Nahid Shahmehri
#183,233
Most Influential Person Now
American computer scientist
Nahid Shahmehri's AcademicInfluence.com Rankings
Nahid Shahmehricomputer-science Degrees
Computer Science
#11691
World Rank
#12419
Historical Rank
#2059
USA Rank
Data Mining
#281
World Rank
#282
Historical Rank
#27
USA Rank
Machine Learning
#5376
World Rank
#5446
Historical Rank
#214
USA Rank
Artificial Intelligence
#5795
World Rank
#5883
Historical Rank
#328
USA Rank
Download Badge
Computer Science
Nahid Shahmehri's Degrees
- PhD Computer Science University of Southern California
- Masters Computer Science University of Southern California
- Bachelors Computer Science University of Southern California
Similar Degrees You Can Earn
Why Is Nahid Shahmehri Influential?
(Suggest an Edit or Addition)According to Wikipedia, Nahid Shahmehri is a professor of Computer Science at Linköping University and also Senior Member of IEEE, specializing in computer and network security issues. External links
Nahid Shahmehri's Published Works
Published Works
- A peer-to-peer approach to vehicular communication for the support of traffic safety applications (2002) (141)
- Generalized algorithmic debugging and testing (1991) (123)
- File Type Identification of Data Fragments by Their Binary Structure (2006) (115)
- Generalized algorithmic debugging (1991) (114)
- An Ontology of Information Security (2007) (109)
- The role of human Web assistants in e-commerce: an analysis and a usability study (2000) (100)
- A Trust-Aware, P2P-Based Overlay for Intrusion Detection (2006) (95)
- An Integration of Reputation-based and Policy-based Trust Management (2005) (95)
- Oscar - File Type Identification of Binary Data in Disk Clusters and RAM Pages (2006) (91)
- Semantic Web Policies - A Discussion of Requirements and Research Issues (2006) (83)
- Dynamic trust metrics for peer-to-peer systems (2005) (79)
- Sophisticated Denial of Service attacks aimed at application layer (2012) (67)
- Proceedings of the Sixth IEEE International Conference on Peer-to-Peer Computing (2006) (63)
- Turning programs against each other: high coverage fuzz-testing using binary-code mutation and dynamic slicing (2015) (56)
- Interprocedural Dynamic Slicing (1992) (55)
- Modeling Software VulnerabilitiesWith Vulnerability Cause Graphs (2006) (54)
- An empirical study of human Web assistants: implications for user support in Web information systems (2001) (54)
- Interprocedural dynamic slicing applied to interprocedural data flow testing (1993) (54)
- Towards a structured unified process for software security (2006) (46)
- Privacy in the Semantic Web: What Policy Languages Have to Offer (2007) (44)
- Rule-based Policy Specification : State of the Art and Future Work (2004) (42)
- Reassembly of Fragmented JPEG Images Containing Restart Markers (2008) (41)
- Alignment of Biomedical Ontologies Using Life Science Literature (2006) (40)
- Helping Hand or Hidden Hurdle: Proxy-Assisted HTTP-Based Adaptive Streaming Performance (2013) (38)
- Bug Localization by Algorithmic Debugging and Program Slicing (1990) (37)
- People with Special Needs and Traffic Safety (2008) (36)
- Design of a Process for Software Security (2007) (34)
- 2-clickAuth Optical Challenge-Response Authentication (2010) (33)
- Privacy, Security and Trust in Cloud Computing: The Perspective of the Telecommunication Industry (2012) (33)
- Using assertions in declarative and operational models for automated debugging (1994) (31)
- Three approaches to interprocedural dynamic slicing (1993) (31)
- What help do older people need?: constructing a functional design space of electronic assistive technology applications (2005) (31)
- Quality-adaptive Prefetching for Interactive Branched Video using HTTP-based Adaptive Streaming (2014) (30)
- CAFE: a conceptual model for managing information in electronic mail (1998) (29)
- User help techniques for usable security (2007) (29)
- Semi-automatic bug localization in software maintenance (1990) (27)
- How can the developer benefit from security modeling? (2007) (26)
- Usability and Security of Personal Firewalls (2007) (26)
- An advanced approach for modeling and detecting software vulnerabilities (2012) (25)
- An Architectural Foundation for Security Model Sharing and Reuse (2009) (25)
- A Cause-Based Approach to Preventing Software Vulnerabilities (2008) (23)
- A default extension to description logics for use in an intelligent search engine (1998) (23)
- A context-based vehicular communication protocol (2004) (21)
- Bandwidth-aware Prefetching for Proactive Multi-video Preloading and Improved HAS Performance (2015) (20)
- Performance of the Java security manager (2005) (20)
- Secure multicast software delivery (2000) (19)
- Generalized algorithmic debugging and testing (1992) (19)
- Successful Aging (2004) (19)
- Live Help Systems (2003) (18)
- Proceedings of the Second International Conference on Peer-to-Peer Computing (2002) (18)
- Vehicular communication - a candidate technology for traffic safety (2004) (18)
- Introducing Vulnerability Awareness to Common Criteria's Security Targets (2009) (18)
- A Look at the Third-Party Identity Management Landscape (2016) (18)
- Unified modeling of attacks, vulnerabilities and security activities (2010) (17)
- A novel architecture for supporting vehicular communication (2002) (16)
- Towards robust instruction-level trace alignment of binary code (2017) (16)
- A hybrid key tree scheme for multicast to balance security and efficiency requirements (2003) (15)
- On the Design of Safety Communication Systems for Vehicles (2007) (15)
- Information Sharing and User Privacy in the Third-party Identity Management Landscape (2015) (15)
- An agent-based framework for integrating workflows and Web services (2005) (14)
- Towards creating a knowledge base for World-Wide Web documents (1997) (14)
- Empowering the creative user: personalized HTTP-based adaptive streaming of multi-path nonlinear video (2013) (14)
- Problems Running Untrusted Services as Java Threads (2005) (14)
- Third-Party Identity Management Usage on the Web (2014) (13)
- Usable set-up of runtime security policies (2007) (12)
- Dwebic: An Intelligent Search Engine based on Default Description Logics (1997) (12)
- Task-oriented restructuring of an application domain: a multi-agent architecture for doing things in Internet e-mail (1999) (11)
- sButler: A Mediator between Organizations' Workflows and the Semantic Web (2005) (11)
- Towards Secure E-Services: Risk Analysis of a Home Automation Service (2001) (11)
- Web Assistants : Towards an Intelligent and Personal Web Shop (1999) (10)
- Collection and exploitation of expert knowledge in Web assistant system (2001) (10)
- Crowd-based detection of routing anomalies on the internet (2015) (10)
- Security Levels for Web Authentication Using Mobile Phones (2010) (10)
- Usability criteria for automated debugging systems (1993) (10)
- Using NFS to implement role-based access control (1997) (9)
- User Modelling as an Aid for Human Web Assistants (2001) (9)
- Using the Java sandbox for resource control (2002) (9)
- Prioritisation and Selection of Software Security Activities (2009) (9)
- Delegation of Tasks and Dissemination of Information in Organizations: Restructuring Internet E-Mail for Doing Things (1998) (9)
- Security Issues in E-Home Network and Software Infrastructures (2001) (9)
- A lightweight agent framework for interactive multi-agent applications (1999) (8)
- Traffic accidents modeling and analysis using temporal reasoning (2004) (8)
- Intelligent software delivery using P2P (2002) (8)
- Collaborative framework for protection against attacks targeting BGP and edge networks (2017) (8)
- A systematic evaluation of disk imaging in EnCase® 6.8 and LinEn 6.1 (2009) (8)
- Proceedings of the Fifth International Conference on Peer-to-Peer Computing (2005) (8)
- Are You Busy, Cool, or just Curious? —CAFE: A Model with Three Different States of Mind for a User to Manage Information in Electronic Mail (1998) (8)
- An evaluation of Java application containers according to security requirements (2005) (8)
- Issues in image utilization within mobile e-services (2001) (8)
- Contagious errors: Understanding and avoiding issues with imaging drives containing faulty sectors (2008) (8)
- A shoulder-surfing resistant graphical password system (2017) (7)
- Querying Documents using Content, Structure and Properties (2000) (7)
- Querying Document Bases by Content, Structure and Properties (1999) (7)
- PrefiSec: A Distributed Alliance Framework for Collaborative BGP Monitoring and Prefix-based Security (2014) (7)
- Oscar — Using Byte Pairs to Find File Type and Camera Make of Data Fragments (2007) (7)
- Oscar - File Type and Camera Identification Using the Structure of Binary Data Fragments (2006) (6)
- Towards Creating Workflows On-the-Fly and Maintaining Them Using the Semantic Web: The sButler Project at Linköping University (2003) (6)
- A Usability Study of Security Policy Management (2006) (6)
- Algorithmic Debugging for Imperative Languages with Side-Effects (Abstract) (1990) (6)
- Efficient Utilization of Secondary Storage for Scalable Dynamic Slicing (2014) (6)
- An Intelligent Multi-Agent Architecture for Support of Process Reuse in a Workflow Management System (1996) (6)
- Integrating a Security Plug-in with the OpenUP/Basic Development Process (2008) (6)
- User modelling for live help systems: initial results (2001) (6)
- Proceedings, First International Conference on Peer-to-Peer Computing (2001) (5)
- Affect-chaining and dependency oriented flow analysis applied to queries of programs (1988) (5)
- TRIFU: the right information for yoU (1998) (5)
- The REWERSE View on Policies (2005) (5)
- Resilient trust for peer-to-peer based critical information infrastructures (2004) (5)
- Proceedings of the Third IEEE International Conference on Peer-to-Peer Computing (2003) (5)
- 2-clickAuth: Optical Challenge-Response Authentication Using Mobile Handsets (2011) (4)
- InputTracer: A Data-Flow Analysis Tool for Manual Program Comprehension of x86 Binaries (2012) (4)
- Using Vehicular Communication to Support Older Drivers at Road Intersections : A Feasibility Study (2004) (4)
- An in-vehicle approach for improving traffic safety through GIS utilization (2002) (4)
- User Modelling for Live Help Systems (2001) (4)
- Evaluation and refinement of a design framework for generating dependable virtual companions for later life (2005) (4)
- A Post-Mortem Incident Modeling Method (2009) (4)
- A Platform to Evaluate the Technology for Service Discovery in the Semantic Web (2006) (4)
- A Flexible Category-Based Collusion-Restistant Key Management Scheme for Multicast (2003) (4)
- Template Generation for Identifying Text Patterns (2000) (3)
- A framework for the specification of multifunctional, adaptive, and realistic virtual companions for later life (2003) (3)
- Emergency Information Dissemination in Mobile Networks for Vehicles (2006) (3)
- Speeding Up Bug Finding using Focused Fuzzing (2018) (3)
- Does scale, size, and locality matter? Evaluation of collaborative BGP security mechanisms (2016) (3)
- Adaptive Dissemination of Safety Data Among Vehicles (2006) (3)
- Dependability requirements to aid the design of virtual companions for later life (2004) (3)
- User involvement in the design of software to assist people with dementia : Creating a personalised virtual kitchen companion (2004) (2)
- Towards secure e-services (2000) (2)
- Final summary report on enterprise security (1999) (2)
- Robust Detection of Obfuscated Strings in Android Apps (2019) (2)
- An extension to the Android access control framework (2011) (2)
- Linköping University's Virtual Companion project (2004) (2)
- A Large-Scale Empirical Study of Android App Decompilation (2021) (2)
- TRAP: Open Decentralized Distributed Spam Filtering (2011) (2)
- Adaptive dissemination of safety data among moving vehicles (2006) (2)
- Efficient storage for category-based group key management (2004) (2)
- Usability and Security for DRM Architectures (2004) (2)
- Projects as a means for subject learning and personal development under student responsibility (2000) (2)
- Proceedings : Third International Conference on Peer-to-Peer Computing (P2P 2003), 1-3 September 2003, Linköping, Sweden (2003) (1)
- Third International Conference on Peer-to-Peer Computing (P2P 2003), 1-3 September, 2003, Linköping, Sweden : Proceedings (2004) (1)
- Longitudinal Analysis of the Third-party Authentication Landscape (2016) (1)
- Establishing a secure multicast group for remote software delivery (1999) (1)
- Comment on "AndrODet: An adaptive Android obfuscation detector" (2019) (1)
- Towards Accurate Binary Correspondence Using Runtime-Observed Values (2016) (1)
- On exploiting declarative programming and parallel execution in computer based real-time systems (1994) (1)
- Proceedings of the Third Conference on Peer-to-Peer Computing (2003) (1)
- A Framework for Generating Task Specific Information Extraction Systems (2002) (0)
- A Role Description Framework and Its Applications to Role-based Access Control (2007) (0)
- desync-cc: An Automatic Disassembly-Desynchronization Obfuscator (2022) (0)
- Trusted Mobile Platforms (2008) (0)
- Linköping Studies in Science and Technology Aligning Biomedical Ontologies (2007) (0)
- Taint analysis for automotivesafety using the LLVM compilerinfrastructure Éléonore Goblé (2019) (0)
- Proceedings : second international conference on peer-to-peer computing (P2P 2002), September 5-7, 2002, Linköping, Sweden (2002) (0)
- Proceedings of the Conference on Computer Science and Systems Engineering (2002) (0)
- 4th International Conference on Peer-to-Peer Computing (P2P 2004), 15-17 August 2004, Zurich, Switzerland (2004) (0)
- Institutionen För Datavetenskap Application Whitelisting Smartphones in High Security Environments Application Whitelisting Smartphones in High Security Environments (2013) (0)
- Android decompiler performance on benign and malicious apps: an empirical study (2023) (0)
- 1st International Conference on Peer-to-Peer Computing (P2P 2001), 27-29 August 2001, Linköping, Sweden (2001) (0)
- 2nd International Conference on Peer-to-Peer Computing (P2P 2002), 5-7 September 2002, Linköping, Sweden (2002) (0)
- Signal-aware adaptive time- out in cellular networks (2017) (0)
- Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003) (2003) (0)
- Quality-adaptive Prefetching for Interactive Multipath Playback using HTTP-based Adaptive Streaming (2014) (0)
- Message from the Conference Chairs (2004) (0)
- A design space analysis of live help systems (2012) (0)
- Performance Evaluation of Safety Communication for Vehicles (2006) (0)
- Sixth IEEE International Conference on Peer-to-Peer Computing (P2P 2006), 2-4 October 2006, Cambridge, United Kingdom (2006) (0)
- Graphical Modeling of Security Goals and Software Vulnerabilities (2015) (0)
- 3rd International Conference on Peer-to-Peer Computing (P2P 2003), 1-3 September 2003, Linköping, Sweden (2003) (0)
- Proceedings. Second international conference on Peer-to-peer computing. 2002 (P2P 2000) (2002) (0)
- A trust aware peer-to-peer based overlay architecture for intrusion detection (2012) (0)
- WET ICE Organizing Committees (2005) (0)
- Proceedings : Fourth International Conference on Peer-to-Peer Computing (P2P 2004), 25-27 August 2004, Zürich, Switzerland (2004) (0)
- Fifth IEEE International Conference on Peer-to-Peer Computing (P2P 2005), 31 August - 2 September 2005, Konstanz, Germany (2005) (0)
- Adapting network interactions of a rescue service mobile application for improved battery life (2017) (0)
- Coordination in message-based environments: restructuring Internet e-mail to accomplish tasks (1998) (0)
- An Integrated Approach to System Implementation (2007) (0)
- desync-cc: A Research Tool for Automatically Applying Disassembly Desynchronization during Compilation (2023) (0)
This paper list is powered by the following services:
Other Resources About Nahid Shahmehri
What Schools Are Affiliated With Nahid Shahmehri?
Nahid Shahmehri is affiliated with the following schools: