Publications

  1. Roya Ensafi, Mike Jacobi, and Jedidiah R. Crandall. Students Who Don’t Understand Information Flow Should be Eaten: An Experience Paper. 5th Workshop on Cyber Security Experimentation and Test Co-located with USENIX Security '12, August 2012, [PDF], [Slides of my presentation]

  2. Roya Ensafi, Jong Chun Park, Deepak Kapur, and Jedidiah R. Crandall. Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking. 19th USENIX Security Symposium USENIX Security 2010, August 2010, [PDF], [Video of my presentation]

  3. Roya Ensafi, Jong Chun Park, Deepak Kapur, and Jedidiah R. Crandall. Idle Port Scanning of Network Protocol Stacks. 6th CS student conference CSUSC-2010, UNM, April 2010.

  4. Jedidiah R. Crandall, Roya Ensafi, Stephanie Forrest, Joshua Ladau, and Bilal Shebaro. The Ecology of Malware. New Security Pardigms Workshop NSPW 2008, California, September 2008. [PDF]

  5. Roya Ensafi, Soheila Dehghanzadeh, Mohammad Akbarzadeh. Optimizing Fuzzy K-means for network anomaly detection using PSO. 6th ACS/IEEE International Conference on Computer Systems and Applications AICCSA-08, Qatar, April 2008. [PDF]

  6. Vahid Salmani, Roya Ensafi, Narges Khatib Astane and Mahmoud Naghibzadeh. A Fuzzy based Multi-criteria Scheduler for Uniform Multiprocessor Real-time Systems. International Conference on Information Technology, ICIT-07, India, December 2007. [PDF]

  7. Ensafi Roya, Zamiri Amin, Kahani Mohsen. ICT Challenges in education: Reflec- tions from a developing country: Iran, with reference to the statistics from computer science students. International conference in virtual learning ICVL2007, Romania,October 2007. [PDF]

Miscellaneous

  1. Roya Ensafi. Why we should use grid computing. Computer Scientific Journal of Ferdowsi University of Mashhad, ESCAPE, Winter 2006.

  2. Roya Ensafi. The Security Mechanisms for IEEE 802.11 Wireless Networks. Computer Scientific Journal of Ferdowsi University of Mashhad, ESCAPE, Fall 2006.