关注
Amirreza Niakanlahiji
Amirreza Niakanlahiji
Senior Security Researcher, Microsoft Corporation
在 microsoft.com 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
All one needs to know about fog computing and related edge computing paradigms: A complete survey
A Yousefpour, C Fung, T Nguyen, K Kadiyala, F Jalali, A Niakanlahiji, ...
Journal of Systems Architecture 98, 289-330, 2019
14392019
Phishmon: A machine learning framework for detecting phishing webpages
A Niakanlahiji, BT Chu, E Al-Shaer
2018 IEEE International Conference on Intelligence and Security Informatics …, 2018
552018
Trip distribution modeling with Twitter data
N Pourebrahim, S Sultana, A Niakanlahiji, JC Thill
Computers, Environment and Urban Systems 77, 101354, 2019
512019
A natural language processing based trend analysis of advanced persistent threat techniques
A Niakanlahiji, J Wei, BT Chu
2018 IEEE International Conference on Big Data (Big Data), 2995-3000, 2018
412018
Multi-dimensional host identity anonymization for defeating skilled attackers
JH Jafarian, A Niakanlahiji, E Al-Shaer, Q Duan
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 47-58, 2016
392016
Iocminer: Automatic extraction of indicators of compromise from twitter
A Niakanlahiji, L Safarnejad, R Harper, BT Chu
2019 IEEE International Conference on Big Data (Big Data), 4747-4754, 2019
352019
ShadowMove: A Stealthy Lateral Movement Strategy
A Niakanlahiji, J Wei, MR Alam, Q Wang, BT Chu
29th USENIX Security Symposium (USENIX Security '20), 2020
212020
WebMTD: Defeating Web Code Injection Attacks using Web Element Attribute Mutation
A Niakanlahiji, JH Jafarian
Proceedings of the 2017 Workshop on Moving Target Defense, 17-26, 2017
202017
All one needs to know about fog computing and related edge computing paradigms
A Yousefpour, C Fung, T Nguyen, K Kadiyala, F Jalali, A Niakanlahiji, ...
Journal of Systems Architecture, 0
17
Predicting Zero-day Malicious IP Addresses
A Niakanlahiji, MM Pritom, BT Chu, E Al-Shaer
Proceedings of the 2017 Workshop on Automated Decision Making for Active …, 2017
142017
WebMTD: defeating cross‐site scripting attacks using moving target defense
A Niakanlahiji, JH Jafarian
Security and Communication Networks 2019 (1), 2156906, 2019
122019
Delivering Honeypots as a Service
JH Jafarian, A Niakanlahiji
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020
92020
HoneyBug: Personalized Cyber Deception for Web Applications
A Niakanlahiji, JH Jafarian, BT Chu, E Al-Shaer
Proceedings of the 53rd Hawaii International Conference on System Sciences …, 2020
92020
Toward practical defense against traffic analysis attacks on encrypted DNS traffic
A Niakanlahiji, S Orlowski, A Vahid, JH Jafarian
Computers & Security 124, 103001, 2023
62023
A Deception Planning Framework for Cyber Defense.
JH Jafarian, A Niakanlahiji
HICSS, 1-10, 2020
62020
MultiRHM: Defeating multi-staged enterprise intrusion attacks through multi-dimensional and multi-parameter host identity anonymization
JH Jafarian, A Niakanlahiji
Computers & Security 124, 102958, 2023
12023
Discovering zero-day attacks by leveraging cyber threat intelligence
A Niakanlahiji
Order, 2019
12019
Encrypted traffic obfuscation method and system
A Vahid, H Jafarian, A Niakanlahiji
US Patent App. 18/456,657, 2024
2024
Worm Containment in Gnutella Network with Heterogeneity
AR Niakan-Lahiji, B Sadeghiyan
International Journal of Information and Electronics Engineering 2 (3), 451, 2012
2012
系统目前无法执行此操作,请稍后再试。
文章 1–19