Background
دکتر بهروز ترک لادانی

دکتر بهروز ترک لادانی

استاد

گروه مهندسی نرم‌افزار
دانشکده مهندسی کامپیوتر

پست الکترونیکی

ladani@eng.ui.ac.ir

آدرس

دانشگاه اصفهان میدان آزادی اصفهان، ایران
کد پستی : 8174673441

برونداد‌های پژوهشی

76

همه موارد

76

مقالات

مرتب سازی بر اساس:

مقالات فارسی
۱۳۹۷
نرجس امینی، دکتر احمدرضا نصر اصفهانی، بی بی عشرت زمانی و بهروز ترک لادانی
مدیریت و برنامه ریزی در نظام های آموزشی (24235261)(2)pp. 99-126
مقالات لاتین
2025

Torkladani, B., Shirmohammadi N., Shirmohammadi N., Torkladani, B.
The Isc International Journal Of Information Security (20082045)17(1)pp. 59-73
2024

Nirumand, A., Zamani, B., Torkladani, B.
Automated Software Engineering (09288910)31(2)

A Social Network Model for Analysis of Public Opinion Formation Process

( Article . )

Rabiee, H., Torkladani, B., Sahafizadeh, E.
IEEE Transactions on Computational Social Systems (2329924X)11(6)pp. 7698-7710
2023

A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware

( Article . )

Hasan, Hayyan Salman, Sahafizadeh, Ebrahim, Hasan, H., Deeb, H., Torkladani, B.
ISeCure (20083076)15(1)pp. 59-71

A model-based framework for inter-app Vulnerability analysis of Android applications

( Article . Green Published )

Sharbaf, Mohammadreza, Sahafizadeh, Ebrahim, Nirumand, A., Zamani, B., Torkladani, B., Klein, J., Bissyandé, T.F.
SOFTWARE-PRACTICE & EXPERIENCE (00380644)53(4)pp. 895-936

Maaker: A framework for detecting and defeating evasion techniques in Android malware

( Article . )

Hasan, H., Torkladani, B., Zamani, B.
Journal of Information Security and Applications (22142126)78

Privacy, reputation, and incentive provision for vehicular social networks

( Article . )

Zamani, S., Torkladani, B., Ashouri, M.
Journal of Reliable Intelligent Environments (21994668)9(4)pp. 447-461

Privacy, trust, and secure rewarding in mobile crowd-sensing based spectrum monitoring

( Article . )

Hajian, G., Shahgholi, B., Asadi vasfi, M., Torkladani, B.
Journal of Ambient Intelligence and Humanized Computing (18685145)14(1)pp. 655-675

Soft rumor control in mobile instant messengers

( Article . )

Sahafizadeh, E., Torkladani, B.
Physica A: Statistical Mechanics and its Applications (03784371)609
2022

A Model-Based Approach for Representing Data Sharing Mechanism in Android Applications

( Article . )

Torkladani, B., Nirumand, A., Zamani, B., Nirumand, A., Zamani, B., Torkladani, B.
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025

Adaptive cost-sensitive stance classification model for rumor detection in social networks

( Article . Bronze • Green )

Zojaji, Z., Torkladani, B.
Social Network Analysis and Mining (18695450)12(1)

Efficient Secure Pattern Matching with Malicious Adversaries

( Article . )

Zarezadeh, M., Mala, H., Torkladani, B.
IEEE Transactions on Dependable and Secure Computing (15455971)19(2)pp. 1407-1419

SANT: Static Analysis of Native Threads for Security Vetting of Android Applications

( Article . )

Torkladani, B., Andarzian S.B., Andarzian S.B., Torkladani, B.
The Isc International Journal Of Information Security (20082045)14(1)pp. 13-25

Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System

( Article . )

Torkladani, B., Sayyadabdi A., Zamani, B., Sayyadabdi A., Torkladani, B., Zamani, B.
The Isc International Journal Of Information Security (20082045)14(3 Special Issue)pp. 61-69
2021

A machine learning approach for detecting and categorizing evasion sources in Android malware

( Article . )

Deeb, H., Hasan, H., Torkladani, B., Zamani, B.
pp. 28-34

Automatic Generation of XACML Code using Model-Driven Approach

( Article . )

Fatemian, A., Zamani, B., Masoumi, M., Kamranpour, M., Torkladani, B., Rahimi, S.K.
pp. 206-211

Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware

( Article . )

Torkladani, B., Hasan, H., Zamani, B., Hasan, H., Torkladani, B., Zamani, B.
The Isc International Journal Of Information Security (20082045)13(2)pp. 131-143

MEGDroid: A model-driven event generation framework for dynamic android malware analysis

( Article . )

Hasan, H., Torkladani, B., Zamani, B.
Information and Software Technology (09505849)135

Soft rumor control in social networks: Modeling and analysis

( Article . )

Askarizadeh, M., Torkladani, B.
Engineering Applications of Artificial Intelligence (09521976)100
2020

A Model for Social Communication Network in Mobile Instant Messaging Systems

( Article . )

Sahafizadeh, E., Torkladani, B.
IEEE Transactions on Computational Social Systems (2329924X)7(1)pp. 68-83

Alerts correlation and causal analysis for apt based cyber attack detection

( Article . Gold )

Khosravi, M., Torkladani, B.
IEEE Access (21693536)8pp. 162642-162656

Compositional Taint Analysis of Native Codes for Security Vetting of Android Applications

( Article . )

Torkladani, B., Andarzian S.B., Andarzian S.B., Torkladani, B.
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025pp. 567-572

Enhancing Monkey to trigger malicious payloads in Android malware

( Article . )

Torkladani, B., Hasan, H., Zamani, B., Hasan, H., Torkladani, B., Zamani, B.
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025pp. 65-72

Interdependency Analysis in Security Investment against Strategic Attacks

( Article . )

Ezhei, M., Torkladani, B.
Information Systems Frontiers (15729419)22(1)pp. 187-201

Model checking of robustness properties in trust and reputation systems

( Article . )

Ghasempouri, S.A., Torkladani, B.
Future Generation Computer Systems (0167739X)108pp. 302-319

Secure parameterized pattern matching

( Article . )

Zarezadeh, M., Mala, H., Torkladani, B.
Information Sciences (00200255)522pp. 299-316
2019

An Efficient Privacy-Preserving Data Aggregation Scheme in Smart Grid

( Article . )

Karampour, A., Ashouri, M., Torkladani, B.
pp. 1967-1971

An evolutionary game model for analysis of rumor propagation and control in social networks

( Article . )

Askarizadeh, M., Torkladani, B., Manshaei, M.H.
Physica A: Statistical Mechanics and its Applications (03784371)523pp. 21-39

Interdependent Security Game Design over Constrained Linear Influence Networks

( Article . )

Torkladani, B., Hasheminasab, S.A., Alpcan T., Hasheminasab, S.A., Torkladani, B., Alpcan T.
The Isc International Journal Of Information Security (20082045)11(2)pp. 95-111

Modeling trust and reputation systems in hostile environments

( Article . )

Ghasempouri, S.A., Torkladani, B.
Future Generation Computer Systems (0167739X)99pp. 571-592

VAnDroid: A framework for vulnerability analysis of Android applications using a model-driven reverse engineering technique

( Article . Hybrid Gold )

Nirumand, A., Zamani, B., Torkladani, B.
Software - Practice and Experience (1097024X)49(1)pp. 70-99
2018

Security Investment in Contagious Networks

( Article . )

Hasheminasab, S.A., Torkladani, B.
Risk Analysis (15396924)38(8)pp. 1559-1575

The impact of group propagation on rumor spreading in mobile social networks

( Article . )

Sahafizadeh, E., Torkladani, B.
Physica A: Statistical Mechanics and its Applications (03784371)506pp. 412-423
2017

A Formal Model for Security Analysis of Trust and Reputation systems

( Article . )

Torkladani, B., Ghasempouri, S.A., Ghasempouri, S.A., Torkladani, B.
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025pp. 13-18

Information sharing vs. privacy: A game theoretic analysis

( Article . )

Ezhei, M., Torkladani, B.
Expert Systems with Applications (09574174)88pp. 327-337
2016

Automated program repair using genetic programming and model checking

( Article . )

Zojaji, Z., Torkladani, B., Khalilian, A.
Applied Intelligence (0924669X)45(4)pp. 1066-1088

Benchmarking reputation systems: A quantitative verification approach

( Article . )

Bidgoly, A.J., Torkladani, B.
Computers in Human Behavior (07475632)57pp. 274-291

Modeling and quantitative verification of trust systems against malicious attackers

( Article . )

Bidgoly, A.J., Torkladani, B.
Computer Journal (14602067)59(7)pp. 1005-1027
2015

A MapReduce-based algorithm for parallelizing collusion detection in Hadoop

( Article . )

Torkladani, B., Mortazavi M., Mortazavi M., Torkladani, B.
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025

Cryptanalysis and strengthening of SRP+ protocol

( Article . )

Moradi, F., Mala, H., Torkladani, B.
pp. 91-97

Gossip-based data aggregation in hostile environments

( Article . )

Mousazadeh, M., Torkladani, B.
Computer Communications (1873703X)62pp. 1-12

Security Analysis and Strengthening of an RFID Lightweight Authentication Protocol Suitable for VANETs

( Article . )

Moradi, F., Mala, H., Torkladani, B.
Wireless Personal Communications (1572834X)83(4)pp. 2607-2621

Towards automatic generation of formal specifications for UML consistency verification

( Article . )

Sherbaf, M.R., Zamani, B., Torkladani, B.
pp. 860-865
2014

DDoS attack detection in IEEE 802.16 based networks

( Article . )

Shojaei, M., Movahhedinia, N., Torkladani, B.
Wireless Networks (10220038)20(8)pp. 2543-2559

DoS and port scan attack detection in high speed networks

( Article . )

Torkladani, B., Hasanifard M., Hasanifard M., Torkladani, B.
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025pp. 61-66

Modelling and Quantitative Verification of Reputation Systems Against Malicious Attackers

( Article . )

Bidgoly, A.J., Torkladani, B.
Computer Journal (14602067)58(10)pp. 2567-2582

Randomized gossip algorithms under attack

( Article . )

Mousazadeh, M., Torkladani, B.
International Journal Of Information Security (16155270)13(4)pp. 391-402
2013

A collaborative filtering recommender system based on user's time pattern activity

( Article . )

Torkladani, B., Adibi P., Adibi P., Torkladani, B.
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025pp. 252-257

Quantitative verification of beta reputation system using PRISM probabilistic model checker

( Article . )

Torkladani, B., Bidgoly, A.J., Bidgoly, A.J., Torkladani, B.
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025
2011

A Context-Aware Reputation-Based Model of Trust for Open Multi-agent Environments

( Article . )

Sahafizadeh, Ebrahim, Mokhtari, E., Noorian Z., Torkladani, B., Nematbakhsh, M.A.
ADVANCES IN ARTIFICIAL INTELLIGENCE (03029743)6657pp. 301-312

AMLeT: Adaptive multi level trust framework for MANETs

( Article . )

Torkladani, B., Samavati H., Moodi H., Samavati H., Torkladani, B., Moodi H.
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025pp. 152-157

An entropy based approach for DDoS attack detection in IEEE 802.16 based networks

( Article . )

Shojaei, M., Movahhedinia, N., Torkladani, B.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (03029743)7038pp. 129-143

Trust modeling and verification using Colored Petri Nets

( Article . )

Torkladani, B., Bidgoly, A.J., Bidgoly, A.J., Torkladani, B.
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025pp. 1-8
2010

A discrete particle swarm optimization approach for grid job scheduling

( Article )

Izakian, H., Torkladani, B., Abraham, A., Snášel, V.
International Journal of Innovative Computing, Information and Control (13494198)6(9)pp. 4219-4234

Adaptive similarity aggregation method for ontology matching

( Article . )

Keikha, M.M., Nematbakhsh, M.A., Torkladani, B.
pp. 391-396

An auction method for resource allocation in computational grids

( Article . )

Izakian, H., Abraham, A., Torkladani, B.
Future Generation Computer Systems (0167739X)26(2)pp. 228-235

Anonymity and security for autonomous mobile agents

( Article . )

Raji, F., Torkladani, B.
IET Information Security (17518709)4(4)pp. 397-410

Liveness verification in trss using tree automata and termination analysis

( Article )

Mousazadeh, M., Torkladani, B., Zantema, H.
Computing and Informatics (25858807)29(3)pp. 407-426

Toward a software development methodology for anonymity applications

( Article . )

Torkladani, B., Ispareh M., Panahi S.S., Azadani Z.N., Ispareh M., Torkladani, B., Panahi S.S., Azadani Z.N.
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025

Traffic analysis for WiMAX network under DDoS attack

( Article . )

Torkladani, B., Shojaei, M., Movahhedinia, N., Shojaei, M., Movahhedinia, N., Torkladani, B.
2025 29th International Computer Conference, Computer Society of Iran, CSICC 20251pp. 279-283
2009

A conceptual framework for specification, analysis, and design of anonymity services

( Article . All Open Access; Green Open Access )

Torkladani, B., Ispareh M., Ispareh M., Torkladani, B.
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025pp. 131-138

A continuous double auction method for resource allocation in computational grids

( Article . )

Torkladani, B., Izakian, H., Zamanifar, K., Abraham, A., Snášel, V., Izakian, H., Torkladani, B., Zamanifar, K., Abraham, A., Snášel, V.
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025pp. 29-35

A novel algorithm for impulse noise classification in digital images

( Article )

Vahdat-nejad, H., Torkladani, B., Zamanifar, K., Nematbakhsh, N.
International Review on Computers and Software (discontinued) (18286003)4(6)pp. 627-632

A novel particle swarm optimization approach for grid job scheduling

( Article . )

Izakian, H., Torkladani, B., Zamanifar, K., Abraham, A.
Communications in Computer and Information Science (18650937)31pp. 100-109

CORMET: A context-aware ontological reputation model for evaluating trust in multi-agent systems

( Article )

Mokhtari, E., Torkladani, B., Nematbakhsh, M.A., Hosseini, H.H.
pp. 225-232
2008

A new approach for scoring relevant documents by applying a Farsi stemming method in Persian web search engines

( Article . )

Shahbazi, H., Mokhtaripour, A., Dalvi-esfahani, M., Torkladani, B.
Communications in Computer and Information Science (18650937)6pp. 745-748

Comparing negotiation strategies based on offers

( Article . )

Mashayekhy, L., Nematbakhsh, M.A., Torkladani, B.
Frontiers in Artificial Intelligence and Applications (09226389)177(1)pp. 87-98

Detecting similar negotiation strategies

( Article . )

Mashayekhy, L., Nematbakhsh, M.A., Torkladani, B.
Lecture Notes in Electrical Engineering (18761119)6pp. 297-307

Modeling and combining access control policies using Constrained Policy Graph (CPG)

( Article . Bronze )

Derakhshandeh z., , Torkladani, B., Nematbakhsh, N.
Journal of Applied Sciences (discontinued) (18125654)8(20)pp. 3561-3571
2007

A dynamic reconfigurable web service composition framework using reo coordination language

( Article . )

Torkladani, B., Saifipoor S., Nematbakhsh, N., Saifipoor S., Torkladani, B., Nematbakhsh, N.
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025pp. 203-212

Anonymous agent with anonymous itinerary

( Article . )

Torkladani, B., Raji, F., Brenjkoub, M., Raji, F., Torkladani, B., Brenjkoub, M.
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025pp. 534-537

Measuring of strategies' similarity in automated negotiation

( Article )

Mashayekhy, L., Nematbakhsh, M.A., Torkladani, B.
Lecture Notes in Engineering and Computer Science (20780958)pp. 859-863
2006

A formal model for coordination behavior of the organization in multi agent systems

( Article . )

Torkladani, B., Ghassemi, F., Bakhsh, N.N., Sirjani, M., Ghassemi, F., Bakhsh, N.N., Torkladani, B., Sirjani, M.
2025 29th International Computer Conference, Computer Society of Iran, CSICC 20252pp. 3028-3033

Specification and implementation of multi-agent organizations

( Article )

Ghassemi, F., Bakhsh, N.N., Torkladani, B., Sirjani, M.
(WIA/-)pp. 447-453
2005

Passive testing - A constrained invariant checking approach

( Article . )

Torkladani, B., Alcalde, B., Cavalli, A.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (03029743)3502pp. 9-22