Ashkan Sami, Ph.D

Department
Computer Science and Engineering and Information Technology
About

I am an applied scientist interested in solving highly complex and difficult engineering problems. As such, my work is basically interdisciplinary and I enjoy collaborating with great number of erudite scholars in variety of fields. I had close collaborations with people in: instrumentation and control, factory automation, bioinformatics, genetics, health informatics, finance and banking, trauma and security to name the few. 

Education:

Freshman Year B.S. Electronics Eng. (1986-87) Shiraz Univ., Iran   (Left for U.S.)

 

University

GPA

 B.S. in Electrical Engineering (1991)

Virginia Tech, USA

3.4 (overall)

 M.S. in Comp. Eng.-AI & Robotics (1996)

Shiraz Univ., Iran   

16.75

 Ph.D.; Information Technology (2006)

Tohoku Univ., Japan

A

 Postdoc in Des & Anal of IS  (2006/10-2007/3)   

Tohoku Univ., Japan

 

 Postdoc in Sports Medicine (2007/5-2007/9)      

Tohoku Univ., Japan

 

 

Activities:

  • Member of IEEE Technical Committee on Software Engineering
  • Member of IEEE Technical Committee on Industrial Electronics
  • Member of Engineering Social Systems, http://ess.mit.edu/people.html (2008-2010)
  • Head of Data Mining group at Health Policy Research Center, (2010-2011)
  • ACM Member (since 2007)
  • IEEE computer society, Associate Member (since 10/2006)
  • IEEE computer society, Student Member (1/2004- 9/2006)
  • SEC Representative of ISHM (Int. Soc. of Hybrid Microelectronics (3/90 - 1/91)
  • Student Engineers Council’s member (3/90 - 1/91)
  • Officer of ISO (9/89 - 12/89)
  • Chairman of the Computer Club (6/87 - 3/88)
  • Student Board of Advisory (9/86 - 12/86)
Research Interests
  • Google Scholar

  • Empirical Software Enginnering, Applied Data Mining, Cyber Security, Bioinformatic, Healthcare Informatic.

Courses
  • Bachelor

      Advanced Programming

      Software Engineering I

      Software Engineering II

      Software Engineering Lab

      Numerical Analysis

      Fundamentals of Computer and Programming

      Data Structures and Algorithms I

      Technical Writing

      Real-time Systems

    Master
     

      Secure Software Development

      Advanced Software Engineering 

      Management of Information Security

      System Engineering

      Formal Software Specification and Verification

      Advanced Software Engineering

      Text-based Information Retrieval

      Data Mining

      Secured Computer Systems

      Data Security

    PhD

      Advanced Data Mining

      Knowledge Acquisition Techniques

      Secure Programming

Publications
  •  Journals: [Ranking for Scopus indexed journals extracted from Scientific Journal Ranking (sjr):     https://www.scimagojr.com/journalrank.php, where Q1 (highest) and Q4 (lowest)]

    1. A. Kalili, A. Sami, "SIDS: State-based Intrusion Detection for Stage-based Cyber Physical Systems" International Journal of Critical Infrastructure Protection, (Accepted).
    2. M. Mohammadpourfard, A. Sami, and Y. Weng, “Identification of False Data Injection Attacks with Considering the Impact of Wind Generation and Topology Reconfigurations,” IEEE Transactions on Sustainable Energy, pp. 1–1, 2017 [ISI, Q1(sjr)].
    3. Mohammadpourfard, M., Sami, A., & Seifi, A. R. (2017) .A statistical unsupervised method against false data injection attacks: A visualization-based approach. Expert System with Application 84, 242-261. [ISI, Q1(sjr)]
    4. Salehi, Z., Sami, A., & Ghiasi, M. (2017). MAAR: Robust features to detect malicious activity based on API calls, their arguments and return values. Engineering Applications of Artificial Intelligence, 59, 93-102. [ISI, Q1(sjr)]
    5. Kargarfard, F., Sami, A., Mohammadi-Dehcheshmeh, M., & Ebrahimie, E. (2016). Novel approach for identification of influenza virus host range and zoonotic transmissible sequences by determination of host-related associative positions in viral genome segments. BMC genomics, 17(1), 925. [ISI, Q1(sjr)]
    6. Behroozi, M., & Sami, A. (2016). A Multiple-Classifier Framework for Parkinson’s Disease Detection Based on Various Vocal Tests, International journal of telemedicine and applications. [ISI, Q1(HIM in sjr)]
    7. Rahmani, H., Sami, A., & Khalili, A. (2016, March). CIP-UQIM: A unified model for quality improvement in software SME's based on CMMI level 2 & 3. Information and Software Technology, 71, 27-57. [ISI, Q1(sjr)]
    8. Khalili, A., Sami, A., Azimi, M., Moshtari, S., Salehi, Z., Ghiasi, M., & Safavi, A. A. (2016). Employing secure coding practices into industrial applications: a case study. Empirical Software Engineering, 21(1), 4-16. [ISI, Q1(sjr)]
    9. Narouie, M., Ahmadi, M., Giacinto, G., Takabi, H., & Sami, A. (2015, Dec). DLLMiner: structural mining for malware detection, Security and Communication Networks, 8(18),  3311-3322. [ISI, Q2(sjr)]
    10. Dallaki, H., Sami, A., Lari, K. B., Hamzeh, A., & Hashemi, S. (2015). Scaling up the hybrid Particle Swarm Optimization algorithm for nominal data-sets. Intelligent Data Analysis, 19(4), 825-844 [ISI, Q2(sjr)]
    11. Narouie, M., Ahmadi, M., & Sami, A. (2015). SePaS: Word sense disambiguation by sequential patterns in sentences. Natural Language Engineering,  21(2), 251-269. [ISI, Q1(sjr)]
    12. Ghiasi, M., Sami, A., & Salehi, Z. (2015). Dynamic VSA: A Framework for Malware Detection Based on Register Contents.  Engineering Applications of Artificial Intelligence, 44, 111-122. [ISI, Q1(sjr)]
    13. Khalili, A., & Sami, A. (2015). SysDetect: A Systematic approach to Critical State Determination for Industrial Intrusion Detection Systems using Apriori algorithm. Journal of Process Control, 32, 154-160. [ISI, Q1(sjr)]
    14. Daneshpazhouh, A., & Sami, A. (2015). Semi-Supervised Outlier Detection with Only Positive and Unlabeled Data Based on Fuzzy Clustering. International Journal on Artificial Intelligence Tools, 24(03), 1-16. [ISI, Q3(sjr)]
    15. Salehi, Z., Sami, A., & Ghiasi, M. (2014). Using feature generation from API calls for malware detection. Computer Fraud and Security, 2014(9), 9-18. [ISI, Q3(sjr)]
    16. Daneshpazhouh, A., & Sami, A. (2014). Entropy-based outlier detection using semi-supervised approach with few positive examples. Pattern Recognition Letters, 49, 77-84. [ISI, Q1(sjr)]
    17. Tavakoli, M. M., & Sami, A. (2013). Particle Swarm Optimization in Solving Capacitated Vehicle Routing Problem. Buletin Teknik Elektro dan Informatika (Bulletin of Electrical Engineering and Informatics), 2(4), 252-257. [ISC]
    18. Sami, A., Moafian, G., Najafi, A., Yamini, N., Heidari, S. T., & Lankarani, k. (2013). Eductional level and age as contributing factors to road traffic accidents. Chinese Journal of Traumatology, 16(5), 281-285. [PubMed]
    19. Ahmadi, M., Sami, A., Yadegari, B., &Rahimi, H. (2013). Malware Detection by Bihavioral Sequential Patterns. Computer Fraud and Security, 2013(8), 11-19. [ISI, Q3(sjr)]
    20. Moshtari, S., Sami, A., & Azimi, M. (2013). Using complexity metrics to Improve Software. Security Computer Fraud & Security ,2013(5), 8-17. [ISI, Q3(sjr)]
    21. Zamani, A., Sami, A., Khalili, M. (2012). Multivariate rule-based seismicity map of Iran: A Data Driven Approach. Bulletin of earthquake engineering, 10, 1667-1683. [ISI, Q1(sjr)]
    22. Rahmani, M., Hashemi, S., Hamzeh, A., & Sami, A. (2009). Agent based Decision Tree Learning: A Novel Approach. International Journal of Software Engineering and Knowledge Engineering, 19(07), 1015-1022. [ISI, Q2(sjr)]
    23. Hamzeh, A., Hashemi, S., Sami, A., & Rahmani, A. (2009). A Recursive Classifier System for Partially Observable Environment. Fundamenta Informaticae 97(1-2), 15-40. [ISI, Q3(sjr)]
    24. Sami, A., Nagatomi, R., Takahashi, M., & Tokuyama, T. (2006). OSDM: optimized shape distribution method. Advanced Data Mining and Applications, 1057-1064. (ISI Indexed) )
    25. Sami, A. (2006). Obstacles and misunderstandings facing medical data mining. Advanced Data Mining and Applications, 856-863. (ISI Indexed)
    26. Sami, A., Nagatomi, R., Takahashi, M., & Tokuyama, T. (2006, December). SDI: shape distribution indicator and its application to find interrelationships between physical activity tests and other medical measures. In Australasian Joint Conference on Artificial Intelligence (pp. 383-392). Springer Berlin Heidelberg. (ISI Indexed)
    27. Kikuchi, A., Niu, k., Ikeda, Y., Hozawa, A., Nakagawa, H., Guo, H., Ohmori-Matsuda, K., Yang, G., Farmawaati, A., Sami, A., Arai, Y., Tsuji, I., & Nagatomi, R. (2007). Association between Physical Activity and Urinary Incontinence in Community-Based Elderly Population Aged 70 Years and Over.  European Urology, 52(3), 868-875. [ISI, Q1(sjr)]
    28. Hashimoto, k,. Kurokawa, E., Saito, T,. Sami, A,. & Nagatomi, R., Development of Reference Support System for Promotion of Exercise in Health Consultation, 先進予防型健康社会創世クラスター構想, vol. 2-3, pp. 1-4, 2009. (in Japanese)
    29. Sadreddini M, Sami A (2001) A model for physical suitability evaluation of Kor and Sivand subbasin Iranian Journal of Science and Technology-Transaction B, vol 25, 3, pp. 1-18. [ISI, Q4]

     

     National Journals:

    1. زهرا اسلامي مشكناني،‌ اشكان سامي تاثير اندازه هاي طراحي نسبت به اندازه هاي كد در بهبود كاآيي سامانه هاي آزمنون خودكار، مجله مهندسي برق دانشگاه تبريز، جلد 42، شماره 1، 1392
    2. اسمعيل پور ز، سامي ا (1394) گسترش ابزارهاي خودكار رديابي الگوهاي طراحي با عملگر تصحيح برچسب مجله مهندسي برق دانشگاه تبريز 45:11-26
    3. شفيعي سروستاني ج، سامي ا (1394) بهبود امنيت با استفـاده از معيارهـاي استخـراج شـده از مخازن نرم افزاري- معيار فعاليت توسعه دهنده مجله مهندسي برق دانشگاه تبريز 45:55-66
    4. خزاعي قوژدي ع، سامي ا (1392) پيش بيني نفوذ به سيستم ها به وسيله متن كاوي علوم و مهندسي كامپيوتر 11:54-63
     

     Conferences:

    1. Joonbakhsh Alireza and Sami Ashkan, Mining and Extraction of Personal Software Process measures through IDE Interaction logs, The 15th International Conference on Mining Software Repositories (MSR 2018), Gothenburg, Sweden, 28-29 May, 2018.
    2. Kazemi A, Kazemi K, Sami A, Sharifian, R "Predicting patient survival after liver transplantation using decision tree technique " The 18th Congress of the European Society for Organ Transplantation-ESOT (2017), 24-27 September, 2017, Barcelona, Spain.
    3. Kazemi A, Kazemi K, Sami A, Sharifian, R "SURVIVAL PREDICTION OF PATIENTS AFTER LIVER TRANSPLANTATION IN SHIRAZ ORGAN TRANSPLANTATION CENTER USING MACHINE LEARNING " The 18th Congress of the European Society for Organ Transplantation-ESOT (2017), 24-27 September, 2017, Barcelona, Spain.
    4. Khoshnood N, Sami A, Ezzatzadegan-Jahromi S, Nematolahi M "Temporal Patterns in Knowledge Discovery of Hemodialysis Patients’ Data" 16th Int Congress of Nephrology, Dialysis and Transplantation (2017), 16-19 May, 2017.
    5. Firouraghi N, Ezzatzadegan-Jahromi S, Sami A, Sharifian, R "Vascular Access Types Usage Duration and Mortality Through the First Year of Hemodialysis " 16th Int Congress of Nephrology, Dialysis and Transplantation (2017), 16-19 May, 2017.
    6. Sami A, Firouraghi N, Ezzatzadegan-Jahromi S, Sharifian, R "Generating Vast Number of Hypotheses Requires Having a Complete Hemodialysis Registry " 16th Int Congress of Nephrology, Dialysis and Transplantation (2017), Shiraz, Iran; 16-19 May, 2017.
    7. Firouraghi N, Ezzatzadegan-Jahromi S, Sami A, Sharifian, R "ASSESSMENT OF DATA QUALITY AND RECOMMENDATIONS TO IMPROVE QUALITY OF SHIRAZ UNIVERSITY OF MEDICAL SCIENCES HEMODIALYSIS DATABASE " اولين کنگره بين المللي انفورماتيک پزشکي (2017), Mashhad, Iran.
    8. N Fallahi, A Sami, M Tajbakhsh, “Automated flow-based rule generation for network intrusion detection systems,” Electrical Engineering (ICEE), 2016 24th Iranian Conference on, 1948-1953, Shiraz, Iran.
    9. Sara Moshtari, Ashkan Sami, Evaluating and Comparing Complexity, Coupling and a New Proposed Set of Coupling Metrics in Cross-Project Vulnerability Prediction, 31st ACM SAC 2016, April 4-8, 2016, pp1415-1421, Pisa, Italy.
    10. Mahdi Azimi, Ashkan Sami, Abdullah Khalili: A security test-bed for industrial control systems. MoSEMInA 2014: 26-31
    11. Abdullah Khalili, Ashkan Sami, Mahboobeh Ghiasi, Sara Moshtari, Zahra Salehi, Mahdi Azimi: Software engineering issues regarding securing ICS: an industrial case study. MoSEMInA 2014: 1-6
    12. Fatemeh Karbalaee, Ashkan Sami, Mansour Ahmadi, Semantic Malware Detection by Deploying Graph Mining, IT Security for the Next Generation, Hong Kong, 2012.
    13. Masoud Narouei, Mansour Ahmadi, Ashkan Sami, Mining Modules’ Dependencies for Malware Detection, IT Security for the Next Generation, Netherlands, 2012 (3rd Rank).
    14. Zahra Salehi, Mahboobeh Ghiasi, Ashkan Sami, A Miner for Malware Detection Based on API Function Calls and Their Arguments, 16th CSI International Symposium on Artificial Intelligence and Signal Processing (AISP 2012)
    15. Ashkan Sami, Mansour Ahmadi, Hossein Rahimi, Babak Yadegari, Detection of Polymorphic Malware Based on Mining Iterative API Call Patterns, IT Security for Next Generation, 2011.
    16. Seyed Hamid Mirisaee, Saman Nourzadeh, Ashkan Sami, Reza Sameni, “Mining Friendship from Cell-Phone Switch Data”, The 3rd International Conference on Human-centric Computing (HumanCom 2010) , August 11 - 13, 2010, Cebu, Philippines.
    17. Yasser Tabandeh and Ashkan Sami, “Classification of Tutor System Logs with High Categorical Features” KDD Cup 2010 Workshop, July 25, 2010. Held as part of 16th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD 2010) in Washington, DC July 25-28. (http://pslcdatashop.org/KDDCup/workshop/papers/JMLR_Y10.pdf) - 4th Student Place.
    18. Ashkan Sami, Fatemeh Nikoomaram, “Keyword Extraction Based on Binary Matrix Decomposition”, CICIS 2010, June 1-3, 2010, Zanjan. (In Farsi)
    19. Mansour Ahmadi, Ashkan Sami, Hossein Rahimi, Babak Yadegari, “Malware Detection Based on Mining Behavior”, CICIS 2010, June 1-3, 2010, Zanjan. (In Farsi)
    20. Seyed Hamid Mirisaee, Saman Nourzadeh, Ashkan Sami, “Mining Friendship Based on Mobile Phone Data”, CICIS 2010, June 1-3, 2010, Zanjan. (In Farsi)
    21. Ashkan Sami, Mostafa Fakhrahmad, “Design-Level Metrics Estimation Based on Code Metrics”, The 25th ACM Symposium on Applied Computing-Software Engineering Track, Sierre, Switzerland, 21 - 26 March 2010. (29.6% acceptance rate)
    22. Ashkan Sami, Hossein Rahimi, Babak Yadegar, Naser Peiravian, Sattar Hashemi, Ali Hamze, “Malware Detection Based On Mining API Calls”, The 25th ACM Symposium on Applied Computing-Data Mining Track, Sierre, Switzerland, 21 - 26 March 2010. (25.5% acceptance rate)
    23. Hossin Rahimi, Babak Yadegari, Ashkan Sami, Naser Peiravian, Sattar Hashemi, “Malware Detection Based on Data Mining”, CSICC 2010, Tehran; Iran. (In Farsi)
    24. Elham Chitsaz and Ashkan Sami, “An Optimized Method in Discriminative Pattern Discover for Classificaiton Purposes”, CSICC 2010, 20-22 February 2010, Tehran; Iran. (In Farsi)
    25. Ehsan Ahmadi, Mohammad Taheri, Narjes Mirshekari, Sattar Hashemi, , Ali Hamzeh, Ashkan Sami, “Cooperative Fuzzy Rulebase Construction Based on a Novel Fuzzy Decision Tree”, 6th International Conference on Innovations in Information Technology, (Innovations’09), Al Ain, UAE, 15-17 December, 2009. (Best Paper Award)
    26. Niloofar Mozafari, Mina Alibeigi, Sattar Hashemi, Ashkan Sami, Ali Hamzeh, “Toward Robust Privacy Preserving Clustering: A Weighted Ensemble Approach”, The 3rd Iranian Data Mining Conference (IDMC’09), Tehran, Iran, 15-16 December, 2009.
    27. Naser Peiravian; Hossein Rahimi; Ashkan Sami; Babak Yadgari, “Data Mining for CRM on Massive and Unbalance Data of Telecommunication Companies”, The 3rd Iranian Data Mining Conference (IDMC’09), Tehran, Iran, 15-16 December, 2009.
    28. Alireza Naeimi Sadigh, Sattar Hashemi, Ali Hamze, Ashkan Sami, “A Game Theory Approach for Linearity Support Vector Machines and Comparison of Methods for Multi-Class”, The 3rd Iranian Data Mining Conference (IDMC’09), Tehran, Iran, 15-16 December, 2009.
    29. Ashkan Sami, Ehsan Khoddam Mohammadi, Mohammad J. Mahzoon, Ali Askari and Ashkan Ghaffari Nejad, “The Green Ensemble Report for AusDM 2009”, Report of Australian Data Mining Challenge – Ensemble; Melbourne, Australia, December 1-4, 2009.                                                             (http://www.tiberius.biz/ausdm09/AusDM09EnsemblingChallenge.pdf)
    30. S.M. Fakhrahmad and Ashkan Sami, “Effective Estimation of Modules' Metrics in Software Defect Prediction”, World Congress of Engineering; London; July 2009. (Certificate of Merits – Student)
    31. Ashkan Sami, Ryoichi Nagatomi and Kazuo Hashimoto, ”gBoosting as a Method of Novelty Detection,” IEICE Tech. Rep., vol. 108, no. 182, HIP2008-45, pp. 71-84, Aug. 2008.
    32. Ashkan Sami, Ryoichi Nagatomi, Masahiro Terabe and Kazuo Hashimoto, "Design of Physical Activity Recommendation System" IADIS European Conference on Data Mining 2008, ECDM 2008, Amsterdam, the Netherlands, 24 to 26 July, 2008.
    33. Ashkan Sami, Ryoichi Nagatomi, Makoto Takahashi, Takeshi Tokuyama, “SDI: Shape Distribution Indicator and its Application to Find Interrelationships between Physical Activity Tests and Other Medical Measures” AI 2006, LNAI, Hobart, Tasmania, Australia, 4th to 8th December, 2006. (13.2% acceptance rate)
    34. Ashkan Sami, “Obstacles and Misunderstandings Facing Medical Data Mining”, The Second International Conference on Advanced Data Mining Applications, LNAI 4093, ADMA 2006 Xi'an, China, August 14-16, 2006. (22.3% acceptance rate)
    35. Ashkan Sami, Ryoichi Nagatomi, Makoto Takahashi, Takeshi Tokuyama, “OSDM: Optimized Shape Distribution Method”, The Second International Conference on Advanced Data Mining Applications, LNAI 4093, ADMA 2006 Xi'an, China, August 14-16, 2006. (22.3% acceptance rate)
    36. Sami, A. and Takahashi, M., “Decision Tree Construction for Genetic Applications based on Association Rules”, IEEE TENCON 2005, Melbourne, Australia, 21-25 .November 2005.
    37. Sami, A., Takahashi, M. and Kitamura, M., “FMIC: Finding the Most Important Contributor in Small Companies with Diverse Projects”, SICE 2005, Okayama, Japan, 8-10 August 2005.
    38. Sami, A. and Takahashi, M., “FAF: Finding All Features Relating to Different Gene Sequences” Workshop on Knowledge Discovery and Data Management in Biomedical Sciences, Hanoi, Vietnam, 18 May 2005.
    39. Sami, A. “Main Axes of University-Industry Relationship” Industry and Mining First Seminar on University-Government-Industry Relationship, Shiraz, Iran, 30 September to 1st of October, 2003.
    40. Sami,A. “e-Strategy: The First Step in IT Development” Golestan Seminar on IT, Golestan, Iran 2003.
    41. Sami,A. “e-Business and e-Commerce: Similarities and Differences” Golestan Seminar on IT, Golestan, Iran 2003.
    42. Sami, A. “Developing Information Systems Considering Business Intelligence” 1 st Conference of Management of Technology, Tehran, Iran, 9-11 June, 2003
    43. Sami, Ashkan “Important Factors in Software Development Life Cycle”, Fars IT Workshop, Shiraz, Iran, October 2002.
    44. Sami, A. “A close distance to advanced industrial control systems”, Conference on Feasibility Study on producing Modern Control Systems, Bandar Imam, Iran 1997.(in Farsi).

     

    National Conferences:

     

    1. ده بزرگي ف، سامي ا "مديريت پيکربندي بر اساس نتايج حاصل از ارزيابي در مدل CMMI (مطالعه موردي يک شرکت معتبر نرم افزاري در ايران) " بيست و يکمين کنفرانس مهندسي برق ايران (2013)
    2. سامي ا، رحماني ح، كارگرفرد ف، سالاري ا، شفيعي سروستاني ج، ده بزرگي ف، خشت زرين ع "بهبود فرآيند بر اساس مدل يکپارچه بلوغ/توانمندي CMMI با استفاده از نقشه راه IDEAL در يک شرکت توليد کننده نرم افزاري بزرگ ايران " بيست و يکمين کنفرانس مهندسي برق ايران (2013)
    3. محمدزاده درزي س، سامي ا، كريمي م "شناسايي بدافزار با استفاده از کاوش رفتار فايل هاي خوش خيم " IKT2013 (2013)
    4. کيخا م، خليلي ع، صفوي س، سامي ا "تحليلي بر ويژگي هاي نرم افزاري مطرح اسکادا و امکان پذيري توليد اسکاداي بومي " IKT2013 (2013)
    5. ده بزرگي ف، سامي ا "ارائه نتايج ارزيابي مبتني بر وزن دهي به نواحي فرآيندي در مدل CMMI(مطالعه موردي يک شرکت معتبر نرم افزاري " IKT2013 (2013)
    6. ده بزرگي ف، سامي ا "بومي سازي مديريت پيکربندي بر اساس CMMI براي يک شرکت معتبر نرم افزاري در ايران " IKT2013 (2013)
    7. رحماني ح، سامي ا، شفيعي سروستاني ج "دلايل انتخاب و بومي سازي نقشه راه IDEAL جهت پياده سازي مدل بهبود فرآيند CMMI در يک شرکت ايراني توليد کننده نرم افزار " IKT2013 (2013)
    8. -حسيني ع، سامي ا، خون جوش ف، محمدي خواه م "كاربرد محاسبات ابري در خوشه بندي بدافزار " دوازدهمين كنفرانس سيستم هاي هوشمند (1393)
    9. شفيعي سروستاني ج، سامي ا "تحليلي بر متريک فعاليت توسعه دھنده در شناسايي آسيبپذيري نرم افزار با استفاده از کاوش مخازن نرم افزاري " دوازدهمين كنفرانس سيستم هاي هوشمند (1392
    10. خليلي م، زماني ا، سامي ا "تهيه نقشه لرزه خيزي ايران با بهرهگيري از قوانين چند گانه " هفدهمين همايش انجمن زمين شناسي ايران (1392)

     

    Other Journal and Published Reports:

     

    1. Firouraghi N, Ezzatzadegan Jahromi SH, Sami A, Morvaridi M, Sharifian R. Data Quality Assessment and Recommendations to Improve the Quality of Hemodialysis Database. J Health Man & Info. 2018; 5(1): 21-26. [ISC indexed]
    2. Ghiasi, M., Sami, A., & Salehi, Z, DyVSoR: Dynamic Malware Detection Based on Extracting Patterns from Value Sets of Registers, The ISC International Journal of Information Security, 2013; 5(1), 71-82. [ISC indexed]
    3. Sami, A., Khalili, A., Davanian, A., Azimi, M. (2013). Era of Insecure Industrial Control Systems and Calamities to Come. Journal of Electronic Systems, 3(4), 155-165. [ISC]
    4. Karbalae, F., Sami, A., & Ahmadi, M. (2012). Semantic Malware Detection by Deploying Graph Mining. IJCSI International Journal of Computer Science Issues, 9(1), 373-379.
    5. Dallaki, H., Sami, A., Hamzeh, A., & Hashemi, S. (2011). Using Feature Selection for Speed up Hybrid PSO/ACO, Journal of Computing, 3, 54-60.
    6. Sami, A. “Texture Recognition Based on Entropy of Two Dimensional Fourier Transform”, Technical Report, Department of Computer Science and Engineering, Shiraz University 1995.
    7. Sami, A. “Problems with Use of Unicode 3.0 Standard as the Farsi Standard for Computer Coding System”, Technical Document presented to High Commission of Computer Society in Iran; Asre Andishe Engineering Services, Shiraz, Iran, 1999.
    8. Sami, A. “Importance of E-Commerce in Iran”, Technical Report, Shiraz University, 1999.
    9. Tarahomi, M. and Sami, A. “Analysis of Logistic Department of Islamic Republic of Iran Train Company based on OMT methodology”  2003 (in Farsi).
    10. Sami, A and Haj Manoochehri, F. “Conceptual Design and management issues of national-industries portal” 2003(in Farsi).
Team

 

Researchers

Mohammad Mehreganfar

Mohammad Mehreganfar is Currently Researcher in the Dr. Sami research Lab at Shiraz University. He earned his Bachelor of Engineering in Computer Engineering, at Fasa University in Fasa, Fars, Iran, in 2013, and his Master in Computer Engineering from the Shiraz University, Shiraz in 2015, working with Prof. Ashkan Sami. In his thesis work he introduced a way to create a Cost Effective and Authentic Cyber Physical System's Honeypot.

 

Mehdi Gholami

A Computer enthusiast, Researcher and Developer. I've a keen interest in Cyber Security, and its application in real life. I've more than 2 years’ hands on experience in a wide spectrum from hardware level security to security management systems. We've been able to manage and develop industrial level projects like Industrial Control Systems Security including SCADA, RTU, PLC, etc. And also developing hardware-based solutions for mitigating security threats. On the other extreme of spectrum, I've done work and research on Information security management solution to prevent advanced cyber security attacks

 

Mahsa Raeiszadeh

 I received my B.S. in Information Technology from Shiraz University of Technology in 2014 and my M.S. in Information Technology from the Shiraz University under the supervision of Dr. Hooman Tahayori in 2018. My Interests aren  on IoT in Smart Building and Smart City, Intelligent System and Data Mining. Also I am an instructor in the Department of Computer Enginnering at the Pasargad Institute of Education in Shiraz.

publications:

M.Raeiszadeh and H.Tahayori “A Novel Method for Detecting and Predicting Resident’s Behavior in Smart Home” in The 6th Iranian joint congress on Fuzzy and Intelligent Systems (17th conference on Fuzzy Systems and 15th conference on Intelligent Systems), 2018 

M.Raeiszadeh, H.Tahayori and A.Visconti, “Discovering Uncertain Patterns of Normal and Interleaved ADLs in Smart Homes”, Applied Intelligence,(Revised)

Zahra Fereidooni

Recently I received my Master degree from Shiraz University in Information Technology field in 2018. During my degree, I have a research into IoT. My bachelor degree received form Persian Gulf university in Bushehr and 3 semesters as a gust in Shiraz University. I have highly experience in web design and teamwork.

publication:

Z. Fereidooni, H. Tahayori,” Minimizing Required Sensors for Leak Detection in WDN – a Heuristic
Approach”,13th Pipeline technology conference, Berlin, 2018.

 

 

Ph.D

Ali Reza Honarvar

Thesis title

Ali Reza Honarvar is a PhD Student of Software Engineering under the supervision of Dr. Ashkan sami at Department of Computer Engineering and Information Technology of Shiraz University.  I obtained my Master and Bachelor degrees in Software Engineering from Sheikh Bahaei University and Shiraz Azad University respectively. I worked on a range of topics including data mining, big data, multi-agent systems, distributed systems, parallel processing, smart city, internet of things, and ecommerce.

 

Neda Azoji

Thesis title

….

 

 

Mohammad Sadegh

Bashkari

Thesis title

….

 

 

Mostafa Mohammadpourfard


A Systematic Approach to Improve Cyber Security of Power Systems

 

….

 

Master

Seyedeh Vida Afzali


 


Prioritize the Vulnerabilities in Internet of Medical Things (IoMT)

 

 

I am Seyedeh Vida Afzali a master student of Software Engineering in shiraz university (2017- until now) and I My research is about IoMT. I received my B.S. in software engineering in shiraz university (2011-2016). you can check my experience on this link:

https://ir.linkedin.com/in/svafzali

 

Alireza Joonbakh


Mining IDE Interaction logs    

 

Energetic software engineer with 5+ years’ experience developing robust code for businesses. An enthusiastic team player and deep creative thinker. Team player software engineer with phenomenal time management skills, and a strong user focus. Has developed several web, mobile and desktop apps.

Education:

Bachelor degree in software engineering: From Sep '11 to Feb '16 - Urmia University 

Master’s degree in software engineering: Sep '16 to Present - Shiraz University

 

I'm currently a graduate student of Software Engineering in Shiraz University. My research is focused on "Software Engineering Processes" and involves Data Mining and developing tools to Improve Software Processes.

Publications:

Alireza Joonbakhsh and Ashkan Sami. 2018. Mining and Extraction of Personal Software Process measures through IDE Interaction logs. In Proceedings of MSR '18: 15th International Conference on Mining Software Repositories (MSR '18). ACM, New York, NY, USA, 4 pages. 

Website: http://jeyart.ir

 

 

Ali Taghados


security analysis of smart metering device

 

Ali Taghaddos received his BS in Information Technology from Shiraz University of Technology

in 2015 and since Sep 2016 he is an MS student in Information Security at Shiraz University. His

area of interest includes ISMS, IoT security, data mining, honeypot, cisco switching and routing.

His Research is about security analysis of smart metering device. Every day the importance of

security in the IoT world becomes more significant. One of the important dimensions of the

Internet of Things is using in advanced metering infrastructure, where the smart meter is one of

the components of this infrastructure. A smart meter is a new kind of gas and electricity meter

that can digitally send meter readings to your energy supplier for more accurate energy bills.

 

Reza Karimian


Prioritize Vulnerabilities in Industrial Control Systems

 

Reza Karimian received his BS in Information Technology Engineering from Ilam University in

2016. Since 2016, he is an MS student in Information Security in Shiraz University. His area of

interest includes mobile programming, honeypot, data mining, ISMS and security in industrial

control systems.

He is working on prioritize vulnerabilities in industrial control systems. Due to the difference in

the priority of security dimensions in the field of information technology and industrial systems,

it is necessary to prioritize the vulnerability of industrial control systems.

Given that our resources and facilities are limited in security of the system, this priority can be

used to identify the critical parts in industrial control systems, that it makes a huge contribution

to building, designing and securing this system to security professionals.

Since these systems are based on the vital and critical task that the responsibility (Hard Real-

Time) for any defect in their operation, can be to irreparable damage to human, property and the

environment.

 

Nahid Sajadian


-----

 

I am Seyede Nahid Sajadian, a Master Student of software engineering by Dr.  Ashkan Sami’s supervision at Department of Computer Engineering and Information Technology of Shiraz University.

I obtained my bachelor degree in software engineering of Jahrom University.

I have been working on data mining (big data) .

 

 

Alumni Student