Publications by year

2018
  • Privacy-preserving Machine Learning as a Service.
    Proceedings on Privacy Enhancing Technologies
    Ehsan Hesamifard, Hassan Takabi, Mehdi Ghasemi, and Rebecca N. Wright . 2018 . [Bibtex] . [PDF]
  • A Deep Learning Approach for Extracting Attributes of ABAC Policies
    Conference Proceedings of the 23rd ACM on Symposium on Access Control Models and Technologies Publisher, ACM.
    Manar Alohaly, Hassan Takabi, and Eduardo Blanco . 2018 . [Bibtex] . [PDF]
  • Automatic Extraction of Access Control Policies from Natural Language Documents
    IEEE Transactions on Dependable and Secure Computing
    Masoud Narouei, Hassan Takabi, and Rodney Nielsen . 2018 . [Bibtex] . [PDF]
  • Prediction of human error using eye movements patterns for unintentional insider threat detection.
    IEEE 4th International Conference on Identity, Security, and Behavior Analysis.
    Hassan Takabi, Yassir Hashem, and Ram Dantu. . 2018 . [Bibtex] . [PDF]
  • Multi-Objective Response to Co-Resident Attacks in Cloud Environment
    International Journal of Information & Communication Technology Research.
    Farzaneh Abazari, Morteza Analoui, and Hassan Takabi. . 2018 . [Bibtex] . [PDF]
2017
  • Privacy-preserving Edit Distance on Genomic Data.
    arXiv preprint arXiv:1711.06234.
    Parisa Kaghazgaran, and Hassan Takabi. . 2017 . [Bibtex] . [PDF]
  • Towards a Top-down Policy Engineering Framework for Attribute-based Access Control
    22nd ACM on Symposium on Access Control Models and Technologies
    Masoud Narouei, Hamed Khanpour, Hassan Takabi, Natalie Parde, and Rodney Nielsen . 2017 . [Bibtex] . [PDF]
  • Identification of access control policy sentences from natural language policy documents
    Artificial Intelligence and Lecture Notes in Bioinformatics
    Masoud Narouei, Hamed Khanpour, and Hassan Takabi . 2017 . [Bibtex] . [PDF]
  • A multi-modal neuro-physiological study of malicious insider threats
    International Workshop on Managing Insider Security Threats
    Yassir Hashem, Hassan Takabi, Ram Dantu, and Rodey Nielsen . 2017 . [Bibtex] . [PDF]
  • Insider threat mitigation using moving target defense and deception
    International Workshop on Managing Insider Security Threats
    Hassan Takabi and J. Haadi Jafarian . 2017 . [Bibtex] . [PDF]
  • When do changes induce software vulnerabilities?
    3rd IEEE International Conference on Collaboration and Internet Computing
    Manar Alohaly and Hassan Takabi. . 2017 . [Bibtex] . [PDF]
  • Insider Threat Detection Based on Users' Mouse Movements and Keystrokes Behavior.
    Conference Secure Knowledge Management Conference.
    Yassir Hashem, Hassan Takabi, and Ram Dantu. . 2017 . [Bibtex] . [PDF]
  • Privacy-preserving Machine Learning in Cloud.
    Proceedings of the 2017 on Cloud Computing Security Workshop
    Ehsan Hesamifard, Hassan Takabi, Mehdi Ghasemi, and Catherine Jones. . 2017 . [Bibtex] . [PDF]
  • CryptoDL: Deep Neural Networks over Encrypted Data.
    arXiv preprint.
    Ehsan Hesamifard, Hassan Takabi, and Mehdi Ghasemi. . 2017 . [Bibtex] . [PDF]
  • Using EEG Signal to Analyze IS Decision Making Cognitive Processes
    Information Systems and Neuroscience
    Nabila Salma, Bin Mai, Kamesh Namuduri, Rasel Mamun, Yassir Hashem, Hassan Takabi, Natalie Parde, and Rodney Nielsen . 2017 . [Bibtex] . [PDF]
2016
  • CryptoDL: Towards Deep Learning over Encrypted Data
    Annual Computer Security Applications Conference
    Ehsan Hesamifard, Hassan Takabi, and Mehdi Ghasemi . 2016 . [Bibtex] . [PDF]
  • Inside the Mind of the Insider: Towards Insider Threat Detection Using Psychophysiological Signals
    Journal of Internet Services and Information Security
    Yassir Hashem, Hassan Takabi, Mohammad Ghasemigol, and Ram Dantu . 2016 . [Bibtex] . [PDF]
  • A comprehensive approach for network attack forecasting
    Computers & Security.
    Mohammad GhasemiGol, Abbas Ghaemi Bafghi, and Hassan Takabi . 2016 . [Bibtex] . [PDF]
  • Better privacy indicators: A new approach to quantification of privacy policies
    Workshop on Privacy Indicators.
    Manar Alohaly and Hassan Takabi . 2016 . [Bibtex] . [PDF]
  • Top manager’s perspectives on cyberinsurance risk management for reducing cybersecurity risks.
    22nd Americas Conference on Information Systems
    Obi Ogbanufe, Dan Kim, and Hassan Takabi. . 2016 . [Bibtex] . [PDF]
  • A foresight model for intrusion response management.
    Computers & Security.
    Mohammad GhasemiGol, Hassan Takabi, and Abbas Ghaemi Bafghi. . 2016 . [Bibtex] . [PDF]
  • Effectiveness of Using Card Games to Teach Threat Modeling for Secure Web Application Developments Issues in Information Systems.
    Issues in Information Systems.
    Thompson, Mark, and Hassan Takabi. . 2016 . [Bibtex] . [PDF]
  • Firewall for brain: Towards a privacy preserving ecosystem for BCI applications.
    IEEE Conference on Communications and Network Security
    Hassan Takabi . 2016 . [Bibtex] . [PDF]
  • Brain computer interface (BCI) applications: Privacy threats and countermeasures.
    IEEE 2nd International Conference on Collaboration and Internet Computing
    Hassan Takabi, Anuj Bhalotiya, and Manar Alohaly. . 2016 . [Bibtex] . [PDF]
  • Differentially private distributed data analysis.
    IEEE 2nd International Conference on Collaboration and Internet Computing
    Hassan Takabi, Samir Koppikar, and Saman T. Zargar. . 2016 . [Bibtex] . [PDF]
  • If you can’t measure it, you can’t manage it: Towards quantification of privacy policies.
    IEEE International Conference on Collaboration and Internet Computing
    Manar Alohaly and Hassan Takabi. . 2016 . [Bibtex] . [PDF]
  • Privacy Preserving Multi-party Machine Learning with Homomorphic Encryption
    Workshop on Private Multi-Party Machine Learning,
    Hassan Takabi, Ehsan Hesamifard, and Mehdi Ghasemi. . 2016 . [Bibtex] . [PDF]
  • Effect of anti-malware software on infectious nodes in cloud environment
    Computers & Security
    Farzaneh Abazari, Morteza Analoui, and Hassan Takabi . 2016 . [Bibtex] . [PDF]
2015
  • DLLMiner: Structural mining for malware detection
    Security and Communication Networks
    Masoud Narouei, Mansour Ahmadi, Giorgio Giacinto, Hassan Takabi, and Ashkan Sami . 2015 . [Bibtex] . [PDF]
  • Automatic Top-Down Role Engineering Framework Using Natural Language Processing Techniques
    Information Security Theory and Practice
    Masoud Narouei, and Hassan Takabi . 2015 . [Bibtex] . [PDF]
  • Toward an Insider Threat Detection Framework Using Honey Permissions
    Journal of Internet Services and Information Security.
    Parisa Kaghazgaran, and Hassan Takabi . 2015 . [Bibtex] . [PDF]
  • Towards a general framework for optimal role mining: A constraint satisfaction approach
    ACM Symposium on Access Control Models and Technologies
    Jafar Haadi Jafarian, Hassan Takabi, Hakim Touati, Ehsan Hesamifard, and Mohamed Shehab . 2015 . [Bibtex] . [PDF]
  • Towards an automatic top-down role engineering approach using natural language processing techniques
    ACM Symposium on Access Control Models and Technologies
    Masoud Narouei, and Hassan Takabi . 2015 . [Bibtex] . [PDF]
  • Differentially Private Decision Tree Learning from Distributed Data
    IEEE Symposium on Security & Privacy
    Parisa Kaghazgaran, and Hassan Takabi . 2015 . [Bibtex] . [PDF]
2014
  • Venue Attacks in Location-Based Social Networks
    1st ACM SIGSPATIAL International Workshop on Privacy in Geographic Information Collection and Analysis
    Lei Jin, and Hassan Takabi . 2014 . [Bibtex] . [PDF]
  • Exploiting users’ inconsistent preferences in online social networks to discover private friendship links
    13th Workshop on Privacy in the Electronic Society
    Lei Jin, Hassan Takabi, Long, X., and James B. D. Joshi . 2014 . [Bibtex] . [PDF]
  • Privacy aware access control for data sharing in cloud computing environments
    2nd International Workshop on Security in Cloud Computing
    Hassan Takabi . 2014 . [Bibtex] . [PDF]
2013
  • Security and privacy in cloud computing: Towards a comprehensive framework.
    Principles, Methodologies, and Service-Oriented Approaches for Cloud Computing
    Hassan Takabi, James B. D. Joshi,and Gail-Joon Ahn . 2013 . [Bibtex] . [PDF]
  • Policy management in cloud: Challenges and approaches
    IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications
    Hassan Takabi, and James B. D. Joshi . 2013 . [Bibtex] . [PDF]
  • A semantic based policy management framework for cloud computing environments
    ProQuest Dissertations and Thesis
    Hassan Takabi . 2013 . [Bibtex] . [PDF]
2012
  • Formalizing delegation and integrating it into role-based access control models
    Journal of Information Assurance and Security
    Alie Abdallah, and Hassan Takabi . 2010 . [Bibtex] . [PDF]
  • Exploring reactive access control
    ACM Conference on Human Factors in Computing Systems
    Richard Shay, Michelle L. Mazurek, Peter F. Klemperer, and H. Takabi . 2010 . [Bibtex] . [PDF]
  • StateMiner: An efficient similarity-based approach for optimal mining of role hierarchy
    ACM symposium on Access control models and technologies
    Hassan Takabi, and James B. D. Joshi . 2010 . [Bibtex] . [PDF]
  • Securecloud: Towards a comprehensive security framework for cloud computing environments
    Annual IEEE International Computer Software and Applications Conference
    Hassan Takabi, James B. D. Joshi, and Gail-Joon Ahn . 2010 . [Bibtex] . [PDF]
  • Security and Privacy Risks of Using E-mail Address as an Identity
    International Conference on PrivAcy, Security, riSk And Trust
    Lei Jin, Hassan Takabi, and James B. D. Joshi . 2010 . [Bibtex] . [PDF]
  • Security and Privacy Challenges in Cloud Computing Environments
    IEEE Security & Privacy Magazine
    Hassan Takabi, James B. D. Joshi, and Gail-Joon Ahn . 2010 . [Bibtex] . [PDF]
2011
  • Formalizing delegation and integrating it into role-based access control models
    Journal of Information Assurance and Security
    Alie Abdallah, and Hassan Takabi . 2010 . [Bibtex] . [PDF]
  • Exploring reactive access control
    ACM Conference on Human Factors in Computing Systems
    Richard Shay, Michelle L. Mazurek, Peter F. Klemperer, and H. Takabi . 2010 . [Bibtex] . [PDF]
  • StateMiner: An efficient similarity-based approach for optimal mining of role hierarchy
    ACM symposium on Access control models and technologies
    Hassan Takabi, and James B. D. Joshi . 2010 . [Bibtex] . [PDF]
  • Securecloud: Towards a comprehensive security framework for cloud computing environments
    Annual IEEE International Computer Software and Applications Conference
    Hassan Takabi, James B. D. Joshi, and Gail-Joon Ahn . 2010 . [Bibtex] . [PDF]
  • Security and Privacy Risks of Using E-mail Address as an Identity
    International Conference on PrivAcy, Security, riSk And Trust
    Lei Jin, Hassan Takabi, and James B. D. Joshi . 2010 . [Bibtex] . [PDF]
  • Security and Privacy Challenges in Cloud Computing Environments
    IEEE Security & Privacy Magazine
    Hassan Takabi, James B. D. Joshi, and Gail-Joon Ahn . 2010 . [Bibtex] . [PDF]
2014
  • Formalizing delegation and integrating it into role-based access control models
    Journal of Information Assurance and Security
    Alie Abdallah, and Hassan Takabi . 2010 . [Bibtex] . [PDF]
  • Exploring reactive access control
    ACM Conference on Human Factors in Computing Systems
    Richard Shay, Michelle L. Mazurek, Peter F. Klemperer, and H. Takabi . 2010 . [Bibtex] . [PDF]
  • StateMiner: An efficient similarity-based approach for optimal mining of role hierarchy
    ACM symposium on Access control models and technologies
    Hassan Takabi, and James B. D. Joshi . 2010 . [Bibtex] . [PDF]
  • Securecloud: Towards a comprehensive security framework for cloud computing environments
    Annual IEEE International Computer Software and Applications Conference
    Hassan Takabi, James B. D. Joshi, and Gail-Joon Ahn . 2010 . [Bibtex] . [PDF]
  • Security and Privacy Risks of Using E-mail Address as an Identity
    International Conference on PrivAcy, Security, riSk And Trust
    Lei Jin, Hassan Takabi, and James B. D. Joshi . 2010 . [Bibtex] . [PDF]
  • Security and Privacy Challenges in Cloud Computing Environments
    IEEE Security & Privacy Magazine
    Hassan Takabi, James B. D. Joshi, and Gail-Joon Ahn . 2010 . [Bibtex] . [PDF]