You are now in the main content area
Headshot of Dr. Mehdi Shajari

Dr. Mehdi Shajari

Assistant Professor
DepartmentInformation Technology Management
EducationPhD
Phone416-979-5000 x 557793

Overview

Dr. Mehdi Shajari is an Assistant Professor in the Ted Rogers School of IT Management. He holds a Ph.D. in Computer Science from the University of New Brunswick, and an M.Sc. in Computer Engineering from the Amirkabir University of Technology. In his previous academic positions, he worked with the University of Toronto, Ontario Tech University, National Research Council of Canada, University of New Brunswick, Trent University, and the Amirkabir University of Technology. Dr. Shajari holds CISSP and ISO27001 Lead Auditor certifications, and besides teaching and research, he has been involved with several IT industry collaborations and entrepreneurial projects.

Dr. Shajari’s research interests include cybersecurity, risk management, blockchain, applied machine learning and electronic commerce. His research initiative during his work at UNB and NRC resulted in the submission of a successful AIF funding proposal entitled “FAST Intrusion Detection project”. The project had a total estimated cost of $3.3 million and received $1.2 million from AIF over four years. Later at AUT, he was the director of Information Security and Electronic Commerce groups and the founder of the Information Security and Electronic Commerce (ISEC) Lab and the AUT Fintech Research Center. He also received two research excellence awards for his research supervision. Dr. Shajari’s most recent research at the University of Toronto was focused on the application of deep learning in cyber threat detection and response.

 
Dr. Shajari has supervised successful completion of Ph.D., Masters and Undergraduate projects in areas such as Cybersecurity, E-Commerce, Trust and Reputation, Blockchain, Fraud detections, and Recommender Systems. He is the author or co-author of numerous conferences, journals, and book chapters. His research appears in numerous prestigious journals, including IEEE Transaction on Service Computing, Future Generation Computer Systems, Expert Systems with Applications, Computers and Security, International Journal of Critical Infrastructure Protection, International Journal of Information Security, Computer Communication, Journal of Intelligent Information Systems, Information Retrieval, International Journal of Web Information Systems, and Electronic Commerce Research.

Google Scholar Profile (opens in new window) 

LinkedIn (external link, opens in new window) 

Cybersecurity, Risk Management, E-Commerce, Blockchain, Machine Learning.

Selected peer-reviewed journal articles
M. M. Ahmadian and M. Shajari,Industrial Control System Security Taxonomic Framework with Application to a Comprehensive Incidents Survey, (external link, opens in new window)  Elsevier International journal of critical infrastructure protection.
A. T. Haghighat and M. Shajari, “Computational Integrity Assurance for Emerging Distributed Computation Outsourcing Environments: The case of Block Withholding attacks on Bitcoin Mining Pools (external link, opens in new window) ,” IET Information Security.
M. Amirmazlaghani, S. Hosseinzadeh, and M. Shajari, “An aggregated statistical approach for network flood detection using Gamma-Normal mixture modelling, (external link, opens in new window) Elsevier Computer Communication, vol. 152, pp. 137-148, 2020.
T. Tavizi and M. Shajari,A Language and a Pattern System for Temporal Availability Property Specification: Advanced Metering Infrastructure Case Study (external link, opens in new window) ,” Springer International Journal of Information Security, 2020,
A. Roshanzamir, V. Weerakkody, N. Rana, M. Rahmati, and M. Shajari,  (PDF file) “Blockchain and Image Processing to Reinforce Provenance in the Narrative of a Handwoven Carpet, (external link, opens in new window) International Journal On Advances in Internet Technology, vol 12(3&4), pp. 61-75, 2019. 
R. Eskandari, M. Shajari, and M. M. Ghahfarokhi, ERES: an extended regular expression signature for polymorphic worm detection (external link, opens in new window) , Springer Journal of Computer Virology and Hacking Techniques, vol. 15(3), pp. 177-194, 2019.
A. T. Haghighat and M. Shajari, “Block Withholding Game Among Bitcoin Mining Pools (external link, opens in new window) ,” Elsevier Future Generation Computer Systems, vol. 97, pp. 482-491, 2019. 
S. Seifollahi and M. Shajari, “Word sense disambiguation application in sentiment analysis of news headlines: an applied approach to FOREX market prediction (external link, opens in new window) ,” Springer Journal of Intelligent Information Systems,  vol. 52, no. 1, pp. 57-83, 2019.
S. Nami and M. Shajari, “Cost-sensitive Payment Card Fraud Detection based on Dynamic Random Forest and K-Nearest Neighbors (external link, opens in new window) ,” Elsevier Expert Systems with Applications, vol. 110, pp. 381-392, 2018.
V. Zangeneh and M. Shajari, “A Cost-sensitive Move Selection Strategy for Moving Target Defense (external link, opens in new window) ,” Elsevier Computers and Security, vol. 75, pp. 72-91, 2018. 
M. Barzegar and M. Shajari, “Attack scenario reconstruction using intrusion semantics (external link, opens in new window) ,” Elsevier Expert Systems with Applications, vol. 108, pp. 119-133, 2018.
M. Riazati, M. Shajari, and S. Khorsandi, “An incentive mechanism to promote honesty among seller agents in electronic marketplaces, (external link, opens in new window)  Springer Electronic Commerce Research, vol. 19, no.1, pp. 231-255, 2019.
H. Kordestani and M. Shajari, “A Similarity-Based Framework for Detecting Phishing Website (external link, opens in new window) s,” International Journal of Advanced Research in Computer Science, vol. 9(1), pp. 792-796, 2018.
A. T. Haghighat and M. Shajari, “Service Integrity Assurance for Distributed Computation Outsourcing (external link, opens in new window) ,” IEEE Transaction on Service Computing, 2017. 
M. Mansoury and M. Shajari, "Improving Recommender Systems’ Performance on Cold-start Users and Controversial Items by a New Similarity Model (external link, opens in new window) ," International Journal of Web Information Systems, vol. 12(2), pp. 126-149, 2016.
M. Shahpasand, M. Shajari, and A. R. Hashemi, “A comprehensive Security Control Selection model for Interdependent Organizational Assets Structure (external link, opens in new window) ," Information Management and Computer Security, 2015.
M. A. Morid, M. Shajari, and A. R. Hashemi, "Defending recommender systems by influence analysis (external link, opens in new window) ," Springer Information Retrieval, vol. 17, pp. 137-152, 2014.
M. Raeesi, M. A. Morid, and M. Shajari, " (PDF file) Trust Evaluation Using an Improved Context Similarity Measurement (external link, opens in new window) ," International Journal of Business Information Systems Strategies, vol.3, pp. 1-19, 2014.
M. Raeesi, M. Shajari, and M. Nourollahi, "Scalability Improvement of Recommender Systems using Influential Users Extracted from Social Network’s Structure, International Journal of Mechatronics, Electrical and Computer Technology, vol. 4(12), pp. 1132-1154, 2014.
M. Pourbaferani and M. Shajari, "Truncated TrustRank: Propagating Trust Based on Target Node, (external link, opens in new window) " International Journal of Natural & Engineering Sciences, vol. 7, 2013. 
M. B. Nia, T. Ishaya, and Mehdi Shajari, “An Application of SOBI Architecture for Cross-selling in Telecoms Industry, (external link) International Journal of Engineering and Advanced Technology (IJEAT), 2013.
M. A. Morid and M. Shajari, "An enhanced e-commerce trust model for community-based centralized systems," Springer Electronic Commerce Research, vol. 12, pp. 409-427, 2012.
A. Shameli-Sendi, M. Shajari, M. Hassanabadi, M. Jabbarifar, and M. Dagenais, "Fuzzy multi-criteria decision-making for information security risk assessment, (external link, opens in new window) " Open Cybernetics & Systemics Journal, vol. 6, pp. 26-37, 2012.
A. Shameli-Sendi, M. Jabbarifar, M. Dagenais, and M. Shajari, "System Health Monitoring Using a Novel Method: Security Unified Process (external link, opens in new window) ," Journal of Computer Networks and Communications, vol. 2012, 2012.
S. Kardan and M. Shajari, "A lightweight buyer’s trust model for micropayment systems, (external link, opens in new window) " WSEAS Trans Inf Sci Appl, vol. 5, pp. 1170-1179, 2008.
Selected Conference publications
M. S. Arbabi and M. Shajari, “Decentralized Delivery Network of IoT updates based on Smart Contracts and Blockchain Technology,” IBM CASCON Conference, Nov. 2019.
S. Berenjian, M. Shajari, N. Farshid, and M. Hatamian, "Intelligent Automated Intrusion Response System based on fuzzy decision making and risk assessment," IEEE 8th International Conference on Intelligent Systems (IS), 2016.
R. Eskandari, M. Shajari, and A. Asadi, " Automatic signature generation for polymorphic worms by a combination of token extraction and sequence alignment approach," 7th Conference on Information and Knowledge Technology (IKT), 2015, pp.1-6.
M. Mansoury and M. Shajari, " Subjective implicit trust evaluation in online communities," 22nd Iranian Conference on Electrical Engineering (ICEE), 2014, pp. 949-954.
M. Mansoury and M. Shajari, “Enhanced Subjective Trust Evaluation using Items Ratings in Online Communities,” The 22nd Iranian Conference on Electrical Engineering (ICEE), 2014.
M. Raeesi, M. Jalali, and M. Shajari, "Using influential nodes of the stock network to measure Tehran Stock Exchange index," in 5th Conference on Information and Knowledge Technology (IKT), 2013, pp. 457-462.
H. Kordestani and M. Shajari, "An entice resistant automatic phishing detection," in 5th Conference on Information and Knowledge Technology (IKT), 2013, pp. 134-139.
S. Dinparast, M. G. Bakhtiari, and M. Shajari, "A mobile payment scheme using 2D-barcode," in 5th Conference on Information and Knowledge Technology (IKT), 2013, pp. 400-405.
T. Tavizi, M. Shajari, and P. Dodangeh, "A Usage Control Based Architecture for Cloud Environments," in IEEE 26th International in Parallel and Distributed Processing Symposium Workshops & Ph.D. Forum (IPDPSW), 2012, pp. 1534-1539.
M. Raeesi and M. Shajari, "An enhanced significance weighting approach for collaborative filtering," in Sixth International Symposium on Telecommunications (IST), 2012, pp. 1165-1169.
M. HaratiNik, M. Akrami, S. Khadivi, and M. Shajari, "FUZZGY: A hybrid model for credit card fraud detection," in Sixth International Symposium on Telecommunications (IST), 2012, pp. 1088-1093.
H. Jafarpour, M. Shajari, and H. Sheikholeslami, “A Model for Using Efficient Anonymous Payword-Base Micropayment in Mobile Commerce,” IADIS International Conference on e-Commerce, 2012.
M. A. Morid, M. Shajari, and A. H. Golpayegani, "Who are the most influential users in a recommender system?" in Proceedings of the 13th international conference on electronic commerce, 2011, p. 19.
G. Aghili, M. Shajari, S. Khadivi, and M. A. Morid, "Using Genre Interest of Users to Detect Profile Injection Attacks in Movie Recommender Systems," in 10th International Conference and Workshops on Machine Learning and Applications (ICMLA), 2011, pp. 49-52.
A. S. Sendi, M. Jabbarifar, M. Shajari, and M. Dagenais, "FEMRA: A Fuzzy expert model for risk assessment," in Fifth International Conference on Internet Monitoring and Protection (ICIMP), 2010, pp. 48-53.
M. H. Samadani, M. Shajari, and M. M. Ahaniha, "Self-Proxy Mobile Signature: A New Client-Based Mobile Signature Model," in IEEE 24th International Conference on Advanced Information Networking and Applications Workshops (WAINA), 2010, pp. 437-442.
M. H. Samadani, M. Shajari, and M. Ahaniha, "A survey on mobile digital signature models," in Proceedings of the 12th International Conference on Electronic Commerce: Roadmap for the Future of Electronic Business, 2010, pp. 141-145.
M. H. Samadani and M. Shajari, "Path reduction in complex grid service provision," in Proceedings of the 12th International Conference on Electronic Commerce: Roadmap for the Future of Electronic Business, 2010, pp. 88-93.
M. H. Samadani and M. Shajari, "Mobile Partial Identity Management: The Non-repudiable Minimal Mobile Identity Model," in Future Generation Information Technology, ed: Springer, 2010, pp. 439-449.
S. Niksefat, M. M. Ahaniha, B. Sadeghiyan, and M. Shajari, "Toward specification-based intrusion detection for web applications," in Recent Advances in Intrusion Detection, ed: Springer, 2010, pp. 510-511.
M. Hosseinkhani, E. Tarameshloo, and M. Shajari, "AMVPayword: secure and efficient anonymous Payword-based micropayment scheme," in International Conference on Computational Intelligence and Security (CIS), 2010, pp. 551-555.
N. Ghoreishi and M. Shajari, "Web-based SMS passenger application: a new approach to informing passengers via SMS in airlines," in International Conference on e-Education, e-Business, e-Management, and e-Learning (IC4E'10), 2010, pp. 469-472.
G. Vakili and M. Shajari, "An Enhanced Infrastructure for Peer-to-Peer Intrusion Detection Systems," in Environmental and Computer Science, 2009. ICECS'09. Second International Conference on, 2009, pp. 364-368.
M. S. Javan and M. Shajari, "Flash payment: payment using flash disks," in Proceedings of the 11th International Conference on Electronic Commerce, 2009, pp. 346-351.
A. Esmaeeli and M. Shajari, "MVPayword: Secure and efficient Payword-based micropayment scheme," in Second International Conference on the Applications of Digital Information and Web Technologies (ICADIWT'09), 2009, pp. 609-614.
M. Bayat and M. Shajari, "CAPSC: A context-aware payment system for supply-chains," in International Conference on Innovations in Information Technology (IIT), 2008, pp. 381-385.
S. Kardan and M. Shajari, "TMR2: an enhanced MR2 with a lightweight user trust model." In selected papers from Communication & Information Technology, Circuits, Systems and Signals, Applied Mathematics, Simulation, Modeling conferences, 2008, pp. 139-146.
H. Moaddab, M. Homayounpour, and M. Shajari, "Intrusion Detection in the computer network based on Idea from Crime detection in human societies", Iranian Conference on Electrical Engineering (ICEE), 2007.
M. Shajari and A. A. Ghorbani, "Agent-oriented design for network survivability," in the Proceedings of the 5th International Conference on Intelligent Systems Design and Applications (ISDA), 2005, pp. 166-171.
M. Shajari and A. A. Ghorbani, "Fuzzy Analysis of Network Incidents," in 9th IASTED International Conference on Artificial Intelligence & Soft Computing (ASC’05), vol. 5, 2005.
M. Shajari and A. A. Ghorbani, "Application of Belief-Desire-Intention Agents in Intrusion Detection & Response," in the Proceedings of Privacy, Security, Trust (PST’04), 2004, pp. 181-191.
M. Shajari and A. A. Ghorbani, "Using Fuzzy System to Manage False Alarms in Intrusion Detection," Security and Privacy in the Age of Uncertainty, IFIP TC11 18th International Conference on Information Security (SEC2003), pp. 241-252, 2003.
M. Shajari and A. A. Ghorbani, “Research in Progress: Design and Implementation of Fuzzy Adaptive Survivability Tool,” Best Paper Proceedings of 12th Annual EICAR Conference (EICAR2003), Copenhagen, Denmark, May 10-13, 2003.
M. Shajari and A. A. Ghorbani, “Dealing with Uncertainty in Intrusion Detection and Response”, in 11th GSA Annual Conference, Fredericton, New Brunswick, 14-15 February 2003.
M. Shajari, A. A. Ghorbani, and S. Marsh, “Fuzzy Adaptive Survivability Tool: Application of BDI Agents”, Poster presentation in MITACS Ottawa Interchange and Conference, Ottawa May 8, 2003. (Best poster award winner)
M. Shajari and A. A. Ghorbani, “Managing False Alarms in Intrusion Detection”, in APICS Mathematics/Statistics and Computer Science Conference (APICS2002), Mount Allison University, Sackville, New Brunswick, 18-20 October 2002.

Undergraduate

Course code Course title
ITM 301 IT Infrastructure
ITM 90A/B Graduation Project
ITM 706 Enterprise Architecture