default search action
Hassan Takabi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j15]Masoud Narouei, Hassan Takabi, Rodney Nielsen:
Automatic Extraction of Access Control Policies from Natural Language Documents. IEEE Trans. Dependable Secur. Comput. 17(3): 506-517 (2020)
2010 – 2019
- 2019
- [j14]Parisa Kaghazgaran, Hassan Takabi, Flannery Hope Currin, Armando Soriano:
Communication-efficient private distance calculation based on oblivious transfer extensions. Comput. Secur. 83: 93-105 (2019) - [j13]Manar Alohaly, Hassan Takabi, Eduardo Blanco:
Automated extraction of attributes from natural language attribute-based access control (ABAC) Policies. Cybersecur. 2(1): 2 (2019) - [j12]Farzaneh Abazari, Flavio Esposito, Hassan Takabi, Hamid Hosseinvand, Tommaso Pecorella:
Teaching software-defined network security through malicious tenant detection. Internet Technol. Lett. 2(6) (2019) - [j11]Farzaneh Abazari, Morteza Analoui, Hassan Takabi, Song Fu:
MOWS: Multi-objective workflow scheduling in cloud computing based on heuristic algorithm. Simul. Model. Pract. Theory 93: 119-132 (2019) - [c40]Ehsan Hesamifard, Hassan Takabi, Mehdi Ghasemi:
Deep Neural Networks Classification over Encrypted Data. CODASPY 2019: 97-108 - [c39]Manar Alohaly, Hassan Takabi, Eduardo Blanco:
Towards an Automated Extraction of ABAC Constraints from Natural Language Policies. SEC 2019: 105-119 - [c38]Robert Podschwadt, Hassan Takabi:
On Effectiveness of Adversarial Examples and Defenses for Malware Classification. SecureComm (2) 2019: 380-393 - [c37]Masoud Narouei, Hassan Takabi:
A Nature-Inspired Framework for Optimal Mining of Attribute-Based Access Control Policies. SecureComm (2) 2019: 489-506 - [i2]Robert Podschwadt, Hassan Takabi:
Effectiveness of Adversarial Examples and Defenses for Malware Classification. CoRR abs/1909.04778 (2019) - 2018
- [j10]Ehsan Hesamifard, Hassan Takabi, Mehdi Ghasemi, Rebecca N. Wright:
Privacy-preserving Machine Learning as a Service. Proc. Priv. Enhancing Technol. 2018(3): 123-142 (2018) - [c36]Hassan Takabi, Yessir Hashem, Ram Dantu:
Prediction of human error using eye movements patterns for unintentional insider threat detection. ISBA 2018: 1-8 - [c35]Manar Alohaly, Hassan Takabi, Eduardo Blanco:
A Deep Learning Approach for Extracting Attributes of ABAC Policies. SACMAT 2018: 137-148 - 2017
- [c34]Yassir Hashem, Hassan Takabi, Ram Dantu, Rodney D. Nielsen:
A Multi-Modal Neuro-Physiological Study of Malicious Insider Threats. MIST@CCS 2017: 33-44 - [c33]Ehsan Hesamifard, Hassan Takabi, Mehdi Ghasemi, Catherine Jones:
Privacy-preserving Machine Learning in Cloud. CCSW 2017: 39-43 - [c32]Hassan Takabi, Jafar Haadi Jafarian:
Insider Threat Mitigation Using Moving Target Defense and Deception. MIST@CCS 2017: 93-96 - [c31]Manar Alohaly, Hassan Takabi:
When Do Changes Induce Software Vulnerabilities? CIC 2017: 59-66 - [c30]Masoud Narouei, Hamed Khanpour, Hassan Takabi:
Identification of Access Control Policy Sentences from Natural Language Policy Documents. DBSec 2017: 82-100 - [c29]Masoud Narouei, Hamed Khanpour, Hassan Takabi, Natalie Parde, Rodney D. Nielsen:
Towards a Top-down Policy Engineering Framework for Attribute-based Access Control. SACMAT 2017: 103-114 - [i1]Ehsan Hesamifard, Hassan Takabi, Mehdi Ghasemi:
CryptoDL: Deep Neural Networks over Encrypted Data. CoRR abs/1711.05189 (2017) - 2016
- [j9]Mohammad GhasemiGol, Abbas Ghaemi Bafghi, Hassan Takabi:
A comprehensive approach for network attack forecasting. Comput. Secur. 58: 83-105 (2016) - [j8]Farzaneh Abazari, Morteza Analoui, Hassan Takabi:
Effect of anti-malware software on infectious nodes in cloud environment. Comput. Secur. 58: 139-148 (2016) - [j7]Mohammad GhasemiGol, Hassan Takabi, Abbas Ghaemi Bafghi:
A foresight model for intrusion response management. Comput. Secur. 62: 73-94 (2016) - [j6]Yessir Hashem, Hassan Takabi, Mohammad GhasemiGol, Ram Dantu:
Inside the Mind of the Insider: Towards Insider Threat Detection Using Psychophysiological Signals. J. Internet Serv. Inf. Secur. 6(1): 20-36 (2016) - [c28]Obi Ogbanufe, Dan Kim, Hassan Takabi:
Top Manager's Perspectives on Cyberinsurance Risk Management for Reducing Cybersecurity Risks. AMCIS 2016 - [c27]Hassan Takabi:
Firewall for brain: Towards a privacy preserving ecosystem for BCI applications. CNS 2016: 370-371 - [c26]Hassan Takabi, Anuj Bhalotiya, Manar Alohaly:
Brain Computer Interface (BCI) Applications: Privacy Threats and Countermeasures. CIC 2016: 102-111 - [c25]Hassan Takabi, Samir Koppikar, Saman Taghavi Zargar:
Differentially Private Distributed Data Analysis. CIC 2016: 212-218 - [c24]Manar Alohaly, Hassan Takabi:
If You Can't Measure It, You Can't Manage It: Towards Quantification of Privacy Policies. CIC 2016: 539-545 - [c23]Hassan Takabi, Sheikh Iqbal Ahamed, Mohammad Ashiqur Rahman, Mohammad Zulkernine:
Message from STPSA 2016 Workshop Organizers. COMPSAC Workshops 2016: 381 - [c22]Manar Alohaly, Hassan Takabi:
Better Privacy Indicators: A New Approach to Quantification of Privacy Policies. WPI@SOUPS 2016 - 2015
- [j5]Parisa Kaghazgaran, Hassan Takabi:
Toward an Insider Threat Detection Framework Using Honey Permissions. J. Internet Serv. Inf. Secur. 5(3): 19-36 (2015) - [j4]Masoud Narouei, Mansour Ahmadi, Giorgio Giacinto, Hassan Takabi, Ashkan Sami:
DLLMiner: structural mining for malware detection. Secur. Commun. Networks 8(18): 3311-3322 (2015) - [c21]Yessir Hashem, Hassan Takabi, Mohammad GhasemiGol, Ram Dantu:
Towards Insider Threat Detection Using Psychophysiological Signals. MIST@CCS 2015: 71-74 - [c20]Masoud Narouei, Hassan Takabi:
Towards an Automatic Top-down Role Engineering Approach Using Natural Language Processing Techniques. SACMAT 2015: 157-160 - [c19]Jafar Haadi Jafarian, Hassan Takabi, Hakim Touati, Ehsan Hesamifard, Mohamed Shehab:
Towards a General Framework for Optimal Role Mining: A Constraint Satisfaction Approach. SACMAT 2015: 211-220 - [c18]Masoud Narouei, Hassan Takabi:
Automatic Top-Down Role Engineering Framework Using Natural Language Processing Techniques. WISTP 2015: 137-152 - 2014
- [c17]Hassan Takabi:
Privacy aware access control for data sharing in cloud computing environments. SCC@ASIACCS 2014: 27-34 - [c16]Lei Jin, Hassan Takabi:
Venue attacks in location-based social networks. GeoPrivacy 2014: 1:1-1:8 - [c15]Lei Jin, Hassan Takabi, Xuelian Long, James B. D. Joshi:
Exploiting Users' Inconsistent Preferences in Online Social Networks to Discover Private Friendship Links. WPES 2014: 59-68 - 2012
- [j3]Hassan Takabi, James B. D. Joshi:
Semantic-based policy management for cloud computing environments. Int. J. Cloud Comput. 1(2/3): 119-144 (2012) - [c14]Hassan Takabi, James B. D. Joshi:
Policy Management as a Service: An Approach to Manage Policy Heterogeneity in Cloud Computing Environment. HICSS 2012: 5500-5508 - 2011
- [j2]Lei Jin, Hassan Takabi, James B. D. Joshi:
Analysing security and privacy issues of using e-mail address as identity. Int. J. Inf. Priv. Secur. Integr. 1(1): 34-58 (2011) - [c13]Michelle L. Mazurek, Peter F. Klemperer, Richard Shay, Hassan Takabi, Lujo Bauer, Lorrie Faith Cranor:
Exploring reactive access control. CHI 2011: 2085-2094 - [c12]Lei Jin, Hassan Takabi, James B. D. Joshi:
Towards active detection of identity clone attacks on online social networks. CODASPY 2011: 27-38 - [c11]Saman Taghavi Zargar, Hassan Takabi, James B. D. Joshi:
DCDIDP: A distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments. CollaborateCom 2011: 332-341 - 2010
- [j1]Hassan Takabi, James B. D. Joshi, Gail-Joon Ahn:
Security and Privacy Challenges in Cloud Computing Environments. IEEE Secur. Priv. 8(6): 24-31 (2010) - [c10]Richard Shay, Michelle L. Mazurek, Peter F. Klemperer, Hassan Takabi:
Exploring reactive access control. CHI Extended Abstracts 2010: 4417-4422 - [c9]Hassan Takabi, James B. D. Joshi, Gail-Joon Ahn:
SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments. COMPSAC Workshops 2010: 393-398 - [c8]Hassan Takabi, James B. D. Joshi:
StateMiner: an efficient similarity-based approach for optimal mining of role hierarchy. SACMAT 2010: 55-64 - [c7]Lei Jin, Hassan Takabi, James B. D. Joshi:
Security and Privacy Risks of Using E-mail Address as an Identity. SocialCom/PASSAT 2010: 906-913
2000 – 2009
- 2009
- [c6]Hassan Takabi, James B. D. Joshi, Hassan A. Karimi:
A collaborative k-anonymity approach for location privacy in location-based services. CollaborateCom 2009: 1-9 - [c5]Hassan Takabi, Minsoo Kim, James B. D. Joshi, Michael B. Spring:
An architecture for specification and enforcement of temporal access control constraints using OWL. SWS 2009: 21-28 - 2008
- [c4]Ali E. Abdallah, Hassan Takabi:
Integrating Delegation with the Formal Core RBAC Model. IAS 2008: 33-36 - 2007
- [c3]Hassan Takabi, Morteza Amini, Rasool Jalili:
Separation of Duty in Role-Based Access Control Model through Fuzzy Relations. IAS 2007: 125-130 - [c2]Hassan Takabi, Morteza Amini, Rasool Jalili:
Enhancing Role-Based Access Control Model through Fuzzy Relations. IAS 2007: 131-136 - [c1]Hassan Takabi, Morteza Amini, Rasool Jalili:
Trust-Based User-Role Assignment in Role-Based Access Control. AICCSA 2007: 807-814
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint