default search action
Bahman Zamani
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j32]Mohammadreza Sharbaf, Bahman Zamani, Gerson Sunyé:
CoMPers: A configurable conflict management framework for personalized collaborative modeling. J. Syst. Softw. 219: 112227 (2025) - 2024
- [j31]Atefeh Nirumand, Bahman Zamani, Behrouz Tork Ladani:
A comprehensive framework for inter-app ICC security analysis of Android apps. Autom. Softw. Eng. 31(2): 45 (2024) - [j30]Samaneh Hoseindoost, Afsaneh Fatemi, Bahman Zamani:
An executable domain-specific modeling language for simulating organizational auction-based coordination strategies for crisis response. Simul. Model. Pract. Theory 131: 102880 (2024) - 2023
- [j29]Hayyan Hasan, Behrouz Tork Ladani, Bahman Zamani:
Maaker: A framework for detecting and defeating evasion techniques in Android malware. J. Inf. Secur. Appl. 78: 103617 (2023) - [j28]Mohammadreza Sharbaf, Bahman Zamani, Gerson Sunyé:
Conflict management techniques for model merging: a systematic mapping review. Softw. Syst. Model. 22(3): 1031-1079 (2023) - [j27]Atefeh Nirumand, Bahman Zamani, Behrouz Tork Ladani, Jacques Klein, Tegawendé F. Bissyandé:
A model-based framework for inter-app Vulnerability analysis of Android applications. Softw. Pract. Exp. 53(4): 895-936 (2023) - [c15]Hamed Barangi, Shekoufeh Kolahdouz Rahimi, Bahman Zamani, Hossein Moradi:
An Ontology-based Approach to Facilitate Semantic Interoperability of Context-Aware Systems. CSICC 2023: 1-5 - [c14]Zohreh Hashemian, Bahman Zamani, Mansour Adibi:
Leveraging Model Driven Techniques for Designing Web-GIS Systems. CSICC 2023: 1-5 - 2022
- [j26]Maryam Mehrabi, Bahman Zamani, Abdelwahab Hamou-Lhadj:
HealMA: a model-driven framework for automatic generation of IoT-based Android health monitoring applications. Autom. Softw. Eng. 29(2): 56 (2022) - [j25]Amirhosein Sayyadabdi, Behrouz Tork Ladani, Bahman Zamani:
Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System. ISC Int. J. Inf. Secur. 14(3): 61-69 (2022) - [j24]Mohammadreza Sharbaf, Bahman Zamani, Gerson Sunyé:
Automatic resolution of model merging conflicts using quality-based reinforcement learning. J. Comput. Lang. 71: 101123 (2022) - [c13]Mahdi Banisharif, Arman Mazloumzadeh, Mohammadreza Sharbaf, Bahman Zamani:
Automatic Generation of Business Intelligence Chatbot for Organizations. CSICC 2022: 1-5 - [c12]Mohammad-Sajad Kasaei, Mohammadreza Sharbaf, Bahman Zamani:
Towards a Formalism for Specifying N-way Model Merging Rules. CSICC 2022: 1-7 - [c11]Atefeh Nirumand, Bahman Zamani, Behrouz Tork Ladani:
A Model-Based Approach for Representing Data Sharing Mechanism in Android Applications. CSICC 2022: 1-7 - [i1]Amirhosein Sayyadabdi, Behrouz Tork Ladani, Bahman Zamani:
Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System. CoRR abs/2208.11062 (2022) - 2021
- [j23]Mohammadali Gharaat, Mohammadreza Sharbaf, Bahman Zamani, Abdelwahab Hamou-Lhadj:
ALBA: a model-driven framework for the automatic generation of android location-based apps. Autom. Softw. Eng. 28(1): 2 (2021) - [j22]Alireza Khalilian, Ahmad Baraani-Dastjerdi, Bahman Zamani:
CGenProg: Adaptation of cartesian genetic programming with migration and opposite guesses for automatic repair of software regression faults. Expert Syst. Appl. 169: 114503 (2021) - [j21]Hayyan Hasan, Behrouz Tork Ladani, Bahman Zamani:
MEGDroid: A model-driven event generation framework for dynamic android malware analysis. Inf. Softw. Technol. 135: 106569 (2021) - [j20]Hayyan Hasan, Behrouz Tork Ladani, Bahman Zamani:
Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware. ISC Int. J. Inf. Secur. 13(2): 131-143 (2021) - [j19]Mahsa Panahandeh, Mohammad Hamdaqa, Bahman Zamani, Abdelwahab Hamou-Lhadj:
MUPPIT: a method for using proper patterns in model transformations. Softw. Syst. Model. 20(5): 1491-1523 (2021) - [c10]Hasan Deeb, Hayyan Hasan, Behrouz Tork Ladani, Bahman Zamani:
A machine learning approach for detecting and categorizing evasion sources in Android malware. ISCISC 2021: 28-34 - [c9]Mohammadreza Sharbaf, Bahman Zamani, Gerson Sunyé:
Towards Personalized Change Propagation for Collaborative Modeling. MoDELS (Companion) 2021: 3-7 - [d1]Hayyan Hasan, Hasan Deeb, Behrouz Tork Ladani, Bahman Zamani:
Android malware dynamic evasions. IEEE DataPort, 2021 - 2020
- [j18]Hossein Moradi, Bahman Zamani, Kamran Zamanifar:
CaaSSET: A Framework for Model-Driven Development of Context as a Service. Future Gener. Comput. Syst. 105: 61-95 (2020) - [j17]Banafsheh Azizi, Bahman Zamani, Shekoufeh Kolahdouz Rahimi:
SEET: Symbolic Execution of ETL Transformations. J. Syst. Softw. 168: 110675 (2020) - [j16]Fazilat Hojaji, Bahman Zamani, Abdelwahab Hamou-Lhadj, Tanja Mayerhofer, Erwan Bousse:
Lossless compaction of model execution traces. Softw. Syst. Model. 19(1): 199-230 (2020) - [j15]Mohammadreza Sharbaf, Bahman Zamani:
Configurable three-way model merging. Softw. Pract. Exp. 50(8): 1565-1599 (2020) - [j14]Alireza Khalilian, Ahmad Baraani-Dastjerdi, Bahman Zamani:
APRSuite: A suite of components and use cases based on categorical decomposition of automatic program repair techniques and tools. J. Comput. Lang. 57: 100927 (2020) - [c8]Hayyan Hasan, Behrouz Tork Ladani, Bahman Zamani:
Enhancing Monkey to trigger malicious payloads in Android malware. ISCISC 2020: 65-72 - [c7]Mohammadreza Sharbaf, Bahman Zamani, Gerson Sunyé:
A Formalism for Specifying Model Merging Conflicts. SAM 2020: 1-10
2010 – 2019
- 2019
- [j13]Samaneh Hoseindoost, Tahereh Adamzadeh, Bahman Zamani, Afsaneh Fatemi:
A model-driven framework for developing multi-agent systems in emergency response environments. Softw. Syst. Model. 18(3): 1985-2012 (2019) - [j12]Fazilat Hojaji, Tanja Mayerhofer, Bahman Zamani, Abdelwahab Hamou-Lhadj, Erwan Bousse:
Model execution tracing: a systematic mapping study. Softw. Syst. Model. 18(6): 3461-3485 (2019) - [j11]Atefeh Nirumand, Bahman Zamani, Behrouz Tork Ladani:
VAnDroid: A framework for vulnerability analysis of Android applications using a model-driven reverse engineering technique. Softw. Pract. Exp. 49(1): 70-99 (2019) - [j10]Leila Samimi-Dehkordi, Bahman Zamani, Shekoufeh Kolahdouz Rahimi:
Leveraging product line engineering for the development of domain-specific metamodeling languages. J. Comput. Lang. 51: 193-213 (2019) - [j9]Amirabbas Majd, Mojtaba Vahidi-Asl, Alireza Khalilian, Ahmad Baraani-Dastjerdi, Bahman Zamani:
Code4Bench: A multidimensional benchmark of Codeforces data for different program analysis techniques. J. Comput. Lang. 53: 38-52 (2019) - 2018
- [j8]Bahman Zamani, Shiva Rasoulzadeh:
A Domain Specific Modeling Language for Enterprise Application Development. Int. J. Inf. Technol. Syst. Approach 11(2): 51-70 (2018) - [j7]Leila Samimi-Dehkordi, Bahman Zamani, Shekoufeh Kolahdouz Rahimi:
EVL+Strace: a novel bidirectional model transformation approach. Inf. Softw. Technol. 100: 47-72 (2018) - [c6]Samaneh Hoseindoost, Meysam Karimi, Shekoufeh Kolahdouz Rahimi, Bahman Zamani:
Solving the Quality-based Software-Selection and Hardware-Mapping Problem with ACO. TTC@STAF 2018: 19-30 - 2017
- [j6]Mahsa Sadat Panahandeh, Bahman Zamani:
Automatic Pattern Proposition in Transformation Life Cycle. Int. J. Inf. Technol. Syst. Approach 10(2): 1-16 (2017) - [j5]Marzieh Safarzadeh, Mahboubeh Taghizadeh, Bahman Zamani, Behrouz Tork Ladani:
An automatic test case generator for evaluating implementation of access control policies. ISC Int. J. Inf. Secur. 9(1): 73-91 (2017) - [j4]Alireza Rouhi, Bahman Zamani:
A model-based framework for automatic generation of a pattern language verifier. Softw. Pract. Exp. 47(12): 1945-1980 (2017) - [c5]Leila Samimi-Dehkordi, Bahman Zamani, Shekoufeh Kolahdouz Rahimi:
Solving the Families to Persons Case Using EVL+Strace. TTC@STAF 2017: 54-62 - [c4]Mohammadreza Sharbaf, Shekoufeh Kolahdouz Rahimi, Bahman Zamani:
Solving the State Elimination Case Study Using Epsilon. TTC@STAF 2017: 91-95 - 2016
- [j3]Leila Samimi-Dehkordi, Alireza Khalilian, Bahman Zamani:
Applying Programming Language Evaluation Criteria for Model Transformation Languages. Int. J. Softw. Informatics 10(4) (2016) - [j2]Alireza Rouhi, Bahman Zamani:
Towards a formal model of patterns and pattern languages. Inf. Softw. Technol. 79: 1-16 (2016) - 2013
- [j1]Bahman Zamani, Greg Butler:
Pattern Language Verification in Model Driven Design. Inf. Sci. 237: 343-355 (2013)
2000 – 2009
- 2009
- [c3]Bahman Zamani, Greg Butler:
Describing Pattern Languages for Checking Design Models. APSEC 2009: 197-204 - 2008
- [c2]Bahman Zamani, Sahar Kayhani, Greg Butler:
A Pattern Language Verifier for Web-Based Enterprise Applications. MoDELS 2008: 553-567 - [c1]Bahman Zamani, Greg Butler, Sahar Kayhani:
Tool Support for Pattern Selection and Use. SQM@CSMR 2008: 127-142
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint