An automatic attribute-based access control policy extraction from access logs L Karimi, M Aldairi, J Joshi, M Abdelhakim IEEE Transactions on Dependable and Secure Computing 19 (4), 2304-2317, 2021 | 65 | 2021 |
An unsupervised learning based approach for mining attribute based access control policies L Karimi, J Joshi 2018 IEEE International Conference on Big Data (Big Data), 1427-1436, 2018 | 49 | 2018 |
A Trust Aware Unsupervised Learning Approach for Insider Threat Detection M Aldairi, L Karimi, J Joshi 2019 IEEE 20th International Conference on Information Reuse and Integration …, 2019 | 33 | 2019 |
Adaptive abac policy learning: A reinforcement learning approach L Karimi, M Abdelhakim, J Joshi arXiv preprint arXiv:2105.08587, 2021 | 12 | 2021 |
A dynamic privacy aware access control model for location based services L Karimi, B Palanisamy, J Joshi 2016 IEEE 2nd International Conference on Collaboration and Internet …, 2016 | 7 | 2016 |
Multi-owner multi-stakeholder access control model for a healthcare environment L Karimi, J Joshi 2017 IEEE 3rd International Conference on Collaboration and Internet …, 2017 | 5 | 2017 |
Access control aware data retrieval for secret sharing based database outsourcing MA Hadavi, R Jalili, L Karimi Distributed and Parallel Databases 34, 505-534, 2016 | 4 | 2016 |
Missing a Trusted Reference Monitor: How to Enforce Confidential and Dynamic Access Policies? L Karimi, SA Javadi, MA Hadavi, R Jalili Computer Networks and Distributed Systems: International Symposium, CNDS …, 2014 | 1 | 2014 |
CODASPY 2017 Conference Organization OO Panagiotis Ilia Lei Jin, Leila Bahri, Leila Karimi, Lianshan Sun, Mike ... http://library.usc.edu.ph/ACM/SIGSAC%202017/codaspy/organization.pdf, 2017 | | 2017 |
IEEE CIC 2016 External Reviewers D Steiert, D Mcgeehan, S Guan, S Pouyanfar, L Jin, R Xu, L Karimi, C Li | | 2016 |