Selected Publications - Full List



 Book Chapters

  1. User-Centric Networking and Crowdsourcing : Android Security Solutions
    Bahman Rashidi, Carol Fung
    User-Centic and Information Centric Networks - Access Networks and Emerging Trends, CRC Press.

 US Patents

  1. Application Permission Recommendation and Control
    Bahman Rashidi, Carol Fung, Tam Vu
    US Patent App. 15/253,523, 2016

 Selected Journal Papers

  1. Android User Privacy Preserving through Crowdsourcing
    Bahman Rashidi, Carol Fung, Anh Nguyen, Tam Vu, Elisa Bertino
    IEEE Transactions on Information Forensics and Security (TIFS) , 2017, (IF: 4.33).

  2. A Collaborative DDoS Defence Framework using Network Function Virtualization
    Bahman Rashidi, Carol Fung, Elisa Bertino
    IEEE Transactions on Information Forensics and Security (TIFS) , 2017, (IF: 4.33).
    BibTeX

  3. Android Resource Usage Risk Assessment using Hidden Markov Model and Online Learning
    Bahman Rashidi, Carol Fung, Elisa Bertino
    Computers & Security - Elsevier, 2016 (IF: 2.84)
    PDF (3.6 MB) | BibTeX

  4. Android Fine-grained Permission Control System with Real-Time Expert Recommendations
    Bahman Rashidi, Carol Fung, Tam Vu
    Pervasive and Mobile Computing - Elsevier, 2016, (IF: 2.34).
    PDF (3.6 MB) | BibTeX

  5. A Survey of Android Security Threats and Defenses
    Bahman Rashidi, Carol Fung
    Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Vol. 6, No. 3, September 2015.
    Abstract | PDF (1.4 MB) | BibTeX

  6. Disincentivizing Malicious Users in RecDroid Using Bayesian Game Model
    Bahman Rashidi, Carol Fung
    Journal of Internet Services and Information Security (JISIS), Vol. 5, No. 2, May 2015.
    Abstract | PDF (0.9 MB) | BibTeX

 Selected Conference Papers

  1. Android Malicious Application Detection Using Support Vector Machine and Active Learning
    Bahman Rashidi, Carol Fung, Elisa Bertino
    IEEE/IFIP International Conference on Network and Service Management(CNSM 2017).

  2. A Scalable and Flexible DDoS Mitigation System Using Network Function Virtualization
    Bahman Rashidi, Carol Fung, M Ashiqur Rahman
    IEEE/IFIP Network Operations and Management Symposium (NOMS 2018).

  3. HoneyV: A Virtualized Honeynet System Based on Network Softwarization
    Bahman Rashidi, Carol Fung, Kevin W. Hamlen, Andrzej Kamisiski
    IEEE/IFIP Network Operations and Management Symposium (NOMS 2018).

  4. DroidVisor: An Android secure application recommendation system
    Pulkit Rustgi, Carol Fung, Bahman Rashidi, Bridget McInnes
    15th IFIP/IEEE International Symposium on Integrated Network Management (IM 2017).

  5. Dynamic DDoS Defense Resource Allocation using Network Function Virtualization
    AHM Jakaria, Bahman Rashidi, Carol Fung, M Ashiqur Rahman, Wei Yang
    ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization 2017.

  6. CoFence: A Collaborative DDoS Defence Using Network Function Virtualization
    Bahman Rashidi, Carol Fung
    12th IEEE International Conference on Network and Service Management (CNSM'16).
    PDF (2.8 MB) | BibTeX

  7. XDroid: An Android Permission Control Using Hidden Markov Chain and Online Learning
    Bahman Rashidi, Carol Fung
    IEEE Conference on Communications and Network Security 2016 (CNS'16).
    PDF (1.1 MB) | BibTeX

  8. Android Permission Recommendation using Transitive Bayesian Inference Model
    Bahman Rashidi, Carol Fung, Anh Nguyen, Tam Vu
    The 21st European Symposium on Research in Computer Security (ESORICS'16).
    PDF (1.1 MB) | BibTeX | Project Website

  9. VFence: A defense against distributed denial of service attacks using network function virtualization AHM Jakaria, Wei Yang, Bahman Rashidi, Carol Fung, M Ashiqur Rahman
    NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, April, 2016.
    PDF | BibTeX|

  10. BotTracer: Bot User Detection Using Clustering Method in RecDroid Bahman Rashidi, Carol Fung
    NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, April, 2016
    PDF (0.4 MB) | BibTeX| Presentation (1.6 MB)

  11. Demo: RecDroid- An Android Resource Access Permission Recommendation System
    Bahman Rashidi, Carol Fung, Gerrit Bond, Steven Jackson, Marcus Pare, Tam Vu
    MobiHoc'15: The 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing Proceedings
    PDF (5.6 MB) | BibTeX

  12. A Game-Theoretic Model for Defending Against Malicious Users in RecDroid
    Bahman Rashidi, Carol Fung
    DISSECT '15 Proceedings of the 14th IEEE/IFIP IM2015 Workshop on Security for Emerging Distributed Network Technologies.
    PDF | BibTeX | Presentation

  13. Dude, Ask The Experts: Android Resource Access Permission Recommendation with RecDroid
    Bahman Rashidi, Carol Fung, Tam Vu
    14th IFIP/IEEE International Symposium on Integrated Network Management (IM 2015).
    PDF | BibTeX | Video | Project Website

  14. Recdroid: A Resource Access Permission Control Portal and Recommendation Service for Smartphone Users
    Bahman Rashidi, Carol Fung, Tam Vu
    SPME '14 Proceedings of the ACM MobiCom workshop on Security and privacy in mobile environments
    PDF (0.9 MB) | BibTeX | Presentation

  15. A Survey on Interoperability in the Cloud Computing Environments
    Bahman Rashidi, Mohsen Sharifi
    I.J.Modern Education and Computer Science, 2013.
    PDF (0.3 MB) | [BibTeX]

  16. Study of Interoperability Challenges in Cloud Computing Environments (Farsi) Bahman Rashidi, Mohsen Sharifi
    First Workshop on Cloud Computing, Amirkabir University of Technology, 2013.
    PDF (0.6 MB)
 Copyrights 2017