Dr. Mehdi Shajari
Overview
Dr. Mehdi Shajari is an Assistant Professor in the Ted Rogers School of IT Management. He holds a Ph.D. in Computer Science from the University of New Brunswick, and an M.Sc. in Computer Engineering from the Amirkabir University of Technology. In his previous academic positions, he worked with the University of Toronto, Ontario Tech University, National Research Council of Canada, University of New Brunswick, Trent University, and the Amirkabir University of Technology. Dr. Shajari holds CISSP and ISO27001 Lead Auditor certifications, and besides teaching and research, he has been involved with several IT industry collaborations and entrepreneurial projects.
Dr. Shajari’s research interests include cybersecurity, risk management, blockchain, applied machine learning and electronic commerce. His research initiative during his work at UNB and NRC resulted in the submission of a successful AIF funding proposal entitled “FAST Intrusion Detection project”. The project had a total estimated cost of $3.3 million and received $1.2 million from AIF over four years. Later at AUT, he was the director of Information Security and Electronic Commerce groups and the founder of the Information Security and Electronic Commerce (ISEC) Lab and the AUT Fintech Research Center. He also received two research excellence awards for his research supervision. Dr. Shajari’s most recent research at the University of Toronto was focused on the application of deep learning in cyber threat detection and response.
Dr. Shajari has supervised successful completion of Ph.D., Masters and Undergraduate projects in areas such as Cybersecurity, E-Commerce, Trust and Reputation, Blockchain, Fraud detections, and Recommender Systems. He is the author or co-author of numerous conferences, journals, and book chapters. His research appears in numerous prestigious journals, including IEEE Transaction on Service Computing, Future Generation Computer Systems, Expert Systems with Applications, Computers and Security, International Journal of Critical Infrastructure Protection, International Journal of Information Security, Computer Communication, Journal of Intelligent Information Systems, Information Retrieval, International Journal of Web Information Systems, and Electronic Commerce Research.
Cybersecurity, Risk Management, E-Commerce, Blockchain, Machine Learning.
Selected Conference publications |
---|
M. S. Arbabi and M. Shajari, “Decentralized Delivery Network of IoT updates based on Smart Contracts and Blockchain Technology,” IBM CASCON Conference, Nov. 2019. |
S. Berenjian, M. Shajari, N. Farshid, and M. Hatamian, "Intelligent Automated Intrusion Response System based on fuzzy decision making and risk assessment," IEEE 8th International Conference on Intelligent Systems (IS), 2016. |
R. Eskandari, M. Shajari, and A. Asadi, " Automatic signature generation for polymorphic worms by a combination of token extraction and sequence alignment approach," 7th Conference on Information and Knowledge Technology (IKT), 2015, pp.1-6. |
M. Mansoury and M. Shajari, " Subjective implicit trust evaluation in online communities," 22nd Iranian Conference on Electrical Engineering (ICEE), 2014, pp. 949-954. |
M. Mansoury and M. Shajari, “Enhanced Subjective Trust Evaluation using Items Ratings in Online Communities,” The 22nd Iranian Conference on Electrical Engineering (ICEE), 2014. |
M. Raeesi, M. Jalali, and M. Shajari, "Using influential nodes of the stock network to measure Tehran Stock Exchange index," in 5th Conference on Information and Knowledge Technology (IKT), 2013, pp. 457-462. |
H. Kordestani and M. Shajari, "An entice resistant automatic phishing detection," in 5th Conference on Information and Knowledge Technology (IKT), 2013, pp. 134-139. |
S. Dinparast, M. G. Bakhtiari, and M. Shajari, "A mobile payment scheme using 2D-barcode," in 5th Conference on Information and Knowledge Technology (IKT), 2013, pp. 400-405. |
T. Tavizi, M. Shajari, and P. Dodangeh, "A Usage Control Based Architecture for Cloud Environments," in IEEE 26th International in Parallel and Distributed Processing Symposium Workshops & Ph.D. Forum (IPDPSW), 2012, pp. 1534-1539. |
M. Raeesi and M. Shajari, "An enhanced significance weighting approach for collaborative filtering," in Sixth International Symposium on Telecommunications (IST), 2012, pp. 1165-1169. |
M. HaratiNik, M. Akrami, S. Khadivi, and M. Shajari, "FUZZGY: A hybrid model for credit card fraud detection," in Sixth International Symposium on Telecommunications (IST), 2012, pp. 1088-1093. |
H. Jafarpour, M. Shajari, and H. Sheikholeslami, “A Model for Using Efficient Anonymous Payword-Base Micropayment in Mobile Commerce,” IADIS International Conference on e-Commerce, 2012. |
M. A. Morid, M. Shajari, and A. H. Golpayegani, "Who are the most influential users in a recommender system?" in Proceedings of the 13th international conference on electronic commerce, 2011, p. 19. |
G. Aghili, M. Shajari, S. Khadivi, and M. A. Morid, "Using Genre Interest of Users to Detect Profile Injection Attacks in Movie Recommender Systems," in 10th International Conference and Workshops on Machine Learning and Applications (ICMLA), 2011, pp. 49-52. |
A. S. Sendi, M. Jabbarifar, M. Shajari, and M. Dagenais, "FEMRA: A Fuzzy expert model for risk assessment," in Fifth International Conference on Internet Monitoring and Protection (ICIMP), 2010, pp. 48-53. |
M. H. Samadani, M. Shajari, and M. M. Ahaniha, "Self-Proxy Mobile Signature: A New Client-Based Mobile Signature Model," in IEEE 24th International Conference on Advanced Information Networking and Applications Workshops (WAINA), 2010, pp. 437-442. |
M. H. Samadani, M. Shajari, and M. Ahaniha, "A survey on mobile digital signature models," in Proceedings of the 12th International Conference on Electronic Commerce: Roadmap for the Future of Electronic Business, 2010, pp. 141-145. |
M. H. Samadani and M. Shajari, "Path reduction in complex grid service provision," in Proceedings of the 12th International Conference on Electronic Commerce: Roadmap for the Future of Electronic Business, 2010, pp. 88-93. |
M. H. Samadani and M. Shajari, "Mobile Partial Identity Management: The Non-repudiable Minimal Mobile Identity Model," in Future Generation Information Technology, ed: Springer, 2010, pp. 439-449. |
S. Niksefat, M. M. Ahaniha, B. Sadeghiyan, and M. Shajari, "Toward specification-based intrusion detection for web applications," in Recent Advances in Intrusion Detection, ed: Springer, 2010, pp. 510-511. |
M. Hosseinkhani, E. Tarameshloo, and M. Shajari, "AMVPayword: secure and efficient anonymous Payword-based micropayment scheme," in International Conference on Computational Intelligence and Security (CIS), 2010, pp. 551-555. |
N. Ghoreishi and M. Shajari, "Web-based SMS passenger application: a new approach to informing passengers via SMS in airlines," in International Conference on e-Education, e-Business, e-Management, and e-Learning (IC4E'10), 2010, pp. 469-472. |
G. Vakili and M. Shajari, "An Enhanced Infrastructure for Peer-to-Peer Intrusion Detection Systems," in Environmental and Computer Science, 2009. ICECS'09. Second International Conference on, 2009, pp. 364-368. |
M. S. Javan and M. Shajari, "Flash payment: payment using flash disks," in Proceedings of the 11th International Conference on Electronic Commerce, 2009, pp. 346-351. |
A. Esmaeeli and M. Shajari, "MVPayword: Secure and efficient Payword-based micropayment scheme," in Second International Conference on the Applications of Digital Information and Web Technologies (ICADIWT'09), 2009, pp. 609-614. |
M. Bayat and M. Shajari, "CAPSC: A context-aware payment system for supply-chains," in International Conference on Innovations in Information Technology (IIT), 2008, pp. 381-385. |
S. Kardan and M. Shajari, "TMR2: an enhanced MR2 with a lightweight user trust model." In selected papers from Communication & Information Technology, Circuits, Systems and Signals, Applied Mathematics, Simulation, Modeling conferences, 2008, pp. 139-146. |
H. Moaddab, M. Homayounpour, and M. Shajari, "Intrusion Detection in the computer network based on Idea from Crime detection in human societies", Iranian Conference on Electrical Engineering (ICEE), 2007. |
M. Shajari and A. A. Ghorbani, "Agent-oriented design for network survivability," in the Proceedings of the 5th International Conference on Intelligent Systems Design and Applications (ISDA), 2005, pp. 166-171. |
M. Shajari and A. A. Ghorbani, "Fuzzy Analysis of Network Incidents," in 9th IASTED International Conference on Artificial Intelligence & Soft Computing (ASC’05), vol. 5, 2005. |
M. Shajari and A. A. Ghorbani, "Application of Belief-Desire-Intention Agents in Intrusion Detection & Response," in the Proceedings of Privacy, Security, Trust (PST’04), 2004, pp. 181-191. |
M. Shajari and A. A. Ghorbani, "Using Fuzzy System to Manage False Alarms in Intrusion Detection," Security and Privacy in the Age of Uncertainty, IFIP TC11 18th International Conference on Information Security (SEC2003), pp. 241-252, 2003. |
M. Shajari and A. A. Ghorbani, “Research in Progress: Design and Implementation of Fuzzy Adaptive Survivability Tool,” Best Paper Proceedings of 12th Annual EICAR Conference (EICAR2003), Copenhagen, Denmark, May 10-13, 2003. |
M. Shajari and A. A. Ghorbani, “Dealing with Uncertainty in Intrusion Detection and Response”, in 11th GSA Annual Conference, Fredericton, New Brunswick, 14-15 February 2003. |
M. Shajari, A. A. Ghorbani, and S. Marsh, “Fuzzy Adaptive Survivability Tool: Application of BDI Agents”, Poster presentation in MITACS Ottawa Interchange and Conference, Ottawa May 8, 2003. (Best poster award winner) |
M. Shajari and A. A. Ghorbani, “Managing False Alarms in Intrusion Detection”, in APICS Mathematics/Statistics and Computer Science Conference (APICS2002), Mount Allison University, Sackville, New Brunswick, 18-20 October 2002. |