Securing SCADA Systems
Shiraz University, Shiraz, Iran 
Shiraz University, Shiraz, Iran 
Short description of portfolio item number 1
Shiraz University and Shiraz Electricity Distribution Company (ShED Co.), Shiraz, Iran 
Shiraz University and Shiraz Electricity Distribution Company (ShED Co.), Shiraz, Iran 
Published in , 2009
Moshtari, S., Sami, A. and Azimi, M., 2013. Using complexity metrics to improve software security. Computer Fraud & Security, 2013(5), pp.8-17. Download paper here
Recommended citation: Moshtari, S., Sami, A. and Azimi, M., 2013. Using complexity metrics to improve software security. Computer Fraud & Security, 2013(5), pp.8-17. http://academicpages.github.io/files/paper1.pdf
Published in In 2020 IEEE 20th International Working Conference on Source Code Analysis and Manipulation (SCAM) (pp. 75-86), 2009
DOI:10.1109/SCAM51674.2020.00014
Recommended citation: Moshtari, S., Santos, J.C., Mirakhorli, M. and Okutan, A., 2020. "Paper Title Number 2." Journal 1. 1(2). http://academicpages.github.io/files/paper2.pdf
Published in , 2009
Recommended citation: Khalili, A., Sami, A., Azimi, M., Moshtari, S., Salehi, Z., Ghiasi, M. and Safavi, A.A., 2016. Empirical Software Engineering, 21(1), pp.4-16. http://academicpages.github.io/files/paper3.pdf
Published in , 2020
Looking for Software Defects? First Find the Nonconformists. In 2020 IEEE 20th International Working Conference on Source Code Analysis and Manipulation (SCAM) (pp. 75-86). IEEE. DOI:10.1109/SCAM51674.2020.00014.
Recommended citation: Moshtari, S., Sami, A. and Azimi, M., 2013. Using complexity metrics to improve software security. Computer Fraud & Security, 2013(5), pp.8-17. DOI:10.1109/SCAM51674.2020.00014.
Published:
CyberSecurity for Next Generation 2013.
Undergraduate courses, University of Applied Sciences, IT Depertment, 2013
Spring 2017: Introductory Programming, Software Engineering