关注
Vahid Heydari
Vahid Heydari
在 morgan.edu 的电子邮件经过验证
标题
引用次数
引用次数
年份
Scalable anti-censorship framework using moving target defense for web servers
V Heydari, S Kim, SM Yoo
IEEE Transactions on Information Forensics and Security 12 (5), 1113-1124, 2017
252017
Moving target defense for securing SCADA communications
V Heydari
IEEE Access 6, 33329-33343, 2018
242018
Secure vpn using mobile ipv6 based moving target defense
V Heydari, SM Yoo, S Kim
2016 IEEE Global Communications Conference (GLOBECOM), 1-6, 2016
162016
Securing critical infrastructure by moving target defense
V Heydari, SM Yoo
Proc. 11th Int. Conf. Cyber Warfare Secur.(ICCWS), 382-390, 2016
152016
Anti-censorship framework using mobile IPv6 based moving target defense
V Heydari, S Kim, SM Yoo
Proceedings of the 11th Annual Cyber and Information Security Research …, 2016
82016
Supervisory control and data acquisition testbed for research and education
J Stranahan, T Soni, V Heydari
2019 IEEE 9th Annual Computing and Communication Workshop and Conference …, 2019
72019
E2EACK: An end-to-end acknowledgment-based scheme against collusion black hole and slander attacks in MANETs
V Heydari, SM Yoo
Wireless Networks 22, 2259-2273, 2016
62016
IP hopping by mobile IPv6
V Heydari
Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense, 983-1010, 2018
52018
Preventing ssh remote attacks using moving target defense
V Heydari
Proc. 13th Int. Conf. Cyber Warfare Secur.(ICCWS), 272-280, 2018
52018
Lightweight acknowledgement-based method to detect misbehavior in MANETs
V Heydari, SM Yoo
KSII Transactions on Internet and Information Systems (TIIS) 9 (12), 5150-5169, 2015
52015
EACK: end-to-end acknowledgement-based method for reliable data collection in wireless sensor networks
V Heydari, SM Yoo
2015 2nd International Conference on Information Science and Security (ICISS …, 2015
32015
Moving target defense enhanced by mobile ipv6
V Heydari, S Yoo
7th Annual Southeastern Cyber Security Summit, 2015
32015
Timeout Period Analysis to Detect Black Hole Attack in Multihop Wireless Ad Hoc Networks
V Heydari, SM Yoo
International Journal of Wireless Information Networks 25, 15-29, 2018
22018
A new acknowledgment-based scheme against malicious nodes and collusion attack in MANETs
V Heydari
2012 IEEE 14th International Conference on Communication Technology, 784-788, 2012
22012
Using smart glasses for facial recognition
GA Mayorga, X Do, V Heydari
American Journal of Undergraduate Research 15 (4), 23-35, 2019
12019
Moving Target Defense for Avionic Systems
V Heydari
2018 National Cyber Summit (NCS), 53-57, 2018
12018
Moving target defense based on mobile IPv6
V Heydari
The University of Alabama in Huntsville, 2017
2017
ACKNOWLEDGEMENT-BASED METHODS TO DETECT BLACK HOLE ATTACK IN MOBILE AD HOC NETWORKS ОБЗОР ПОДТВЕРЖДЕННЫХ МЕТОДОВ ДЛЯ ОБНАРУЖЕНИЯ ПРОБЛЕМ ОТКАЗА В ОБСЛУЖИВАНИИ AD HOC В …
H Vahid, Y Seong-Moo, A Zhamanov
Вестник Кыргызского государственного университета строительства, транспорта …, 2014
2014
Moving Target Defense for IP-based Control
V Heydari
Poster: Secure VPN using Mobile IPv6 based Moving Target Defense
V Heydari
系统目前无法执行此操作,请稍后再试。
文章 1–20