• Home
  • Afshin Rezakhani
  • OpenAccess
    • List of Articles Afshin Rezakhani

      • Open Access Article

        1 - Secured Access Control in Security Information and Event Management Systems
        Leila Rikhtechi Vahid Rafeh Afshin Rezakhani
        Nowadays, Security Information and Event Management (SIEM) is very important in software. SIEM stores and monitors events in software and unauthorized access to logs can prompt different security threats such as information leakage and violation of confidentiality. In t More
        Nowadays, Security Information and Event Management (SIEM) is very important in software. SIEM stores and monitors events in software and unauthorized access to logs can prompt different security threats such as information leakage and violation of confidentiality. In this paper, a novel method is suggested for secured and integrated access control in the SIEM. First, the key points where the SIEM accesses the information within the software is specified and integrated policies for access control are developed in them. Accordingly, the threats entered into the access control module embedded in this system are carefully detected. By applying the proposed method, it is possible to provide the secured and integrated access control module for SIEM as well as the security of the access control module significantly increases in these systems. The method is implemented in the three stages of the requirements analysis for the establishment of a secure SIEM system, secure architectural design, and secure coding. The access control module is designed to create a secured SIEM and the test tool module is designed for evaluating the access control module vulnerabilities. Also, to evaluate the proposed method, the dataset is considered with ten thousand records, and the accuracy is calculated. The outcomes show the accuracy of the proposed method is significantly improved. The results of this paper can be used for designing an integrated and secured access control system in SIEM systems. Manuscript profile
      • Open Access Article

        2 - A novel expanded version of Shor’s Algorithm and a real-time experiment using IBM Q-Experience Platform
        Afshin Rezakhani Sepehr Goodarzi Mahdi Maleki
        Data are stored on the memory of the classical computer in small units of classical bits, which could be either 0 or 1.On a Quantum Computer, The Quantum States of each Quantum Bit (Qbit), would be every possible number between 0 and 1, including themselves. By placing More
        Data are stored on the memory of the classical computer in small units of classical bits, which could be either 0 or 1.On a Quantum Computer, The Quantum States of each Quantum Bit (Qbit), would be every possible number between 0 and 1, including themselves. By placing the photons on a special state, which is a spot located at the middle of the two-dimensional space vectors (█(1@0)) and (█(1@1)) on the Unit Circle, which is called Superposition and we can take advantage of properties of this state when we place lots of vectors of N-dimensional spaces in superposition and we can do a parallelization and factorization for getting significant speedup. In fact, in Quantum Computing we are taking advantage of Quantum Dynamic Principles to process the data, which Classical Computers lack on, by considering the limitations of logical concepts behind them. Through this paper, we expand a quantum algorithm for the number of n Qbits in a new way and by implementing circuits using IBM-Q Experience, we are going to have some practical results, which are more obvious to be demonstrable. By expanding the Quantum Algorithms and using Linear Algebra, we can manage to achieve the goals at a higher level, the ones that Classical Computers are unable to perform, as machine learning problems with complicated models and by expanding the subject we can mention majors in different sciences like Chemistry (predicting the Structure of proteins with higher percentage accuracy in less period) and astronomy. Manuscript profile