Publications
-
Roya Ensafi, Mike Jacobi, and Jedidiah R. Crandall.
Students Who Don’t Understand Information Flow Should be Eaten: An
Experience Paper.
5th Workshop on Cyber Security Experimentation and Test
Co-located with USENIX Security '12, August 2012,
[PDF], [Slides of my presentation]
-
Roya Ensafi, Jong Chun Park, Deepak Kapur, and Jedidiah R. Crandall.
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model
Checking.
19th USENIX Security Symposium USENIX Security 2010, August 2010,
[PDF], [Video of my presentation]
-
Roya Ensafi, Jong Chun Park, Deepak Kapur, and Jedidiah R. Crandall.
Idle Port Scanning of Network Protocol Stacks.
6th CS student conference CSUSC-2010, UNM,
April 2010.
-
Jedidiah R. Crandall, Roya Ensafi, Stephanie Forrest, Joshua Ladau, and Bilal Shebaro.
The Ecology of Malware.
New Security Pardigms Workshop NSPW 2008,
California, September 2008.
[PDF]
-
Roya Ensafi, Soheila Dehghanzadeh, Mohammad Akbarzadeh.
Optimizing Fuzzy K-means for network anomaly detection using PSO.
6th ACS/IEEE International Conference on Computer Systems and Applications AICCSA-08,
Qatar, April 2008. [PDF]
-
Vahid Salmani, Roya Ensafi, Narges Khatib Astane and Mahmoud Naghibzadeh.
A Fuzzy based Multi-criteria Scheduler for Uniform Multiprocessor Real-time Systems.
International Conference on Information Technology, ICIT-07,
India, December 2007. [PDF]
-
Ensafi Roya, Zamiri Amin, Kahani Mohsen.
ICT Challenges in education: Reflec-
tions from a developing country: Iran, with reference to the statistics from computer
science students.
International conference in virtual learning ICVL2007,
Romania,October 2007.
[PDF]
Miscellaneous
-
Roya Ensafi.
Why we should use grid computing.
Computer Scientific Journal of
Ferdowsi University of Mashhad, ESCAPE,
Winter 2006.
-
Roya Ensafi.
The Security Mechanisms for IEEE 802.11 Wireless Networks.
Computer Scientific Journal of
Ferdowsi University of Mashhad, ESCAPE,
Fall 2006.