Openflow random host mutation: transparent moving target defense using software defined networking JH Jafarian, E Al-Shaer, Q Duan Proceedings of the first workshop on Hot topics in software defined networks …, 2012 | 749 | 2012 |
Random host mutation for moving target defense E Al-Shaer, Q Duan, JH Jafarian International Conference on Security and Privacy in Communication Systems …, 2012 | 205 | 2012 |
An Effective Address Mutation Approach for Disrupting Reconnaissance Attacks JH Jafarian, E Al-Shaer, Q Duan IEEE Transactions on Information Forensics and Security 10 (12), 2562 - 2577, 2015 | 174 | 2015 |
Efficient random route mutation considering flow and network constraints Q Duan, E Al-Shaer, H Jafarian 2013 IEEE Conference on Communications and Network Security (CNS), 260-268, 2013 | 152 | 2013 |
Spatio-temporal address mutation for proactive cyber agility against sophisticated attackers JHH Jafarian, E Al-Shaer, Q Duan Proceedings of the first ACM workshop on moving target defense, 69-78, 2014 | 127 | 2014 |
Adversary-aware IP address randomization for proactive agility against sophisticated attackers JH Jafarian, E Al-Shaer, Q Duan 2015 IEEE conference on computer communications (INFOCOM), 738-746, 2015 | 89 | 2015 |
Formal approach for route agility against persistent attackers JH Jafarian, E Al-Shaer, Q Duan European Symposium on Research in Computer Security, 237-254, 2013 | 67 | 2013 |
Multi-dimensional host identity anonymization for defeating skilled attackers JH Jafarian, A Niakanlahiji, E Al-Shaer, Q Duan Proceedings of the 2016 ACM Workshop on Moving Target Defense, 47-58, 2016 | 40 | 2016 |
Conceal: A strategy composition for resilient cyber deception-framework, metrics and deployment Q Duan, E Al-Shaer, M Islam, H Jafarian 2018 IEEE Conference on Communications and Network Security (CNS), 1-9, 2018 | 34 | 2018 |
A game-theoretically optimal defense paradigm against traffic analysis attacks using multipath routing and deception M Abolfathi, I Shomorony, A Vahid, JH Jafarian Proceedings of the 27th ACM on symposium on access control models and …, 2022 | 21 | 2022 |
Webmtd: defeating web code injection attacks using web element attribute mutation A Niakanlahiji, JH Jafarian Proceedings of the 2017 Workshop on Moving Target Defense, 17-26, 2017 | 21 | 2017 |
Towards a general framework for optimal role mining: A constraint satisfaction approach JH Jafarian, H Takabi, H Touati, E Hesamifard, M Shehab Proceedings of the 20th ACM Symposium on Access Control Models and …, 2015 | 18 | 2015 |
CAMAC: A Context-Aware Mandatory Access Control Model. JH Jafarian, M Amini ISeCure 1 (1), 2009 | 16 | 2009 |
WebMTD: defeating cross‐site scripting attacks using moving target defense A Niakanlahiji, JH Jafarian Security and Communication Networks 2019 (1), 2156906, 2019 | 15 | 2019 |
Toward practical defense against traffic analysis attacks on encrypted DNS traffic A Niakanlahiji, S Orlowski, A Vahid, JH Jafarian Computers & Security 124, 103001, 2023 | 13 | 2023 |
GTHBAC: a generalized temporal history based access control model AN Ravari, JH Jafarian, M Amini, R Jalili Telecommunication Systems 45, 111-125, 2010 | 13 | 2010 |
A vagueness-based obfuscation technique for protecting location privacy JH Jafarian 2010 IEEE Second International Conference on Social Computing, 865-872, 2010 | 13 | 2010 |
Detecting network scanning through monitoring and manipulation of DNS traffic JH Jafarian, M Abolfathi, M Rahimian IEEE Access 11, 20267-20283, 2023 | 12 | 2023 |
Deliverying Honeypots as a Service JH Jafarian, A Niakanlahiji 53rd Hawaii International Conference on System Sciences (HICSS 53), 1835-1844, 2020 | 11 | 2020 |
Insider threat mitigation using moving target defense and deception H Takabi, JH Jafarian Proceedings of the 2017 international workshop on managing insider security …, 2017 | 11 | 2017 |