Mehrdad Ashtiani

Mehrdad Ashtiani
Iran University of Science and Technology · School of Computer Engineering

PhD

About

24
Publications
2,635
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
211
Citations
Citations since 2016
15 Research Items
201 Citations
2016201720182019202020212022010203040
2016201720182019202020212022010203040
2016201720182019202020212022010203040
2016201720182019202020212022010203040
Introduction
I got my PhD degree from Iran University of Science and Technology. My active research interest is about social computing in general and computational trust modeling specifically.
Additional affiliations
February 2014 - present
Iran University of Science and Technology
Position
  • Lecturer
Education
September 2011 - September 2015
Iran University of Science and Technology
Field of study
  • Trust Modeling
September 2009 - September 2011
Iran University of Science and Technology
Field of study
  • Security Simulation
September 2005 - September 2009
Iran University of Science and Technology
Field of study
  • Real-time computer simulation

Publications

Publications (24)
Article
Programmers strive to design programs that are flexible, updateable, and maintainable. However, several factors such as lack of time, high costs, and workload lead to the creation of software with inadequacies known as anti-patterns. To identify and refactor software anti-patterns, many research studies have been conducted using machine learning. E...
Preprint
Full-text available
With the migration of the enterprise applications to micro-services and containers, cloud service providers, starting with Amazon in 2014, announced a new computational model called function-as-a-service. In these platforms, developers create a set of fine-grained functions with shorter execution times instead of developing coarse-grained software....
Article
Context Nowadays, technical debt has become a very important issue in software project management. The main mechanism to repay this debt is through refactoring. Refactoring software projects usually comes at a high cost. As a result, researchers have always looked for ways to minimize this cost, and a good potential candidate to reduce the cost of...
Article
Long Method is amongst the most common code smells in software systems. Despite various attempts to detect the long method code smell, few automated approaches are presented to refactor this smell. Extract Method refactoring is mainly applied to eliminate the Long Method smell. However, current approaches still face serious problems such as insuffi...
Article
Removing nodes or links from a real-world social network may lead to a collapse in the entire network itself. This is due to the propagation effect of the initial removal. In the literature, this phenomenon is called cascading failure. In the context of trust modeling, cascading failure occurs when a node’s trust toward another, changes to distrust...
Article
Full-text available
The introduction of cloud computing systems brought with itself a solution for the dynamic scaling of computing resources leveraging various approaches for providing computing power, networking, and storage. On the other hand, it helped decrease the human resource cost by delegating the maintenance cost of infrastructures and platforms to the cloud...
Article
Full-text available
The rapid growth of social networks facilitates the exchange of information whereas malicious behaviors are also steadily increasing in these ecosystems. This results in a challenging situation for individuals to trust other parties. This paper studies the propagation of trust within a chain of trust relations to calculate the trust values of exist...
Article
Full-text available
The creation of high-quality software is of great importance in the current state of the enterprise systems. High-quality software should contain certain features including flexibility, maintainability, and a well-designed structure. Correctly adhering to the object-oriented principles is a primary approach to make the code more flexible. Developer...
Conference Paper
With the rapid growth and development of cloud computing, many startups or even large enterprises have decided to employ cloud services due to its dynamic provisioning and also reducing costs through the reduction of seasoned human resources needed to maintain the infrastructure. On the other hand, the risks of using shared resources and virtual ma...
Article
There are few trust models capable of incorporating the co-existence of trust and distrust as distinct concepts. In this regard, most of the existing trust models implicitly use distrust parameters to refine and calculate trust values. However, recent studies have indicated that trust and distrust are two distinct but co-existing concepts. In other...
Article
Full-text available
Trust models play an important role in decision support systems and computational environments in general. The common goal of the existing trust models is to provide a representation as close as possible to the social phenomenon of trust in computational domains. In recent years, the field of quantum decision making has been significantly developed...
Article
Full-text available
Considering the existence of a wide range of web services and their diversity, selecting a service with the best performance among similar services remains a challenge for the demanding users. However, sometimes it is necessary that web services invoke each other and become combined to create a more complex composite web service. Evaluation of the...
Article
Full-text available
In trust management systems, the trustor should be able to select a trustee candidate that has the maximum trustworthiness degree toward a specific goal and an amount of risk consistent with her/his risk acceptance degree. In this research, a novel computational trust model based on the principles of uncertainty theory is introduced. In the propose...
Article
The aim of this work is to introduce a trust model, which is highly consistent with the social nature of trust in computational domains. To this end, we propose a hesitant fuzzy multi-criteria decision making based computational trust model capable of taking into account the fundamental building blocks corresponding to the concept of trust. The pro...
Article
Full-text available
In this paper, we propose a new formulation of computational trust based on quantum decision theory (QDT). By using this new formulation, we can divide the assigned trustworthiness values to objective and subjective parts. First, we create a mapping between the QDT definitions and the trustworthiness constructions. Then, we demonstrate that it is p...
Article
There has always been a steady interest in how humans make decisions amongst researchers from various fields. Based on this interest, many approaches such as rational choice theory or expected utility hypothesis have been proposed. Although these approaches provide a suitable ground for modeling the decision making process of humans, they are unabl...
Article
In this paper, we use a combination of fuzzy analytic hierarchy process and fuzzy VIKOR approaches from the domain of multi-criteria decision making to formulate trust. The VIKOR method was originally developed to solve decision problems with conflicting and non-commensurable criteria. The VIKOR method assumes that compromise is acceptable for conf...
Article
Trust models have widespread applications in different areas. In this paper, we formulate trust as a multi-criteria decision-making (MCDM) problem. By applying this new formulation, one can treat the process of trust establishment as a decision-making process based on some set of trustworthiness criteria. By looking at trust as a whole, we may miss...
Article
Trust models play an important role in computational environments. One of the main aims of the work undertaken in this domain is to provide a model that can better describe the socio-technical nature of computational trust. It has been recently shown that quantum-like formulations in the field of human decision making can better explain the underly...
Article
The aim of this work is to propose a framework for the distributed simulation of cyber attacks based on high-level architecture (HLA), which is a commonly used standard for distributed simulations. The proposed framework and the corresponding simulator, which is called the distributed cyber attack simulator (abbreviated by DCAS), help administrator...
Article
Today، cyber attacks to computer networks have turned into a real challenge for network administrators. A wide range of methods have been used for attack modeling and security quantification. The most important drawback of the existing methods is that they are not based on real security-related information of networks. Our aim has been to overcome...

Network

Cited By