Behrouz Tork Ladani

Behrouz Tork Ladani

University of Isfahan

H-index: 20

Asia-Iran

About Behrouz Tork Ladani

Behrouz Tork Ladani, With an exceptional h-index of 20 and a recent h-index of 15 (since 2020), a distinguished researcher at University of Isfahan, specializes in the field of Software security, Soft Security, Formal verification, Cryptographic protocols.

His recent articles reflect a diverse array of research interests and contributions to the field:

A Social Network Model for Analysis of Public Opinion Formation Process

Formal Specification of Android ICC Vulnerabilities Using the Z Language

A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware.

Soft rumor control in mobile instant messengers

Privacy, reputation, and incentive provision for vehicular social networks

Maaker: A framework for detecting and defeating evasion techniques in Android malware

Privacy, trust, and secure rewarding in mobile crowd-sensing based spectrum monitoring

A model‐based framework for inter‐app Vulnerability analysis of Android applications

Behrouz Tork Ladani Information

University

Position

Professor of software engineering at Faculty of Computer Engineering

Citations(all)

1271

Citations(since 2020)

656

Cited By

836

hIndex(all)

20

hIndex(since 2020)

15

i10Index(all)

31

i10Index(since 2020)

18

Email

University Profile Page

University of Isfahan

Google Scholar

View Google Scholar Profile

Behrouz Tork Ladani Skills & Research Interests

Software security

Soft Security

Formal verification

Cryptographic protocols

Top articles of Behrouz Tork Ladani

Title

Journal

Author(s)

Publication Date

A Social Network Model for Analysis of Public Opinion Formation Process

Authorea Preprints

Hani Rabiee

Behrouz Tork Ladani

Ebrahim Sahafizadeh

2024/3/29

Formal Specification of Android ICC Vulnerabilities Using the Z Language

Atefeh Nirumand

Bahman Zamani

Behrouz Tork Ladani

2023/3/30

A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware.

ISeCure

Hayyan Salman Hasan

Hasan Muhammad Deeb

Behrouz Tork Ladani

2023/1/1

Soft rumor control in mobile instant messengers

Physica A: Statistical Mechanics and its Applications

Ebrahim Sahafizadeh

Behrouz Tork Ladani

2023/1/1

Privacy, reputation, and incentive provision for vehicular social networks

Journal of Reliable Intelligent Environments

Sanaz Zamani

Behrouz Tork Ladani

Maede Ashouri Talouki

2023/12

Maaker: A framework for detecting and defeating evasion techniques in Android malware

Journal of Information Security and Applications

Hayyan Hasan

Behrouz Tork Ladani

Bahman Zamani

2023/11/1

Privacy, trust, and secure rewarding in mobile crowd-sensing based spectrum monitoring

Journal of Ambient Intelligence and Humanized Computing

Golbarg Hajian

Behrouz Shahgholi Ghahfarokhi

Mehri Asadi Vasfi

Behrouz Tork Ladani

2023/1

A model‐based framework for inter‐app Vulnerability analysis of Android applications

Software: Practice and Experience

Atefeh Nirumand

Bahman Zamani

Behrouz Tork‐Ladani

Jacques Klein

Tegawendé F Bissyandé

2023/4

Adaptive cost-sensitive stance classification model for rumor detection in social networks

Social Network Analysis and Mining

Zahra Zojaji

Behrouz Tork Ladani

2022/12

Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System

The ISC International Journal of Information Security

Amirhosein Sayyadabdi

Behrouz Tork Ladani

Bahman Zamani

2022/10

Modeling and Analysis of Rumor Control Strategies in Social Networks

Computer and Knowledge Engineering

Mojgan Askarizade

Samad Najafi

Behrouz Tork Ladani

2022/6/1

ATL rules and OCL queries implemented in VAnDroid

Atefeh Nirumand

Bahman Zamani

Behrouz Tork Ladani

2022/5/26

A Model-Based Approach for Representing Data Sharing Mechanism in Android Applications

Atefeh Nirumand

Bahman Zamani

Behrouz Tork Ladani

2022/2/23

Efficient and Deception Resilient Rumor Detection in Twitter

Computer and Knowledge Engineering

Milad Radnejad

Zahra Zojaji

Behrouz Tork Ladani

2022/12/1

Automatic Generation of XACML Code using Model-Driven Approach

Athareh Fatemian

Bahman Zamani

Marzieh Masoumi

Mehran Kamranpour

Behrouz Tork Ladani

...

2021/10/28

SANT: Static Analysis of Native Threads for Security Vetting of Android Applications

The ISC International Journal of Information Security (ISeCure)

Seyed Behnam Andarzian

Behrouz Tork Ladani

2021/9

Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware

The ISC International Journal of Information Security (ISeCure)

Hayyan Hasan

Behrouz Tork Ladani

Bahman Zamani

2021/7

MEGDroid: A model-driven event generation framework for dynamic android malware analysis

Information and Software Technology

Hayyan Hasan

Behrouz Tork Ladani

Bahman Zamani

2021/7/1

Soft rumor control in social networks: Modeling and analysis

Engineering Applications of Artificial Intelligence

Mojgan Askarizadeh

Behrouz Tork Ladani

2021/4/1

Secure parameterized pattern matching

Information Sciences

Maryam Zarezadeh

Hamid Mala

Behrouz Tork Ladani

2020/6/1

See List of Professors in Behrouz Tork Ladani University(University of Isfahan)

Co-Authors

H-index: 25
Mohammad Hossein Manshaei

Mohammad Hossein Manshaei

École Polytechnique Fédérale de Lausanne

H-index: 21
Kamran Zamanifar

Kamran Zamanifar

University of Isfahan

H-index: 21
Mohammad Ali Nematbakhsh

Mohammad Ali Nematbakhsh

University of Isfahan

H-index: 17
Naser Movahedinia, Naser Movahhedinia, N. Movahhedinia, N. Movahedinia

Naser Movahedinia, Naser Movahhedinia, N. Movahhedinia, N. Movahedinia

University of Isfahan

H-index: 16
hamid mala

hamid mala

University of Isfahan

H-index: 13
Amir Jalaly Bidgoly

Amir Jalaly Bidgoly

University of Qom

academic-engine