Scalable anti-censorship framework using moving target defense for web servers V Heydari, S Kim, SM Yoo IEEE Transactions on Information Forensics and Security 12 (5), 1113-1124, 2017 | 25 | 2017 |
Moving target defense for securing SCADA communications V Heydari IEEE Access 6, 33329-33343, 2018 | 24 | 2018 |
Secure vpn using mobile ipv6 based moving target defense V Heydari, SM Yoo, S Kim 2016 IEEE Global Communications Conference (GLOBECOM), 1-6, 2016 | 16 | 2016 |
Securing critical infrastructure by moving target defense V Heydari, SM Yoo Proc. 11th Int. Conf. Cyber Warfare Secur.(ICCWS), 382-390, 2016 | 15 | 2016 |
Anti-censorship framework using mobile IPv6 based moving target defense V Heydari, S Kim, SM Yoo Proceedings of the 11th Annual Cyber and Information Security Research …, 2016 | 8 | 2016 |
Supervisory control and data acquisition testbed for research and education J Stranahan, T Soni, V Heydari 2019 IEEE 9th Annual Computing and Communication Workshop and Conference …, 2019 | 7 | 2019 |
E2EACK: An end-to-end acknowledgment-based scheme against collusion black hole and slander attacks in MANETs V Heydari, SM Yoo Wireless Networks 22, 2259-2273, 2016 | 6 | 2016 |
IP hopping by mobile IPv6 V Heydari Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense, 983-1010, 2018 | 5 | 2018 |
Preventing ssh remote attacks using moving target defense V Heydari Proc. 13th Int. Conf. Cyber Warfare Secur.(ICCWS), 272-280, 2018 | 5 | 2018 |
Lightweight acknowledgement-based method to detect misbehavior in MANETs V Heydari, SM Yoo KSII Transactions on Internet and Information Systems (TIIS) 9 (12), 5150-5169, 2015 | 5 | 2015 |
EACK: end-to-end acknowledgement-based method for reliable data collection in wireless sensor networks V Heydari, SM Yoo 2015 2nd International Conference on Information Science and Security (ICISS …, 2015 | 3 | 2015 |
Moving target defense enhanced by mobile ipv6 V Heydari, S Yoo 7th Annual Southeastern Cyber Security Summit, 2015 | 3 | 2015 |
Timeout Period Analysis to Detect Black Hole Attack in Multihop Wireless Ad Hoc Networks V Heydari, SM Yoo International Journal of Wireless Information Networks 25, 15-29, 2018 | 2 | 2018 |
A new acknowledgment-based scheme against malicious nodes and collusion attack in MANETs V Heydari 2012 IEEE 14th International Conference on Communication Technology, 784-788, 2012 | 2 | 2012 |
Using smart glasses for facial recognition GA Mayorga, X Do, V Heydari American Journal of Undergraduate Research 15 (4), 23-35, 2019 | 1 | 2019 |
Moving Target Defense for Avionic Systems V Heydari 2018 National Cyber Summit (NCS), 53-57, 2018 | 1 | 2018 |
Moving target defense based on mobile IPv6 V Heydari The University of Alabama in Huntsville, 2017 | | 2017 |
ACKNOWLEDGEMENT-BASED METHODS TO DETECT BLACK HOLE ATTACK IN MOBILE AD HOC NETWORKS ОБЗОР ПОДТВЕРЖДЕННЫХ МЕТОДОВ ДЛЯ ОБНАРУЖЕНИЯ ПРОБЛЕМ ОТКАЗА В ОБСЛУЖИВАНИИ AD HOC В … H Vahid, Y Seong-Moo, A Zhamanov Вестник Кыргызского государственного университета строительства, транспорта …, 2014 | | 2014 |
Moving Target Defense for IP-based Control V Heydari | | |
Poster: Secure VPN using Mobile IPv6 based Moving Target Defense V Heydari | | |