Openflow random host mutation: transparent moving target defense using software defined networking JH Jafarian, E Al-Shaer, Q Duan Proceedings of the first workshop on Hot topics in software defined networks …, 2012 | 739 | 2012 |
Random host mutation for moving target defense E Al-Shaer, Q Duan, JH Jafarian International Conference on Security and Privacy in Communication Systems …, 2012 | 201 | 2012 |
An Effective Address Mutation Approach for Disrupting Reconnaissance Attacks JH Jafarian, E Al-Shaer, Q Duan IEEE Transactions on Information Forensics and Security 10 (12), 2562 - 2577, 2015 | 166 | 2015 |
Efficient random route mutation considering flow and network constraints Q Duan, E Al-Shaer, H Jafarian 2013 IEEE Conference on Communications and Network Security (CNS), 260-268, 2013 | 148 | 2013 |
Spatio-temporal address mutation for proactive cyber agility against sophisticated attackers JHH Jafarian, E Al-Shaer, Q Duan Proceedings of the First ACM Workshop on Moving Target Defense, 69-78, 2014 | 125 | 2014 |
Adversary-aware IP address randomization for proactive agility against sophisticated attackers JH Jafarian, E Al-Shaer, Q Duan 2015 IEEE conference on computer communications (INFOCOM), 738-746, 2015 | 88 | 2015 |
Formal approach for route agility against persistent attackers JH Jafarian, E Al-Shaer, Q Duan Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013 | 62 | 2013 |
Multi-dimensional host identity anonymization for defeating skilled attackers JH Jafarian, A Niakanlahiji, E Al-Shaer, Q Duan Proceedings of the 2016 ACM Workshop on Moving Target Defense, 47-58, 2016 | 39 | 2016 |
Conceal: A strategy composition for resilient cyber deception-framework, metrics and deployment Q Duan, E Al-Shaer, M Islam, H Jafarian 2018 IEEE Conference on Communications and Network Security (CNS), 1-9, 2018 | 33 | 2018 |
Webmtd: defeating web code injection attacks using web element attribute mutation A Niakanlahiji, JH Jafarian Proceedings of the 2017 Workshop on Moving Target Defense, 17-26, 2017 | 20 | 2017 |
Towards a general framework for optimal role mining: A constraint satisfaction approach JH Jafarian, H Takabi, H Touati, E Hesamifard, M Shehab Proceedings of the 20th ACM Symposium on Access Control Models and …, 2015 | 18 | 2015 |
A game-theoretically optimal defense paradigm against traffic analysis attacks using multipath routing and deception M Abolfathi, I Shomorony, A Vahid, JH Jafarian Proceedings of the 27th ACM on symposium on access control models and …, 2022 | 17 | 2022 |
CAMAC: A Context-Aware Mandatory Access Control Model. JH Jafarian, M Amini ISeCure 1 (1), 2009 | 17 | 2009 |
WebMTD: defeating cross‐site scripting attacks using moving target defense A Niakanlahiji, JH Jafarian Security and Communication Networks 2019 (1), 2156906, 2019 | 14 | 2019 |
A vagueness-based obfuscation technique for protecting location privacy JH Jafarian 2010 IEEE Second International Conference on Social Computing, 865-872, 2010 | 13 | 2010 |
GTHBAC: a generalized temporal history based access control model AN Ravari, JH Jafarian, M Amini, R Jalili Telecommunication Systems 45, 111-125, 2010 | 12 | 2010 |
Insider threat mitigation using moving target defense and deception H Takabi, JH Jafarian Proceedings of the 2017 international workshop on managing insider security …, 2017 | 11 | 2017 |
Protecting location privacy through a graph-based location representation and a robust obfuscation technique JH Jafarian, AN Ravari, M Amini, R Jalili Information Security and Cryptology–ICISC 2008: 11th International …, 2009 | 11 | 2009 |
Deliverying Honeypots as a Service JH Jafarian, A Niakanlahiji 53rd Hawaii International Conference on System Sciences (HICSS 53), 1835-1844, 2020 | 9 | 2020 |
HoneyBug: Personalized cyber deception for web applications A Niakanlahiji, JH Jafarian, BT Chu, E Al-Shaer | 9 | 2020 |