Behrouz Tork Ladani
University of Isfahan
H-index: 20
Asia-Iran
Top articles of Behrouz Tork Ladani
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
A Social Network Model for Analysis of Public Opinion Formation Process | Authorea Preprints | Hani Rabiee Behrouz Tork Ladani Ebrahim Sahafizadeh | 2024/3/29 |
Formal Specification of Android ICC Vulnerabilities Using the Z Language | Atefeh Nirumand Bahman Zamani Behrouz Tork Ladani | 2023/3/30 | |
A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware. | ISeCure | Hayyan Salman Hasan Hasan Muhammad Deeb Behrouz Tork Ladani | 2023/1/1 |
Soft rumor control in mobile instant messengers | Physica A: Statistical Mechanics and its Applications | Ebrahim Sahafizadeh Behrouz Tork Ladani | 2023/1/1 |
Privacy, reputation, and incentive provision for vehicular social networks | Journal of Reliable Intelligent Environments | Sanaz Zamani Behrouz Tork Ladani Maede Ashouri Talouki | 2023/12 |
Maaker: A framework for detecting and defeating evasion techniques in Android malware | Journal of Information Security and Applications | Hayyan Hasan Behrouz Tork Ladani Bahman Zamani | 2023/11/1 |
Privacy, trust, and secure rewarding in mobile crowd-sensing based spectrum monitoring | Journal of Ambient Intelligence and Humanized Computing | Golbarg Hajian Behrouz Shahgholi Ghahfarokhi Mehri Asadi Vasfi Behrouz Tork Ladani | 2023/1 |
A model‐based framework for inter‐app Vulnerability analysis of Android applications | Software: Practice and Experience | Atefeh Nirumand Bahman Zamani Behrouz Tork‐Ladani Jacques Klein Tegawendé F Bissyandé | 2023/4 |
Adaptive cost-sensitive stance classification model for rumor detection in social networks | Social Network Analysis and Mining | Zahra Zojaji Behrouz Tork Ladani | 2022/12 |
Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System | The ISC International Journal of Information Security | Amirhosein Sayyadabdi Behrouz Tork Ladani Bahman Zamani | 2022/10 |
Modeling and Analysis of Rumor Control Strategies in Social Networks | Computer and Knowledge Engineering | Mojgan Askarizade Samad Najafi Behrouz Tork Ladani | 2022/6/1 |
ATL rules and OCL queries implemented in VAnDroid | Atefeh Nirumand Bahman Zamani Behrouz Tork Ladani | 2022/5/26 | |
A Model-Based Approach for Representing Data Sharing Mechanism in Android Applications | Atefeh Nirumand Bahman Zamani Behrouz Tork Ladani | 2022/2/23 | |
Efficient and Deception Resilient Rumor Detection in Twitter | Computer and Knowledge Engineering | Milad Radnejad Zahra Zojaji Behrouz Tork Ladani | 2022/12/1 |
Automatic Generation of XACML Code using Model-Driven Approach | Athareh Fatemian Bahman Zamani Marzieh Masoumi Mehran Kamranpour Behrouz Tork Ladani | 2021/10/28 | |
SANT: Static Analysis of Native Threads for Security Vetting of Android Applications | The ISC International Journal of Information Security (ISeCure) | Seyed Behnam Andarzian Behrouz Tork Ladani | 2021/9 |
Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware | The ISC International Journal of Information Security (ISeCure) | Hayyan Hasan Behrouz Tork Ladani Bahman Zamani | 2021/7 |
MEGDroid: A model-driven event generation framework for dynamic android malware analysis | Information and Software Technology | Hayyan Hasan Behrouz Tork Ladani Bahman Zamani | 2021/7/1 |
Soft rumor control in social networks: Modeling and analysis | Engineering Applications of Artificial Intelligence | Mojgan Askarizadeh Behrouz Tork Ladani | 2021/4/1 |
Secure parameterized pattern matching | Information Sciences | Maryam Zarezadeh Hamid Mala Behrouz Tork Ladani | 2020/6/1 |