Systematic literature review on the state of the art and future research work in anonymous communications systems

MA Nia, A Ruiz-Martinez - Computers & electrical engineering, 2018 - Elsevier
Privacy is an important research topic due to its implications in society. Among the topics
covered by privacy, we can highlight how to establish anonymous communications. During …

Detecting new generations of threats using attribute‐based attack graphs

MA Nia, B Bahrak, M Kargahi… - IET Information Security, 2019 - Wiley Online Library
In recent years, the increase in cyber threats has raised many concerns about security and
privacy in the digital world. However, new attack methods are often limited to a few core …

Deciding your own anonymity: user-oriented node selection in I2P

L Ye, X Yu, J Zhao, D Zhan, X Du, M Guizani - IEEE Access, 2018 - ieeexplore.ieee.org
With the development of Internet applications, anonymous communication technology plays
a very significant role in protecting personal privacy. As one of the most popular anonymous …

On detecting unidentified network traffic using pattern‐based random walk

MA Nia, RE Atani, B Fabian… - Security and …, 2016 - Wiley Online Library
This paper presents a new approach to network traffic control based on the pattern theorem.
In order to generate unique detection patterns for the process of traffic analysis, a self …

An Introduction to Adaptive Software Security

MA Nia - arXiv preprint arXiv:2312.17358, 2023 - arxiv.org
This paper presents the adaptive software security model, an innovative approach
integrating the MAPE-K loop and the Software Development Life Cycle (SDLC). It proactively …

Analytical survey of existing research on anonymous communication technologies and directions for further study

MA Nia, A Ruiz-Martínez - International Journal of …, 2022 - search.proquest.com
Privacy is an important research topic due to its implications in society. Among the topics
covered by privacy, we can highlight how to establish anonymous communications. Dur-ing …

Towards a privacy web scanner for end-users

M Massardier-Meca, A Ruiz-Martínez - International Symposium on …, 2019 - Springer
Internet users progressively have realized that due to our online activities our privacy can be
compromised and that much personal information can be gathered. To cope with this …

A software solution for realtime malware detection in distributed systems

MA Nia, SK Kiaei, RE Atani… - 2015 12th International …, 2015 - ieeexplore.ieee.org
In the recent years, threats of malwares have been increasing. The violation of privacy and
confidentiality in large networks and distributed systems is the main target for these …

An analytical perspective to traffic engineering in anonymous communication systems

MA Nia, E Babulak, B Fabian, RE Atani - arXiv preprint arXiv:1712.07601, 2017 - arxiv.org
Anonymous communication systems (ACS) offer privacy and anonymity through the Internet.
They are mostly free tools and are popular among users all over the world. In the recent …

A Novel Asymmetric Searchable Encryption Scheme with Granting search capability

A Arabnouri, RE Atani, S Azizzadeh - Cryptology ePrint Archive, 2020 - eprint.iacr.org
Nowadays, information is known as the main asset of each organization, which causes data
generation to be exponentially increasing. Hence, different capacity issues and …