Mohammad Abdollahi Azgomi

Mohammad Abdollahi Azgomi
Iran University of Science and Technology · School of Computer Engineering

Ph.D.

About

138
Publications
18,938
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,378
Citations
Citations since 2016
25 Research Items
907 Citations
2016201720182019202020212022050100150
2016201720182019202020212022050100150
2016201720182019202020212022050100150
2016201720182019202020212022050100150
Additional affiliations
October 2004 - present
Iran University of Science and Technology
Position
  • Professor (Associate)

Publications

Publications (138)
Article
Full-text available
Designing a software architecture that satisfies all quality requirements is a difficult task. To determine whether the requirements are achieved, it is necessary to quantitatively evaluate quality attributes on the architecture model. A good evaluation process should have proper answers for these questions: (1) how to feedback the evaluation resul...
Article
Full-text available
Trust models play an important role in decision support systems and computational environments in general. The common goal of the existing trust models is to provide a representation as close as possible to the social phenomenon of trust in computational domains. In recent years, the field of quantum decision making has been significantly developed...
Article
Full-text available
In this paper, we model the infrastructure of cloud computing systems to evaluate the power consumption and performance measures using stochastic activity networks (SANs). In the proposed model, servers run different numbers of virtual machines (VMs) and tasks are divided into two categories, namely low and high, demonstrating their priorities to r...
Article
Full-text available
This study proposes a stochastic Petri net model for evaluating the security and resilience of cyber-physical systems (CPSs) in the face of malicious attacks. The basic idea behind the proposed model is to evaluate the security of control loops equipped with intrusion detection systems (IDSs) faced with security attacks. The quantitative analysis i...
Article
Full-text available
Considering the existence of a wide range of web services and their diversity, selecting a service with the best performance among similar services remains a challenge for the demanding users. However, sometimes it is necessary that web services invoke each other and become combined to create a more complex composite web service. Evaluation of the...
Article
Full-text available
A quantitative security evaluation in the domain of cyber-physical systems (CPS), which operate under intentional disturbances, is an important open problem. In this paper, we propose a stochastic game model for quantifying the security of CPS. The proposed model divides the security modeling process of these systems into two phases: (1) intrusion...
Article
Full-text available
An anonymous communication network (ACN) is supposed to provide its users with anonymity attributes. As a practical matter, we need to have a means to predict the level of the anonymity provided by ACN. In this paper, we propose a probabilistic model for the security analysis of ACNs, thereby quantifying their loss of anonymity. To be precise, we h...
Article
In this paper, we introduce a new dynamic model of malware propagation in heterogeneous networks based on a rumor diffusion model, which comprises both vaccination and quarantine methods. The proposed model is referred to as the susceptible–exposed–infected–recovered–susceptible with vaccination and quarantine states (SEIRS-QV) model. The model con...
Article
Full-text available
In trust management systems, the trustor should be able to select a trustee candidate that has the maximum trustworthiness degree toward a specific goal and an amount of risk consistent with her/his risk acceptance degree. In this research, a novel computational trust model based on the principles of uncertainty theory is introduced. In the propose...
Article
Full-text available
Model-based evaluation of software reliability in the architecture design stage helps designers make objective decisions about design trade-offs. A challenging problem is how to deal with uncertainties in model parameters, e.g. usage profile. In this study, an approach based on evidence theory is proposed to handle the uncertainties in model parame...
Article
Full-text available
Dependability is an important quality attribute for today’s software systems, and the decisions made at the architectural design stage play a key role in the dependability of software products. Architecture-level dependability evaluation techniques are effective only if they support a practical architecture modelling notation and consider the impac...
Article
The security of cyber-physical systems (CPSs) has become an active research area in recent years. The goal of attackers in these systems is often disrupting physical processes. However, breaking into a CPS is not the same as disrupting its physical process. To achieve the desired physical disruptions, an attacker needs to deep understanding about t...
Article
One of the main challenges of the security of cyber-physical systems (CPSs) is the lack of an efficient approach to evaluate the impacts of attacks on physical processes and their probabilities of occurrence. This paper proposes a method for evaluating the security of CPSs. By using the proposed method, one can predict the attacker's preferences in...
Article
Full-text available
Quantitative and model-based prediction of security in the architecture design stage facilitates early detection of design faults hence reducing modification costs in subsequent stages of software life cycle. However, an important question arises with respect to the accuracy of input parameters. In practice, security parameters can rarely be estima...
Article
In this paper, we propose a dynamic model of malware propagation in scale-free networks (SFNs) based on a rumor spreading model. The proposed model, which is called the susceptible–exposed–infectious–recovered–susceptible with a vaccination state (SEIRS-V) model, illustrates the dynamics of malware propagation with respect to time in SFNs. The mode...
Article
Estimating the possible impacts of security attacks on physical processes can help to rank the critical assets based on their sensitivity to performed attacks and predict their attractiveness from the attacker’s point of view. To address this challenge, this paper proposes a new method for assessing the direct and indirect impacts of attacks on cyb...
Article
Full-text available
Agent-based modeling and simulation (ABMS) has been used in wide range of application areas as an effective modeling paradigm. In this work, we have used ABMS to study the dynamics of malware propagation in scale-free networks (SFNs). Firstly, we use an analytical model to formulate the malware propagation process that considers the diversity of no...
Article
Full-text available
Web services are software systems designed for supporting interoperable dynamic cross-enterprise interactions. The result of attacks to Web services can be catastrophic and causing the disclosure of enterprises' confidential data. As new approaches of attacking arise every day, anomaly detection systems seem to be invaluable tools in this context....
Article
Full-text available
Stateless code model checking is an effective verification technique, which is more applicable than stateful model checking to the software world. Existing stateless model checkers support the verification of neither LTL formulae nor the information flow security properties. This paper proposes a distributed stateless code model checker (DSCMC) des...
Article
Full-text available
Observational determinism is a security property that characterizes secure information flow for multithreaded programs. Most of the methods that have been used to verify observational determinism are based on either type systems or conventional model checking techniques. A conventional model checker is stateful and often verifies a system model usu...
Article
Full-text available
Verification of large and complicated concurrent programs is an important issue in the software world. Stateless model checking is an appropriate method for systematically and automatically testing of large programs, which has proved its power in verifying code of large programs. Another well-known method in this area is runtime verification. Both...
Article
The aim of this work is to introduce a trust model, which is highly consistent with the social nature of trust in computational domains. To this end, we propose a hesitant fuzzy multi-criteria decision making based computational trust model capable of taking into account the fundamental building blocks corresponding to the concept of trust. The pro...
Article
In this paper, we propose a discrete-time susceptible–exposed–infected–recovered–susceptible (SEIRS) epidemic model of malware propagation in scale-free networks (SFNs) with considering software diversity. We study dynamical behavior of the SEIRS model, which is determined by a threshold (i.e., basic reproductive ratio). With this threshold, we can...
Conference Paper
Full-text available
Quantitative and integrated evaluation of software quality attributes at the architectural design stage provides a sound basis for making objective decisions for design trade-offs and developing a high quality software. In this paper we introduce a formal method for model-ing software architectures and evaluationg their quality attributes quantitat...
Article
The goal of privacy preserving clustering (PPC) is to preserve the privacy of data during clustering analysis. Most of the existing PPC algorithms are based on heuristic notions without provable privacy. Differential privacy is the strong notion of privacy introduced to overcome this problem. However, the lower degree of utility is the serious draw...
Article
Topology-aware active worms, which use topological scanning for finding their victims, are one of the most serious threats in the Internet. Peer-to-peer (P2P) networks and applications are suitable environments for the spread of topology-aware active worms. Several models for the propagation behavior of these threats exist in the literature. Discre...
Article
In this paper, we propose a new rumor-spreading model, which is a variant of the susceptible–exposed–infectious–removed epidemic model. We consider the influences of the diversity of configurations as a defense strategy to diminish the damage brought by rumor diffusion. The diversity of configuration can be found in different instant messengers or...
Article
Most of the existing privacy preserving clustering (PPC) algorithms do not consider the worst case privacy guarantees and are based on heuristic notions. In addition, these algorithms do not run efficiently in the case of high dimensionality of data. In this paper, to alleviate these challenges, we propose a new PPC algorithm, which is based on Dau...
Article
Trust and reputation models are used as mechanisms for selecting services. One of the benefits of service-oriented architecture is enabling the composition of services and composing value-added services, which are called composite services. A challenging problem of trust management in composite services is how to propagate the consumers’ perception...
Article
Full-text available
In this paper, we propose a new formulation of computational trust based on quantum decision theory (QDT). By using this new formulation, we can divide the assigned trustworthiness values to objective and subjective parts. First, we create a mapping between the QDT definitions and the trustworthiness constructions. Then, we demonstrate that it is p...
Article
There has always been a steady interest in how humans make decisions amongst researchers from various fields. Based on this interest, many approaches such as rational choice theory or expected utility hypothesis have been proposed. Although these approaches provide a suitable ground for modeling the decision making process of humans, they are unabl...
Article
Observational determinism is a property that ensures the confidentiality in concurrent programs. It conveys that public variables are independent of private variables during the execution of programs, and the scheduling policy of threads. Different definitions for observational determinism have been proposed. On the other hand, observational determ...
Article
Web services are the realization of service-oriented architecture (SOA). Security is an important challenge of Web services. So far, several security techniques and standards based on traditional security mechanisms (i.e., encryption and digital signature) have been proposed to enhance the security of Web services. The aim of this work has been to...
Article
In this paper, we attempt to mathematically formulate a susceptible-exposed-infectious-recovered-susceptible (SEIRS) epidemic model to study dynamical behaviors of malware propagation in scale-free networks (SFNs). In the proposed discrete-time epidemic model, we consider defense mechanism of software diversity to limit epidemic spreading in SFNs....
Article
In this paper, we propose a susceptible-exposed-infected-recovered-susceptible (SEIRS) epidemic model in scale-free networks (SFNs). The aim has been to model the impact of software diversity and a defense mechanism to reduce malware propagation in SFNs. The dynamics of network topology was considered during the propagation process. During the malw...
Article
Quantitative evaluation of security has always been one of the challenges in the field of computer security. The integration of computing and communication technologies with physical components, has introduced a variety of new security risks, which threaten cyber-physical components. It is possible that an attacker damage a physical component with...
Article
Recently, bridging the gap between Petri net-based formalisms and automaton-based models has attracted a lot of attention. The aim is to associate the modelling capacities of Petri net-based formalisms with the expressive and analysis power of automaton-based models. Multisingular hybrid Petri net (MSHPN) is an extension of hybrid Petri nets enrich...
Article
In this paper, we use a combination of fuzzy analytic hierarchy process and fuzzy VIKOR approaches from the domain of multi-criteria decision making to formulate trust. The VIKOR method was originally developed to solve decision problems with conflicting and non-commensurable criteria. The VIKOR method assumes that compromise is acceptable for conf...
Article
In this paper, we propose a new approach for quantitative security analysis of computer systems. We intend to derive a metric of how much private information about a computer system can be disclosed to attackers. In fact, we want to introduce a methodology in order to be able to quantify our intuitive interpretation of how attackers act and how muc...
Article
Trust models have widespread applications in different areas. In this paper, we formulate trust as a multi-criteria decision-making (MCDM) problem. By applying this new formulation, one can treat the process of trust establishment as a decision-making process based on some set of trustworthiness criteria. By looking at trust as a whole, we may miss...
Article
Trust models play an important role in computational environments. One of the main aims of the work undertaken in this domain is to provide a model that can better describe the socio-technical nature of computational trust. It has been recently shown that quantum-like formulations in the field of human decision making can better explain the underly...
Article
So far, several techniques have been proposed for privacy preserving clustering (PPC). Most of the existing techniques have been designed based on heuristic notions without provable privacy guarantees. epsilon-differential privacy is a strong notion of privacy, which guarantees provable privacy. However, low degree of utility is the key issue of �-...
Article
In this paper, we investigate some important aspects of a new formalism for modelling and verification of hybrid dynamic systems HDS, which is called multisingular hybrid Petri nets MSHPNs. This new hybrid formalism is aimed to bridge the gap between hybrid automata HA and hybrid Petri nets HPNs by equipping the HPN model with the capabilities of H...
Article
The aim of this work is to propose a framework for the distributed simulation of cyber attacks based on high-level architecture (HLA), which is a commonly used standard for distributed simulations. The proposed framework and the corresponding simulator, which is called the distributed cyber attack simulator (abbreviated by DCAS), help administrator...
Article
Full-text available
An appropriate model of attacker behaviour is a key requirement for quantitative security evaluation. Motivated by the fact that attacker behaviour is affected by some social factors such as monetary costs and benefits rather than merely the technical aspects of the target system, we proposed an attack modelling approach based on a hierarchical and...
Article
Having high accuracy results in data clustering and preserving the privacy of data are among the main challenges in privacy preserving clustering (PPC) techniques. High dimensionality of data is another challenge in PPC, which reduces the efficiency of the data mining algorithms. Therefore, PPC algorithms are divided into two categories. The algori...
Article
Full-text available
The main disadvantage of Model Checking is the state-explosion problem, which can occur if the system under verification has many processes or complex data structures. Although the state-explosion problem is inevitable in worst case, over the past 2 decades considerable progress has been made on the problem for certain classes of state-transition s...
Article
In this paper, we propose a new technique to improve the efficiency of control-flow checking for detecting soft-errors in embedded software. The novelties of the proposed technique are as follows: (1) the frequency of used variables and the frequency of the execution of basic blocks are used as two parameters for selecting important variables and b...
Article
Discrete-event systems have gained a lot of interest due to their wide range of applications, and discrete-event simulation is a useful method for the performance evaluation of such systems. In this domain, model-based evaluation methods play an important role and there are many formalisms and realistic experiments using these methods. In this pape...
Article
The propagation of topology-aware peer-to-peer (P2P) worms in the Internet is a serious threat due to their ability to evade traditional detection mechanisms by means of avoiding revealing any abnormal behavior. Recent increase in the popularity and the usage of P2P systems and applications is exponentially increasing the risk of this threat. The e...
Article
Rare events are an important limitation of discrete-event simulation in some areas of applications. The existing rare-event simulation (RES) techniques, such as importance sampling (IS), splitting and RESTART, have been used for rare-event simulation so far. However, these techniques not only have some limitations, but also are not general and easy...
Article
Stochastic activity networks (SANs) are a well-known petri net-based formalism used for the performance and dependability modeling of a wide range of systems. On the other hand, the growing complexity of timed systems makes it imperative to apply formal analysis techniques in the early stages of the system's development. Finding a suitable framewor...
Article
As the use of web services is growing, there is an increasing demand for dependability of these services in business-critical applications. In this paper we introduce various proposals for dependable web services. The existing solutions are divided into two categories: fault tolerance techniques, such as active and passive replications, and the use...
Article
Full-text available
Test case prioritization reorders test cases from a previous version of a software system for the current release to optimize regression testing. We have previously introduced a technique for test case prioritization using historical test case performance data. The technique was based on a test case prioritization equation, which directly computes...
Article
The aim of this research has been to associate the modeling capacities of hybrid Petri nets with the analysis power of hybrid automata in order to perform formal verification of hybrid dynamic systems. In this paper, we propose an extension of hybrid Petri nets, called multisingular hybrid Petri nets (MSHPNs), for modeling and verification of hybri...
Article
In recent years, the need for high-performance network monitoring tools, which can cope with rapidly increasing network bandwidth, has become vital. A possible solution is to utilize the processing power of multi-core processors that nowadays are available as commercial-off-the-shelf (COTS) hardware. In this paper, we introduce a software solution...
Conference Paper
The scanning method of computer worms is an important modeling parameter. Active worms use different methods to scan the network for selecting their victim hosts. Topology-aware active worms scan the network by using the information of the network topology. This property, makes P2P network a suitable place for propagation of this kind of worms. Reg...
Conference Paper
Today, the propagation of active worms in peer-to-peer (P2P) networks is a very serious issue. Therefore, studying the propagation behavior of active worms and modeling their proliferation is quite useful to employ an effective and low-cost defense strategy to reduce the rate of their propagation. The topology-aware worms use the information relate...
Article
In recent years, data mining has raised some issues related to the privacy of individuals. Due to these issues, data owners abstain to share their sensitive information with data miners. Thus, privacy preserving data mining (PPDM) techniques have been introduced. One of these techniques is for data hiding purpose, which depending on the type of pri...
Conference Paper
Full-text available
The role of critical concurrent systems is increasing in today ICT systems. Formal modeling techniques and tools provide adequate and comprehensive solutions for verification of these systems. High-level modeling formalisms support system designers to express systems in an abstract manner, using multiple formalisms to model various aspects of compl...
Article
Despite the benefits of data mining in a wide range of applications, this technique has raised some issues related to the privacy and security of individuals. Due to these issues, data owners may prevent to share their sensitive information with data miners. On the other hand, in distributed environments, other issues related to the distribution of...
Article
Game theoretical methods offer new insights into quantitative evaluation of dependability and security. Currently, there is a wide range of useful game theoretic approaches to model the behaviour of intelligent agents. However, it is necessary to revise these approaches if there is a community of hackers with significant diversity in their behaviou...
Conference Paper
One of the main concerns in today electronic technologies is how to ensure the security of these systems. Security protocols have a significant role in maintaining security in computer and communication systems. Therefore, these protocols need to be designed and developed based on rigorous engineering methodologies. Formal methods are among the mos...
Article
Full-text available
The computational grid is a new technology aimed to facilitate resource sharing and wide area collaborations. Task scheduling is an important aspect in the grid environment to obtain a desired quality of service (QoS). In grid environments, the resource management system (RMS) is responsible for the scheduling and execution of tasks. The RMS divide...
Conference Paper
Coloured stochastic activity networks (CSANs) are a useful formalism for modeling and analysis of computer systems and networks. PDETool is a new powerful modeling tool that supports CSANs. This paper is an attempt to propose a new approach for modeling and automatic verification of security protocols using CSANs and PDETool. In the proposed approa...
Conference Paper
A large number of enterprises are turning to service-oriented architecture (SOA) for designing, using and managing their information technology (IT) systems. SOAP-based web services are the most commonly found services in today's SOA implementations. This paper reviews different possible classes of vulnerabilities in web services and investigates t...
Conference Paper
As the use of web services is growing, there is an increasing demand for dependability. In this paper we intend to introduce various offered solutions for dependable web services. The existing solutions are divided into two categories: fault tolerance techniques, such as active and passive replications, and the use of design diversity. The main con...
Conference Paper
The explosion in the use of information technology and widespread use of the Internet makes the countries to utilize the information and communication technologies in order to get their inevitable benefits. Some of these benefits are: accuracy, speed, cost saving and etc. Election and voting is one of the cases, which is recently tended to be perfo...
Conference Paper
Constraints are an important topic in any access control mechanism. Always, there are demands for defining new constraints or generalizing the existing ones in order to better managing and controlling organizations and specifying new policies. Among access control models, role-based access control (RBAC) is very useful and is continuously under dev...
Conference Paper
One of the drawbacks of the existing majority voters, which are widely used in N-version programming (NVP) technique, is the high probability of agreement on incorrect results generated by variants. Therefore, to propose an intrusion-tolerant software architecture based on NVP for hostile environments and to consider possible attacks, a new voting...
Article
Full-text available
The aim has been to propose a fraud detection system with capabilities of minimizing false alarms. In this paper we introduce a technique, which uses a hybrid fraud scoring and spike detection technique in streaming data over time and space. The technique itself differentiates normal, fraud and anomalous links, and increases the suspicion of fraud...
Conference Paper
Security is the main concern and a challenging problem of Web services. In the recent years, XML-sensitive security appliances, such as XML firewalls or Web service firewalls, have been introduced to protect services. However, attackers can still compromise web services and do their malicious actions. Intrusion detection systems (IDS) are appropria...
Article
Risk estimation is a necessary step in risk management which is the measurement of impact caused by the probability of exploiting vulnerabilities recognized in the system. At the moment, the qualitative metrics are used for this purpose that is believed to suffer subjectivity. The risk caused by a recognized vulnerability is computed using the valu...
Conference Paper
The most serious problem in the area of quantitative security evaluation is modeling of hacker's behavior. Because of the intelligent and complicated mental aspects of hackers, there are many challenges to model their behavior. Recently, there have been some efforts to use game theory for predicting hacker's behavior. However, it is necessary to re...
Article
Full-text available
Among access control models, Role-Based Access Control (RBAC) is very useful and is used in many computer systems. Static Combination of Duty (SCD) and Dynamic Combination of Duty (DCD) constraints have been introduced recently for this model to handle dependent roles. These roles must be used together and can be considered as a contrary point of c...
Conference Paper
The existing workflow modeling languages have some limitations and drawbacks. The aim is to introduce a new workflow modeling language based on stochastic activity networks (SANs). SANs are a powerful extension of Petri nets, which have been used in a wide range of applications. SAN-based workflow modeling language (SWML) has some high-level modeli...