All one needs to know about fog computing and related edge computing paradigms: A complete survey A Yousefpour, C Fung, T Nguyen, K Kadiyala, F Jalali, A Niakanlahiji, ... Journal of Systems Architecture 98, 289-330, 2019 | 1439 | 2019 |
Phishmon: A machine learning framework for detecting phishing webpages A Niakanlahiji, BT Chu, E Al-Shaer 2018 IEEE International Conference on Intelligence and Security Informatics …, 2018 | 55 | 2018 |
Trip distribution modeling with Twitter data N Pourebrahim, S Sultana, A Niakanlahiji, JC Thill Computers, Environment and Urban Systems 77, 101354, 2019 | 51 | 2019 |
A natural language processing based trend analysis of advanced persistent threat techniques A Niakanlahiji, J Wei, BT Chu 2018 IEEE International Conference on Big Data (Big Data), 2995-3000, 2018 | 41 | 2018 |
Multi-dimensional host identity anonymization for defeating skilled attackers JH Jafarian, A Niakanlahiji, E Al-Shaer, Q Duan Proceedings of the 2016 ACM Workshop on Moving Target Defense, 47-58, 2016 | 39 | 2016 |
Iocminer: Automatic extraction of indicators of compromise from twitter A Niakanlahiji, L Safarnejad, R Harper, BT Chu 2019 IEEE International Conference on Big Data (Big Data), 4747-4754, 2019 | 35 | 2019 |
ShadowMove: A Stealthy Lateral Movement Strategy A Niakanlahiji, J Wei, MR Alam, Q Wang, BT Chu 29th USENIX Security Symposium (USENIX Security '20), 2020 | 21 | 2020 |
WebMTD: Defeating Web Code Injection Attacks using Web Element Attribute Mutation A Niakanlahiji, JH Jafarian Proceedings of the 2017 Workshop on Moving Target Defense, 17-26, 2017 | 20 | 2017 |
All one needs to know about fog computing and related edge computing paradigms A Yousefpour, C Fung, T Nguyen, K Kadiyala, F Jalali, A Niakanlahiji, ... Journal of Systems Architecture, 0 | 17 | |
Predicting Zero-day Malicious IP Addresses A Niakanlahiji, MM Pritom, BT Chu, E Al-Shaer Proceedings of the 2017 Workshop on Automated Decision Making for Active …, 2017 | 14 | 2017 |
WebMTD: defeating cross‐site scripting attacks using moving target defense A Niakanlahiji, JH Jafarian Security and Communication Networks 2019 (1), 2156906, 2019 | 12 | 2019 |
Delivering Honeypots as a Service JH Jafarian, A Niakanlahiji Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020 | 9 | 2020 |
HoneyBug: Personalized Cyber Deception for Web Applications A Niakanlahiji, JH Jafarian, BT Chu, E Al-Shaer Proceedings of the 53rd Hawaii International Conference on System Sciences …, 2020 | 9 | 2020 |
Toward practical defense against traffic analysis attacks on encrypted DNS traffic A Niakanlahiji, S Orlowski, A Vahid, JH Jafarian Computers & Security 124, 103001, 2023 | 6 | 2023 |
A Deception Planning Framework for Cyber Defense. JH Jafarian, A Niakanlahiji HICSS, 1-10, 2020 | 6 | 2020 |
MultiRHM: Defeating multi-staged enterprise intrusion attacks through multi-dimensional and multi-parameter host identity anonymization JH Jafarian, A Niakanlahiji Computers & Security 124, 102958, 2023 | 1 | 2023 |
Discovering zero-day attacks by leveraging cyber threat intelligence A Niakanlahiji Order, 2019 | 1 | 2019 |
Encrypted traffic obfuscation method and system A Vahid, H Jafarian, A Niakanlahiji US Patent App. 18/456,657, 2024 | | 2024 |
Worm Containment in Gnutella Network with Heterogeneity AR Niakan-Lahiji, B Sadeghiyan International Journal of Information and Electronics Engineering 2 (3), 451, 2012 | | 2012 |