Background
Behrooz Torkladani, Ph.D.

Behrooz Torkladani, Ph.D. ,

Professor

Department Of Software Engineering
Faculty Of Computer Engineering

Address

University of Isfahan Azadi square Isfahan, Iran
Postal Code : 8174673441


2009

2025

Research activities per year
Research Output
76

All

76

Article

filter by:

Articles
2019

Amini, N., Nasr isfahani, A., Zamani, B.E., Torkladani, B.
مدیریت و برنامه ریزی در نظام های آموزشی (24235261)(2)pp. 99-126
2025

Shirmohammadi, N., Torkladani, B.
The Isc International Journal Of Information Security (20082045)17(1)pp. 59-73
2024

A comprehensive framework for inter-app ICC security analysis of Android apps

( Article . )

Nirumand, A., Zamani, B., Torkladani, B.
Automated Software Engineering (09288910)31(2)

A Social Network Model for Analysis of Public Opinion Formation Process

( Article . )

Rabiee, H., Torkladani, B., Sahafizadeh, E.
IEEE Transactions on Computational Social Systems (2329924X)11(6)pp. 7698-7710
2023

A Machine Learning Approach for Detecting and Categorizing Sensitive Methods in Android Malware

( Article . )

Hasan, H., Deeb, H., Torkladani, B.
ISeCure (20083076)15(1)pp. 59-71

A model-based framework for inter-app Vulnerability analysis of Android applications

( Article . Green Published )

Nirumand, A., Zamani, B., Torkladani, B., Klein, J., Bissyandé, T.F.
SOFTWARE-PRACTICE & EXPERIENCE (00380644)53(4)pp. 895-936

Maaker: A framework for detecting and defeating evasion techniques in Android malware

( Article . )

Hasan, H., Torkladani, B., Zamani, B.
Journal of Information Security and Applications (22142126)78

Privacy, reputation, and incentive provision for vehicular social networks

( Article . )

Zamani, S., Torkladani, B., Ashouri, M.
Journal of Reliable Intelligent Environments (21994668)9(4)pp. 447-461

Privacy, trust, and secure rewarding in mobile crowd-sensing based spectrum monitoring

( Article . )

Hajian, G., Shahgholi, B., Asadi vasfi, M., Torkladani, B.
Journal of Ambient Intelligence and Humanized Computing (18685145)14(1)pp. 655-675

Soft rumor control in mobile instant messengers

( Article . )

Sahafizadeh, E., Torkladani, B.
Physica A: Statistical Mechanics and its Applications (03784371)609
2022

A Model-Based Approach for Representing Data Sharing Mechanism in Android Applications

( Article . )

Nirumand, A., Zamani, B., Torkladani, B.
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025

Adaptive cost-sensitive stance classification model for rumor detection in social networks

( Article . Bronze • Green )

Zojaji, Z., Torkladani, B.
Social Network Analysis and Mining (18695450)12(1)

Efficient Secure Pattern Matching with Malicious Adversaries

( Article . )

Zarezadeh, M., Mala, H., Torkladani, B.
IEEE Transactions on Dependable and Secure Computing (15455971)19(2)pp. 1407-1419

SANT: Static Analysis of Native Threads for Security Vetting of Android Applications

( Article . )

Andarzian, S.B., Torkladani, B.
The Isc International Journal Of Information Security (20082045)14(1)pp. 13-25

Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System

( Article . )

Sayyadabdi, A., Torkladani, B., Zamani, B.
The Isc International Journal Of Information Security (20082045)14(3 Special Issue)pp. 61-69
2021

A machine learning approach for detecting and categorizing evasion sources in Android malware

( Article . )

Deeb, H., Hasan, H., Torkladani, B., Zamani, B.
pp. 28-34

Automatic Generation of XACML Code using Model-Driven Approach

( Article . )

Fatemian, A., Zamani, B., Masoumi, M., Kamranpour, M., Torkladani, B., Rahimi, S.K.
pp. 206-211

Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware

( Article . )

Hasan, H., Torkladani, B., Zamani, B.
The Isc International Journal Of Information Security (20082045)13(2)pp. 131-143

MEGDroid: A model-driven event generation framework for dynamic android malware analysis

( Article . )

Hasan, H., Torkladani, B., Zamani, B.
Information and Software Technology (09505849)135

Soft rumor control in social networks: Modeling and analysis

( Article . )

Askarizadeh, M., Torkladani, B.
Engineering Applications of Artificial Intelligence (09521976)100
2020

A Model for Social Communication Network in Mobile Instant Messaging Systems

( Article . )

Sahafizadeh, E., Torkladani, B.
IEEE Transactions on Computational Social Systems (2329924X)7(1)pp. 68-83

Alerts correlation and causal analysis for apt based cyber attack detection

( Article . Gold )

Khosravi, M., Torkladani, B.
IEEE Access (21693536)8pp. 162642-162656

Compositional Taint Analysis of Native Codes for Security Vetting of Android Applications

( Article . )

Andarzian, S.B., Torkladani, B.
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025pp. 567-572

Enhancing Monkey to trigger malicious payloads in Android malware

( Article . )

Hasan, H., Torkladani, B., Zamani, B.
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025pp. 65-72

Interdependency Analysis in Security Investment against Strategic Attacks

( Article . )

Ezhei, M., Torkladani, B.
Information Systems Frontiers (15729419)22(1)pp. 187-201

Model checking of robustness properties in trust and reputation systems

( Article . )

Ghasempouri, S.A., Torkladani, B.
Future Generation Computer Systems (0167739X)108pp. 302-319

Secure parameterized pattern matching

( Article . )

Zarezadeh, M., Mala, H., Torkladani, B.
Information Sciences (00200255)522pp. 299-316
2019

An Efficient Privacy-Preserving Data Aggregation Scheme in Smart Grid

( Article . )

Karampour, A., Ashouri, M., Torkladani, B.
pp. 1967-1971

An evolutionary game model for analysis of rumor propagation and control in social networks

( Article . )

Askarizadeh, M., Torkladani, B., Manshaei, M.H.
Physica A: Statistical Mechanics and its Applications (03784371)523pp. 21-39

Interdependent Security Game Design over Constrained Linear Influence Networks

( Article . )

Hasheminasab, S.A., Torkladani, B., Alpcan, T.
The Isc International Journal Of Information Security (20082045)11(2)pp. 95-111

Modeling trust and reputation systems in hostile environments

( Article . )

Ghasempouri, S.A., Torkladani, B.
Future Generation Computer Systems (0167739X)99pp. 571-592

VAnDroid: A framework for vulnerability analysis of Android applications using a model-driven reverse engineering technique

( Article . Hybrid Gold )

Nirumand, A., Zamani, B., Torkladani, B.
Software - Practice and Experience (1097024X)49(1)pp. 70-99
2018

Security Investment in Contagious Networks

( Article . )

Hasheminasab, S.A., Torkladani, B.
Risk Analysis (15396924)38(8)pp. 1559-1575

The impact of group propagation on rumor spreading in mobile social networks

( Article . )

Sahafizadeh, E., Torkladani, B.
Physica A: Statistical Mechanics and its Applications (03784371)506pp. 412-423
2017

A Formal Model for Security Analysis of Trust and Reputation systems

( Article . )

Ghasempouri, S.A., Torkladani, B.
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025pp. 13-18

Information sharing vs. privacy: A game theoretic analysis

( Article . )

Ezhei, M., Torkladani, B.
Expert Systems with Applications (09574174)88pp. 327-337
2016

Automated program repair using genetic programming and model checking

( Article . )

Zojaji, Z., Torkladani, B., Khalilian, A.
Applied Intelligence (0924669X)45(4)pp. 1066-1088

Benchmarking reputation systems: A quantitative verification approach

( Article . )

Bidgoly, A.J., Torkladani, B.
Computers in Human Behavior (07475632)57pp. 274-291

Modeling and quantitative verification of trust systems against malicious attackers

( Article . )

Bidgoly, A.J., Torkladani, B.
Computer Journal (14602067)59(7)pp. 1005-1027
2015

A MapReduce-based algorithm for parallelizing collusion detection in Hadoop

( Article . )

Mortazavi, M., Torkladani, B.
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025

Cryptanalysis and strengthening of SRP+ protocol

( Article . )

Moradi, F., Mala, H., Torkladani, B.
pp. 91-97

Gossip-based data aggregation in hostile environments

( Article . )

Mousazadeh, M., Torkladani, B.
Computer Communications (1873703X)62pp. 1-12

Security Analysis and Strengthening of an RFID Lightweight Authentication Protocol Suitable for VANETs

( Article . )

Moradi, F., Mala, H., Torkladani, B.
Wireless Personal Communications (1572834X)83(4)pp. 2607-2621

Towards automatic generation of formal specifications for UML consistency verification

( Article . )

Sherbaf, M.R., Zamani, B., Torkladani, B.
pp. 860-865
2014

DDoS attack detection in IEEE 802.16 based networks

( Article . )

Shojaei, M., Movahhedinia, N., Torkladani, B.
Wireless Networks (10220038)20(8)pp. 2543-2559

DoS and port scan attack detection in high speed networks

( Article . )

Hasanifard, M., Torkladani, B.
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025pp. 61-66

Modelling and Quantitative Verification of Reputation Systems Against Malicious Attackers

( Article . )

Bidgoly, A.J., Torkladani, B.
Computer Journal (14602067)58(10)pp. 2567-2582

Randomized gossip algorithms under attack

( Article . )

Mousazadeh, M., Torkladani, B.
International Journal Of Information Security (16155270)13(4)pp. 391-402
2013

A collaborative filtering recommender system based on user's time pattern activity

( Article . )

Adibi, P., Torkladani, B.
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025pp. 252-257

Quantitative verification of beta reputation system using PRISM probabilistic model checker

( Article . )

Bidgoly, A.J., Torkladani, B.
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025
2011

A Context-Aware Reputation-Based Model of Trust for Open Multi-agent Environments

( Article . )

Mokhtari, E., Noorian, Z., Torkladani, B., Nematbakhsh, M.A.
ADVANCES IN ARTIFICIAL INTELLIGENCE (03029743)6657pp. 301-312

AMLeT: Adaptive multi level trust framework for MANETs

( Article . )

Samavati, H., Torkladani, B., Moodi, H.
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025pp. 152-157

An entropy based approach for DDoS attack detection in IEEE 802.16 based networks

( Article . )

Shojaei, M., Movahhedinia, N., Torkladani, B.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (03029743)7038pp. 129-143

Trust modeling and verification using Colored Petri Nets

( Article . )

Bidgoly, A.J., Torkladani, B.
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025pp. 1-8
2010

A discrete particle swarm optimization approach for grid job scheduling

( Article )

Izakian, H., Torkladani, B., Abraham, A., Snášel, V.
International Journal of Innovative Computing, Information and Control (13494198)6(9)pp. 4219-4234

Adaptive similarity aggregation method for ontology matching

( Article . )

Keikha, M.M., Nematbakhsh, M.A., Torkladani, B.
pp. 391-396

An auction method for resource allocation in computational grids

( Article . )

Izakian, H., Abraham, A., Torkladani, B.
Future Generation Computer Systems (0167739X)26(2)pp. 228-235

Anonymity and security for autonomous mobile agents

( Article . )

Raji, F., Torkladani, B.
IET Information Security (17518709)4(4)pp. 397-410

Liveness verification in trss using tree automata and termination analysis

( Article )

Mousazadeh, M., Torkladani, B., Zantema, H.
Computing and Informatics (25858807)29(3)pp. 407-426

Toward a software development methodology for anonymity applications

( Article . )

Ispareh, M., Torkladani, B., Panahi, S.S., Azadani, Z.N.
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025

Traffic analysis for WiMAX network under DDoS attack

( Article . )

Shojaei, M., Movahhedinia, N., Torkladani, B.
2025 29th International Computer Conference, Computer Society of Iran, CSICC 20251pp. 279-283
2009

A conceptual framework for specification, analysis, and design of anonymity services

( Article . All Open Access; Green Open Access )

Ispareh, M., Torkladani, B.
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025pp. 131-138

A continuous double auction method for resource allocation in computational grids

( Article . )

Izakian, H., Torkladani, B., Zamanifar, K., Abraham, A., Snášel, V.
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025pp. 29-35

A novel algorithm for impulse noise classification in digital images

( Article )

Vahdat-nejad, H., Torkladani, B., Zamanifar, K., Nematbakhsh, N.
International Review on Computers and Software (discontinued) (18286003)4(6)pp. 627-632

A novel particle swarm optimization approach for grid job scheduling

( Article . )

Izakian, H., Torkladani, B., Zamanifar, K., Abraham, A.
Communications in Computer and Information Science (18650937)31pp. 100-109

CORMET: A context-aware ontological reputation model for evaluating trust in multi-agent systems

( Article )

Mokhtari, E., Torkladani, B., Nematbakhsh, M.A., Hosseini, H.H.
pp. 225-232
2008

A new approach for scoring relevant documents by applying a Farsi stemming method in Persian web search engines

( Article . )

Shahbazi, H., Mokhtaripour, A., Dalvi-esfahani, M., Torkladani, B.
Communications in Computer and Information Science (18650937)6pp. 745-748

Comparing negotiation strategies based on offers

( Article . )

Mashayekhy, L., Nematbakhsh, M.A., Torkladani, B.
Frontiers in Artificial Intelligence and Applications (09226389)177(1)pp. 87-98

Detecting similar negotiation strategies

( Article . )

Mashayekhy, L., Nematbakhsh, M.A., Torkladani, B.
Lecture Notes in Electrical Engineering (18761119)6pp. 297-307

Modeling and combining access control policies using Constrained Policy Graph (CPG)

( Article . Bronze )

Derakhshandeh z., , Torkladani, B., Nematbakhsh, N.
Journal of Applied Sciences (discontinued) (18125654)8(20)pp. 3561-3571
2007

A dynamic reconfigurable web service composition framework using reo coordination language

( Article . )

Saifipoor, S., Torkladani, B., Nematbakhsh, N.
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025pp. 203-212

Anonymous agent with anonymous itinerary

( Article . )

Raji, F., Torkladani, B., Brenjkoub, M.
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025pp. 534-537

Measuring of strategies' similarity in automated negotiation

( Article )

Mashayekhy, L., Nematbakhsh, M.A., Torkladani, B.
Lecture Notes in Engineering and Computer Science (20780958)pp. 859-863
2006

A formal model for coordination behavior of the organization in multi agent systems

( Article . )

Ghassemi, F., Bakhsh, N.N., Torkladani, B., Sirjani, M.
2025 29th International Computer Conference, Computer Society of Iran, CSICC 20252pp. 3028-3033

Specification and implementation of multi-agent organizations

( Article )

Ghassemi, F., Bakhsh, N.N., Torkladani, B., Sirjani, M.
(WIA/-)pp. 447-453
2005

Passive testing - A constrained invariant checking approach

( Article . )

Torkladani, B., Alcalde, B., Cavalli, A.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (03029743)3502pp. 9-22