Can we identify NAT behavior by analyzing traffic flows? Y Gokcen, VA Foroushani, ANZ Heywood 2014 IEEE Security and Privacy Workshops, 132-139, 2014 | 47 | 2014 |
Deterministic and authenticated flow marking for IP traceback VA Foroushani, AN Zincir-Heywood 2013 IEEE 27th International Conference on Advanced Information Networking …, 2013 | 37 | 2013 |
TDFA: traceback-based defense against DDoS flooding attacks VA Foroushani, AN Zincir-Heywood 2014 IEEE 28th International Conference on Advanced Information Networking …, 2014 | 36 | 2014 |
Intrusion detection in encrypted accesses with SSH protocol to network public servers VA Foroushani, F Adibnia, E Hojati 2008 International conference on computer and communication engineering, 314-318, 2008 | 31 | 2008 |
A proxy identifier based on patterns in traffic flows V Aghaei-Foroushani, AN Zincir-Heywood 2015 IEEE 16th International Symposium on High Assurance Systems Engineering …, 2015 | 28 | 2015 |
IP traceback through (authenticated) deterministic flow marking: an empirical evaluation V Aghaei-Foroushani, AN Zincir-Heywood EURASIP Journal on Information Security 2013, 1-24, 2013 | 22 | 2013 |
On evaluating ip traceback schemes: a practical perspective V Aghaei-Foroushani, AN Zincir-Heywood 2013 IEEE Security and Privacy Workshops, 127-134, 2013 | 19 | 2013 |
Autonomous system based flow marking scheme for IP-Traceback V Aghaei-Foroushani, AN Zincir-Heywood NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium, 121-128, 2016 | 12 | 2016 |
Investigating unique flow marking for tracing back DDoS attacks V Aghaei-Foroushani, AN Zincir-Heywood 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015 | 9 | 2015 |
Probabilistic flow marking for IP traceback (PFM) V Aghaei-Foroushani, AN Zincir-Heywood 2015 7th International Workshop on Reliable Networks Design and Modeling …, 2015 | 8 | 2015 |
Investigating application behavior in network traffic traces VA Foroushani, AN Zincir-Heywood 2013 IEEE Symposium on Computational Intelligence for Security and Defense …, 2013 | 8 | 2013 |
Remote management of computer networks by short message service M Ghasemzadeh, VA Foroushani 2008 International Conference on Computer and Communication Engineering, 300-305, 2008 | 3 | 2008 |
Deterministic flow marking for IPv6 traceback (DFM6) V Aghaei-Foroushani, AN Zincir-Heywood 2015 11th International Conference on Network and Service Management (CNSM …, 2015 | 1 | 2015 |
A SECURITY FRAMEWORK BASED ON FLOW MARKING IP-TRACEBACK TECHNIQUES V Aghaei Foroushani | | 2016 |
A SECURITY FRAMEWORK BASED ON FLOW MARKING IP-TRACEBACK TECHNIQUES. VA Foroushani Dalhousie University, 2016 | | 2016 |