Marjan Keramati
Title
Cited by
Cited by
Year
CVSS-based security metrics for quantitative analysis of attack graphs
M Keramati, A Akbari, M Keramati
ICCKE 2013, 178-183, 2013
312013
Novel security metrics for ranking vulnerabilities in computer networks
M Keramati, M Keramati
7'th International Symposium on Telecommunications (IST'2014), 883-888, 2014
122014
An attack graph based metric for security evaluation of computer networks
M Keramati, A Akbari
6th International Symposium on Telecommunications (IST), 1094-1098, 2012
112012
An attack graph based procedure for risk estimation of zero-day attacks
M Keramati
2016 8th International Symposium on Telecommunications (IST), 723-728, 2016
102016
New vulnerability scoring system for dynamic security evaluation
M Keramati
2016 8th International Symposium on Telecommunications (IST), 746-751, 2016
102016
Cost-aware network immunization framework for intrusion prevention
M Keramati, H Asgharian, A Akbari
2011 IEEE International Conference on Computer Applications and Industrial …, 2011
92011
A novel system for quantifying the danger degree of computer network attacks
M Keramati
2017 IEEE 4th International Conference on Knowledge-Based Engineering and …, 2017
12017
Dynamic Risk Assessment System for the Vulnerability Scoring
M Keramati
International Journal of Information and Communication Technology Research 9 …, 2017
12017
A Security Model Based Approach for Dynamic Risk Assessment of Multi-Step Attacks in Computer Networks
M Keramati
Electronic and Cyber Defense, 2020
2020
Effect of leachate PH on the collapse potential and shear strength parameters of collapsible soils
MA Khodabandeh, M Keramati, SM Hosseini
strain 15 (20), 25, 2019
2019
An Attack Graph Based Method for Predictive Risk Evaluation of Zero-Day Attacks
M Keramati
International Journal of Information & Communication Technology Research 9 …, 2017
2017
An Overview of Blockchain Security Challenges
M Keramati
Attack Graph Based system for Risk Assessment of Multi-Step Attacks
M Keramati
Innovative Cyber-Security Metrics for Intrusion Prevention
M Keramati, FS Halataei
The system can't perform the operation now. Try again later.
Articles 1–14