Selected Publications -
Full List
Book Chapters
-
User-Centric Networking and Crowdsourcing : Android Security Solutions
Bahman Rashidi,
Carol Fung
User-Centic and Information Centric Networks - Access Networks and Emerging Trends, CRC Press.
US Patents
Selected Journal Papers
-
Android User Privacy Preserving through Crowdsourcing
Bahman Rashidi,
Carol Fung,
Anh Nguyen,
Tam Vu,
Elisa Bertino
IEEE Transactions on Information Forensics and Security (TIFS) , 2017, (IF: 4.33).
-
A Collaborative DDoS Defence Framework using Network Function Virtualization
Bahman Rashidi,
Carol Fung,
Elisa Bertino
IEEE Transactions on Information Forensics and Security (TIFS) , 2017, (IF: 4.33).
BibTeX
-
Android Resource Usage Risk Assessment using Hidden Markov Model and Online Learning
Bahman Rashidi,
Carol Fung,
Elisa Bertino
Computers & Security - Elsevier, 2016 (IF: 2.84)
PDF (3.6 MB) |
BibTeX
-
Android Fine-grained Permission Control System with Real-Time Expert Recommendations
Bahman Rashidi,
Carol Fung,
Tam Vu
Pervasive and Mobile Computing - Elsevier, 2016, (IF: 2.34).
PDF (3.6 MB) |
BibTeX
-
A Survey of Android Security Threats and Defenses
Bahman Rashidi,
Carol Fung
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Vol.
6, No. 3, September 2015.
Abstract |
PDF (1.4 MB) |
BibTeX
-
Disincentivizing Malicious Users in RecDroid Using Bayesian Game Model
Bahman Rashidi,
Carol Fung
Journal of Internet Services and Information Security (JISIS), Vol. 5, No. 2, May 2015.
Abstract |
PDF (0.9 MB) |
BibTeX
Selected Conference Papers
-
Android Malicious Application Detection Using Support Vector Machine and Active Learning
Bahman Rashidi,
Carol Fung,
Elisa Bertino
IEEE/IFIP International Conference on Network and Service Management(CNSM 2017).
-
A Scalable and Flexible DDoS Mitigation System Using Network Function Virtualization
Bahman Rashidi,
Carol Fung,
M Ashiqur Rahman
IEEE/IFIP Network Operations and Management Symposium (NOMS 2018).
-
HoneyV: A Virtualized Honeynet System Based on Network Softwarization
Bahman Rashidi,
Carol Fung,
Kevin W. Hamlen, Andrzej Kamisiski
IEEE/IFIP Network Operations and Management Symposium (NOMS 2018).
-
DroidVisor: An Android secure application recommendation system
Pulkit Rustgi,
Carol Fung, Bahman Rashidi,
Bridget McInnes
15th IFIP/IEEE International Symposium on Integrated Network Management (IM 2017).
-
Dynamic DDoS Defense Resource Allocation using Network Function Virtualization
AHM Jakaria, Bahman Rashidi,
Carol Fung,
M Ashiqur Rahman, Wei Yang
ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization
2017.
-
CoFence: A Collaborative DDoS Defence Using Network Function Virtualization
Bahman Rashidi,
Carol Fung
12th IEEE International Conference on Network and Service Management (CNSM'16).
PDF (2.8 MB) |
BibTeX
-
XDroid: An Android Permission Control Using Hidden Markov Chain and Online Learning
Bahman Rashidi,
Carol Fung
IEEE Conference on Communications and Network Security 2016 (CNS'16).
PDF (1.1 MB) |
BibTeX
-
Android Permission Recommendation using Transitive Bayesian Inference Model
Bahman Rashidi,
Carol Fung,
Anh Nguyen,
Tam Vu
The 21st European Symposium on Research in Computer Security (ESORICS'16).
PDF (1.1 MB) |
BibTeX |
Project Website
-
VFence: A defense against distributed denial of service attacks using network function virtualization
AHM Jakaria, Wei Yang, Bahman Rashidi,
Carol Fung,
M Ashiqur Rahman
NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, April, 2016.
PDF |
BibTeX|
-
BotTracer: Bot User Detection Using Clustering Method in RecDroid
Bahman Rashidi,
Carol Fung
NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, April, 2016
PDF (0.4 MB) |
BibTeX|
Presentation (1.6 MB)
-
Demo: RecDroid- An Android Resource Access Permission Recommendation System
Bahman Rashidi,
Carol Fung, Gerrit Bond, Steven Jackson, Marcus Pare,
Tam Vu
MobiHoc'15: The 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing Proceedings
PDF (5.6 MB) |
BibTeX
-
A Game-Theoretic Model for Defending Against Malicious Users in RecDroid
Bahman Rashidi,
Carol Fung
DISSECT '15 Proceedings of the 14th IEEE/IFIP IM2015 Workshop on Security for Emerging Distributed
Network Technologies.
PDF |
BibTeX |
Presentation
-
Dude, Ask The Experts: Android Resource Access Permission Recommendation with RecDroid
Bahman Rashidi,
Carol Fung,
Tam Vu
14th IFIP/IEEE International Symposium on Integrated Network Management (IM 2015).
PDF |
BibTeX |
Video |
Project Website
-
Recdroid: A Resource Access Permission Control Portal and Recommendation Service for Smartphone Users
Bahman Rashidi,
Carol Fung,
Tam Vu
SPME '14 Proceedings of the ACM MobiCom workshop on Security and privacy in mobile environments
PDF (0.9 MB) |
BibTeX |
Presentation
-
A Survey on Interoperability in the Cloud Computing Environments
Bahman Rashidi,
Mohsen Sharifi
I.J.Modern Education and Computer Science, 2013.
PDF (0.3 MB) |
[BibTeX]
-
Study of Interoperability Challenges in Cloud Computing Environments (Farsi) Bahman Rashidi,
Mohsen Sharifi
First Workshop on Cloud Computing, Amirkabir University of Technology, 2013.
PDF (0.6 MB)
|