 4767), Tehran, IRAN, 2007.

[86]   Niamanesh, M. and Jalili, R. “Formalizing Assured Dynamic Reconfiguration in Protocols”, Proceedings of the IPM International Workshop on Foundations of Software Engineering (FSEN 2007.) (LNCS 4767), Tehran, IRAN, 2007.

[85]   Rafiei, M. E. Taherian, M., Moosavi, H., Movaghar, A. and Jalili, R. “Vulnerability Analysis in VGBPS using Prolog”, Proceedings of the IPM International Workshop on Foundations of Software Engineering (FSEN 2007.) (LNCS 4767), Tehran, IRAN, 2007.

[84]   Shahriari, H.R. and Jalili, R. “Formal Definition and Categorization of Vulnerabilities using Take-Grant Protection Model”, Proceedings of the 12th CSI International Computer Conference (CSICC2007), Tehran, IRAN, 2007.

[83]   Hafez-Ghorani, S., SAdeghian, B., Jalili, R., and Tarameshloo, E. “A method for Implementation of ARBAC97 in Relational DBMSs”, Proceedings of the 12th CSI International Computer Conference (CSICC2007), Tehran, IRAN, 2007.

[82]   Jalaei, R., Shahriari, H.R., and Jalili, R. “Analysis of Combinational Attacks to Networks Using Attack Graphs”, Proceedings of the 12th CSI International Computer Conference (CSICC2007), Tehran, IRAN, 2007.

[81]   Yusefi, A., Jalili, R., and Niamanesh, M. “A Multi-Determiner Privacy Protection System for Pervasive Computing Environments”, Proceedings of the 12th CSI International Computer Conference (CSICC2007), Tehran, IRAN, 2007.

[80]   Mokhtarian, K., Jalili, R., and Shahriari, H.R. “Quantitative Evaluation of Network Security Using Fuzzy Privilege Graph”, Proceedings of the 12th CSI International Computer Conference (CSICC2007), Tehran, IRAN, 2007.

[79]   Gerani, Sh. Shahriari, H.R., Saberi, M. and Jalili, R. “Modelling and Analysis of Firewall Vulnerabilities Using VTG”, Proceedings of the 12th CSI International Computer Conference (CSICC2007), Tehran, IRAN, 2007.

[78]   Rafiei, M. E. and Jalili, R. “Decidability of the Safety Problem in the VGBPS Protection System”, Proceedings of the 12th CSI International Computer Conference (CSICC2007), Tehran, IRAN, 2007.

[77]   Takabi, H, Amini, M. and Jalili, R. “Trust-Based User-Role Assignment in Role-Based Access Control”, Proceedings of The 2007 ACS/IEEE International Conference on Computer Systems and Applications (AICCSA ‘2007), Jordan, 2007.

[76]   Masoum-Zadeh, A., Amini, M. and Jalili, R. “Conflict Detection and Resolution in Context-Aware Authorization”, Proceedings of the The IEEE 21st International Conference on Advanced Information Networking and Applications (AINA-2007), Canada, 2007.

[75]   SattarZadeh, B., AsadPour, M. and Jalili, R. “Enhanced Smart-Card-Based Authentication Scheme Providing Forward-Secure Key Agreement”, Proceedings of the International Conference on New Technologies, Mobility and Security (NTMS’2007), France, 2007.

[74]   SattarZadeh, B., AsadPour, M. and Jalili, R. “Improved User Identity Confidentiality for UMTS Mobile Networks”, Proceedings of the 4th European Conference on Universal Multiservice Networks, ECUMN’2007, France, 2007.

[73]   Jalaei, R., Shahriari, H.R., and Jalili, R. “Generating and Analyzing Attack Graphs through Vulnerability Take Grant Model”, Proceedings of the International Conference on Network Security- ICONS2007, India, 2007

[72]   Masoum-Zadeh, A., Amini, M. and Jalili, R. “Context Aware Access Control through Provisional Authorization”, Proceedings of the 2nd International Conference on Information System Security (ICISS 2006), India, Dec. 2006.

[71]   Javanmardi, S., Hemmati, H. and Jalili, R. “An Access Control Framework for Pervasive Computing Environments” Proceedings of the 2006 International Conference on Pervasive Systems & Computing PSC’06, Monte Carlo Resort, Las Vegas, Nevada, USA, June 26-29, 2006. 

[70]   Javanmardi, S., Amini, M. Jalili, R., and Ganji-Saffar, Y. “SBAC: “A Semantic-Based Access Control Model” Proceedings of the NORDSEC-2006, Sweden, October 2006.

[69]   Javanmardi, S., Amini, M. and Jalili, R. “An Access Control Model for Protecting Semantic Web Resources”, Proceedings of the Semantic Web Policy Workshop, Athens, GA, USA, November 5, 2006.

[68]   SattarZadeh, B., AsadPour, M. and Jalili, R. “Security Enhancement For A Low Computation Cost User Authentication Scheme”, Proceedings of the International Conference on Security and Cryptography (SECRYPT2006), Portugal, August 2006.

[67]   Ganji Saffar, Y., Abolhassani, H. and Jalili, R. “An Architecture for a Context-aware Service Broker in Ubiquitous Computing Environments”, Proceedings of the International Workshop on Pervasive Computing Systems & Application (PerCSA 2006) of the ACS/IEEE AICCSA-06 Conference, Dubai/Sharjeh, 2006 (To Apear)

[66]   Zakeri, R., Abolhassani, H., Shahriari, H.R. and Jalili, R. “Using Description Logics for Network Vulnerability Analysis”, Proceedings of the 5th International Conference on Networking
ICN’06, IEEE Computer Society Press, Mauritius 2006 (to Apear).

[65]   Sajedi, H., Jalili, R., and Niamanesh, M., “Using Intelligent Agents for Automatic Selection of Services in Dynamic Wireless Networks”, Proceedings of the 11th CSI Computer Conference (CSICC2006), pp. 1003-1006 (The Farsi Volume), IPM, Tehran, 2006.

[64]   Omidian, A., Shahriari, H.R., and Jalili, R., “Modeling of Computer Network Vulnerabilities Using Petri-Nets”, Proceedings of the 11th CSI Computer Conference (CSICC2006), pp. 935-938 (The Farsi Volume), IPM, Tehran, 2006.

[63]   Fekrazad Nobakht, N., Niamanesh, M., Hemmati, H., and Jalili, R., “A Graph-Based Mechanism for State Transfer in Dynamic Reconfiguration of Component-Based Programs”, Proceedings of the 11th CSI Computer Conference (CSICC2006), pp. 436-444 (The Farsi Volume), IPM, Tehran, 2006.

[62]    Niamanesh, M., Heydarian, F. and Jalili, R. “Runtime Validity of Dynamic Reconfiguration in Component-Based Programs”, Proceedings of the 11th CSI Computer Conference (CSICC2006), pp. 613-617 (The English Volume), IPM, Tehran, 2006.

[61]    Shahriari, H.R., and Makarem, M.S., Sirjani, M., Jalili, R. and Movaghar, A. ”Modeling and Verification of Complex Network Attacks Using and Actor-Based Language”, Proceedings of the 11th CSI Computer Conference (CSICC2006), pp. 152-158 (The English Volume), IPM, Tehran, 2006.

[60]    Zakeri, R., Jalili, R. and Shahriari, H.R. “Using Description Logics for Man In The Middle Attack Analysis”, Proceedings of the 11th CSI Computer Conference (CSICC2006), pp. 512-515 (The English Volume), IPM, Tehran, 2006.

[59]    Shahriari, H.R., Sadoddin, R., Jalili, R., Zakeri, R. and Omidian, A.R. “Network Vulnerability Analysis through Vulnerability Take-Grant Model (VTG)”, Proceedings of the 7th International Conference on Information and Communications Security(ICICS2005), pp. 256-268  LNCS# 3783, 2005.

[58]    Hemmati, H., Niamanesh, M. Jalili, R.A Framework to Support Run-Time Assured Dynamic Reconfiguration for Pervasive Computing Environments”, Proceedings of the First International Symposium on Wireless Pervasive Computing (ISWPC-2006), pp. 273-277, Thailand, 2006.

[57]    Hemmati, H., Aliakbarian , S., Niamanesh, M. Jalili, R.Structural and Behavioral Run-Time Validation of Dynamic Reconfiguration in Pervasive Computing Environments”, Proceedings of the 4th Asian International Mobile Computing Conference AMOC, India, 2006

[54]    Asadzadeh, K., Niamanesh, M. Jalili, R.A Composition Function Model for Software Reconfiguration Propagation in a Network of Systems”, Proceedings of the 9th World Multi-Conference on Systemics, Cybernetics and Informatics (WMSCI2005), Orlando, Florida, 2005.

[51]    Niamanesh, M., Heidarian Dehkordi, F., Fekrazad Nobakht, N, Jalili, R., “On Validity Assurance of Dynamic Reconfiguration for Component-based Programs”, Proceedings of the IPM International Workshop on Foundations of Software Engineering (Theory And Practice) FSEN 2005, Tehran, Iran, 2005.

[48]    Shahriari , H.R., Sadoddin, R. , Jalili, R., Zakeri, R. and Omidian, R. “Vulnerability Analysis through Vulnerability Take-Grant Model (VTG)”, Proceedings o f the 7th International Conference on Information and Communications Security (ICICS2005), China, 2005.

[47]    Shahriari , H.R. and Jalili, R.Modeling and Analyzing Network Vulnerabilities via a Logic-Based Approach”, Proceedings of the 2nd International Symposium of Telecommunications (IST2005), Shiraz, Iran, 2005.

[46]    Zakeri, R., Shahriari , H.R., Jalili, R. and Sadoddin, R. “Modeling TCP/IP Networks Topology for Network Vulnerability Analysis”, Proceedings of the 2nd International Symposium of Telecommunications (IST2005), Shiraz, Iran, 2005.

[45]    Shahriari , H.R. GanjiSaffar, Y. and Jalili, R.An Approach to Analyzing Network Vulnerabilities based on the Topology Relations”, Proceedings of the 3rd Iranian Society of Cryptography Conference (ISCC2005), pp. 273-284, Isfahan, Iran, 2005.

[44]   Shahriari , H.R. Sadoddin, R. and Jalili, R.Network Vulnerability Analysis based on the Take-Grant Protection Model: A Proof of the Concept”, Proceedings of the 3rd Iranian Society of Cryptography Conference (ISCC2005), pp. 261-272, Isfahan, Iran, 2005.

[43]   Shahriari , H.R. and Jalili, R.Modeling of Network Security-Related Behaviors Using NVML”, Proceedings of the 8th IEEE International Multi-topic conference (INMIC 2004), Lahur, Pakistan, 2004.

[42]   Shahriari , H.R. and Jalili, R.Using CSP To Model And Analyze Transmission Control Protocol Vulnerabilities Within The Broadcast Network”, Proceedings of the International Networking and Communications Conference (INCC 2004), Lahur, Pakistan, 2004.

[41]   Asadzadeh, K, Niamanesh, M. and Jalili, R.A Combinational Function Based Model for Reconfiguration Propagation in Distributed Systems”, Proceedings of the Second International Conference on Information and Knowledge Technology, Tehran, 2005.

[40]   Ranjbar, A., Hemmati, H., Niamanesh, M. and Jalili, R.Context Based Service Migration in Pervasive Computing”, Proceedings of the Second International Conference on Information and Knowledge Technology, Tehran, 2005.

[39]   Moghadam, M., Niamanesh, M. and Jalili, R.Context Based Service Migration in Pervasive Computing”, Proceedings of the Second International Conference on Information and Knowledge Technology, Tehran, 2005.

[38]   Jalili, R., Imani-Mehr, F. and Amini, M. “SPUNNID: A new Approach for Detection of DDoS Attacks Based on the Combination of Statistical Methods and Unsupervised Neural Networks”, Proceedings of the 10th Annual Iranian Computer Society Conference, Tehran, 2005.

[37]   Ranjbar, A., Jalili, R. and Niamanesh, M. “Using Metropolitan Pervasive Environments Information in Predicting Continuous Location-Based Queries”, Proceedings of the 10th Annual Iranian Computer Society Conference, Tehran, 2005.

[36]   Samadi. M, Esmaeili, J. and Jalili, R.A System for Identification and Misleading of Intruder in Computer Networks”, Proceedings of the 10th Annual Iranian Computer Society Conference, Tehran, 2005.

[35]   Jalili, R. and Niamanesh, M. “Modelling of Communication Protocol Stacks with Reconfigurable Capability”, Sharif University of Technology Research Reports, Tehran, 2005.

[34]   Jalili, R. and Amini, M. “Network Based Intrusion Detection Using Unsupervised Adaptive Resonance Theory (ART)”, Proceedings of the Fourth International ICSC Symposium On Engineering Of Intelligent Systems (EIS 2004), Portugal, 2004.

[33]    Jalili, R. and Amini, M. “An Intrusion Detection System Based on the ART Neural Networks”, Proceedings of the Fifth Conference on Intelligent Systems (CIS 2003), Ferdowsi University of Mashhad, Mashhad, Iran, pp.   , 2003.

 

[32]    Jalili, R. and Amini, M. “An Intrusion Detection System Based on the ART Neural Networks”, Proceedings of the Fifth Conference on Intelligent Systems (CIS 2003), Ferdowsi University of Mashhad, Mashhad, Iran, pp.   , 2003.

[31]    Ezati, N. and Jalili, R. “Improving Performance of the Internet Connections Inspection Through In-Kernel Application Proxies”, Proceedings of the 9th Annual Computer Society of Iran Conference (CSICC2004), Sharif University of Technology, Tehran, Iran, pp.   , 2004.

[30]    Khansari-Nia, O. and Jalili, R. “A New Approach for Role Delegation in Distributed Environments Based on Role-Based Access Control”, Proceedings of the 9th Annual Computer Society of Iran Conference (CSICC2004), Sharif University of Technology, Tehran, Iran, pp.   , 2004.

[29]    Khansari-Nia, O. and Jalili, R.A Dynamic Access Control Model for Relational Database Systems”, Proceedings of the Second Iranian Cryptography Conference (ISCC2003), Sharif University of Technology, Tehran, Iran, pp.   , 2003.

[28]    Jalili, R. and Amini, M. “An Intrusion Detection System Based on the ART Neural Networks”, Proceedings of the Fifth Conference on Intelligent Systems (CIS 2003), Ferdowsi University of Mashhad, Mashhad, Iran, pp.   , 2003.

[27]    Niamanesh, M. and Jalili, R. “A Secure Architecture for Software Defined Radio”, Proceedings of the Second International Symposium on Telecommunication (IST2003), Isfahan, Iran, pp.   , 2003.

[26]    Jalili, R., Heydari, M.A. and Fooladgar, M. “Obstacles and Approaches to Improve The Cyberspace Security from The Operating System Point of View”, Proceedings of the Operating System and Security Conference, Sharif University of Technology, Tehran, Iran, 2003.

[25]    Jalili, R., Hadavi, A. and Ale-Sheykh, R. “Review of the World Countries to the Open Source Phenomenon”, Proceedings of the Operating System and Security Conference, Sharif University of Technology, Tehran, Iran, 2003.

[24]    Jalili, R., Ale-Sheykh, R. and Hadavi, A. “Operating System Security: Concepts, Current Research, and New Approaches”, Proceedings of the Operating System and Security Conference, Sharif University of Technology, Tehran, Iran, 2003.

[23]    Ranjbar, A., Makarem, M.S., Jalili, R. And Bakht, M. “On Enhancing of Operating System Security Via Security Frameworks”, Proceedings of the Operating System and Security Conference, Sharif University of Technology, Tehran, Iran, 2003.

[22]    Jalili, R., and Adelkhah, B, “Design and Implementation of A Specification-based Intrusion Detection System”, Proceedings of the 8th Annual Iranian Computer Society Conference (ICSC’2003), Ferdowsi University of Mashhad, Iran, pp.576-591, 2003.

[21]    Jalili, R., and Hosseyni, S. M. “SFRED: An Algorithm for Dynamic Queue Management in Firewall”, Proceedings of the 8th Annual Iranian Computer Society Conference (ICSC’2003), Ferdowsi University of Mashhad, Iran, pp.142-149, 2003.

[20]    Jalili, R., and Rezvani, M, “Specification and Verification of Security Policies in Firewalls”, Lecture Notes in Computer Science # 2510, Springer, 2002, pp. 154-163. 2002.

[19]    Jalili, R., and Rezvani, M, “Analysis and Verification of Security Policy in Firewalls” Proceedings of the 7th Annual Iranian Computer Society Conference (ICSC’2002), Iran Telecommunication Center, pp. 339-345, 2002.

[18]    Jalili, R., and Niamanesh, M. “Attack and Fault Tolerance Through Dependable Middleware” Proceedings of the Seventh Annual Iranian Computer Society Conference (ICSC’2002), Iran Telecommunication Center, pp. 365-372, 2002.

[17]    Jalili, R., and Heydari, M. A. “Quality of Service in Virtual Private Networks” Proceedings of the First Iranian Cryptography Conference, Imam Hossein University, Tehran, Iran, pp.221-235, 2002.

[16]    Jalili, R. Samadi, M., and Shahriari, H. R. “FireHack: A Tool for Firewalls Security Evaluation” Proceedings of the First Iranian Cryptography Conference, Imam Hossein University, Tehran, Iran, pp. 73-82, 2002.

[15]    Jalili, R. and Rezvani, M. “High Level Security Policy Specification in Firewalls”, Proceedings of the First Iranian Cryptography Conference, Imam Hossein University, Tehran, Iran, pp. 105-116, 2002.

[14]    Jalili, R. and PourReza, H. et al “Hadid Firewall, toward an Integrated Secure Computer Networks”, Proceedings of the 1st Iranian Military Information Dissemination, Tehran, I271-286, 2001.

[13]    Jalili, R. and YusefZadeh, H. “Statefulness and Address Translation in a Packet Filter”, Proceedings of the Sixth Annual Iranian Computer Society Conference (ICSC’2001), University of Isfahan, Isfahan, Iran, pp. 491-500, 2001.

[12]    Jalili, R. and Feili, H. “An Evaluation of Concurrency Control Mechanisms in Database Systems”, Proceedings of the Fifth Iranian Computer Society Conference (ICSC’2000), Shahid Beheshti University, Tehran, Iran, pp. 113-123, 2000.

[11]    Jalili, R. and Pirayesh, A. R. “Persistance in the Sharif Operating System “, Proceedings of the Fourth Iranian Computer Society Conference (ICSC’98), Sharif University of Technology, Tehran, Iran, pp. 71-80, 1998.

[10]    Jalili, R. and Sadri, B. and Lavassani, M. “NFS Version 3 Implementation and Optimization: Our Experience on Linux”, Proceedings of the Third Iranian Computer Society Conference (ICSC’97), Iran University of Science and Technology, Tehran, Iran, pp. 119-125, 1997.

[9]      Jalili, R. and Salek, A..”Protection in the Sharif Operating System”, Proceedings of the Third Iranian Computer Society Conference (ICSC’97), Iran University of Science and Technology, Tehran, Iran, pp. 244-250(F),1997.

[8]      Jalili, R. and Zare, R.”POURIA: A Persistent Extension to C++”, Proceedings of the Second Iranian Computer Society Conference (ICSC’96), Amir Kabir University of Technology, Tehran, Iran, pp. 1-8,1996.

[7]      Jalili, R. and Henskens, F. A.”Stable-Copy Replication of Highly Available Stable Distributed Persistent Stores”, Proceedings of the Second Iranian Computer Society Conference (ICSC’96), Amir Kabir University of Technology, Tehran, Iran, pp. 78-86,1996.

[6]      Jalili, R. “Persistent Systems”, OFOGH, The Journal of Computer Science and Engineering, Vol 1, No 1, pp. 10-23, 1994.

[5]      Jalili, R. and Henskens, F. A.”Management of Inter-Entity Dependencies using Directed Dependency Graphs”, Proceedings of the First Iranian Computer Society Conference (ICSC’95), Sharif University of Technology, Tehran, Iran, pp. 210-218,1995.

[4]      Heskens, F. A., Koch, D. M., Jalili, R., Rosenberg, J. “Hardware Support for Stability in a Persistent Architecture”, Proceedings of the 6th International Workshop on Persistent Object Stores, Tarascon, France, Springer-Verlag, pp. 387-399, 1994.

[3]      Jalili, R. and Henskens, F. A. “Reducing the Extent of Cascadable Operations in Stable Distributed Persistent Stores”, Proceedings of the 18th Australian Computer Science Conference (ACSC’95), Adelaide, Australia, vol 1, pp. 227-236, 1995.

[2]      Jalili, R. and Henskens, F. A. “Operating System Support for Object Dependencies in Persistent Object Stores”, Proceedings of the Workshop on Object-Oriented Real-Time Dependable Systems (WORDS’94), Dana Point, California, IEEE Computer Society Press, pp. 21-29, 1994.

[1]      Jalili, R, and Henskens, , F. A.”Using Directed Graphs to Describe Entity Dependency in Stable Distributed Persistent Stores”, Proceedings of the 28th Hawaii International Conference on System Sciences, IEEE Computer Society Press, Vol. 2, pp. 665-674, 1995.

تحصیلات دانشگاهی

  • ۱۳۸۹ – ۱۳۸۸ : فرصت مطالعاتی، در زمینه رایانش امن، دانشگاه کالیفرنیا، دیویس،‌ کالیفرنیا، امریکا              
  • ۱۳۷۳-۱۳۷۰ : دكتری در علوم كامپیوتر، دانشگاه سیدنی، استرالیا
    – عنوان پایان‌‌نامه: “یك حافظة ماندگار توزیع شدة تحمل‌‌پذیر خطا”
  • ۱۳۶۹ – ۱۳۶۶ كارشناسی ارشد در مهندسی نرم‌‌افزار، دانشگاه صنعتی شریف
    – عنوان پایان‌‌نامه: “تولید كاربرد به روش تولید برنامه به زبان C”
  • ۱۳۶۴ – ۱۳۵۸ : كارشناسی در علوم كامپیوتر، دانشگاه فردوسی مشهد

زمینه‌‌های پژوهشی - آموزشی

  • شبكه‌‌های رایانه‌ای
  • سیستم‌های توزیع‌‌ شده و سیستم‌های عامل
  • امنیت شبکه‌ها و سیستم‌های رایانه‌ای
  • پایگاه‌های داده و مجازشماری
  • رایانش حافظ حریم خصوصی

دوره‌های حرفه‌ای

  • ۱۳۸۳ :  مدیریت شرکت‌های با فنآوری بالا (High-Tech Firms Management)، 200 ساعت.