Toward proactive, adaptive defense: A survey on moving target defense JH Cho, DP Sharma, H Alavizadeh, S Yoon, N Ben-Asher, TJ Moore, ... IEEE Communications Surveys & Tutorials 22 (1), 709-745, 2020 | 310 | 2020 |
Deep Q-learning based reinforcement learning approach for network intrusion detection H Alavizadeh, H Alavizadeh, J Jang-Jaccard Computers 11 (3), 41, 2022 | 123 | 2022 |
Harnessing GPT-4 for generation of cybersecurity GRC policies: A focus on ransomware attack mitigation T McIntosh, T Liu, T Susnjak, H Alavizadeh, A Ng, R Nowrozy, P Watters Computers & security 134, 103424, 2023 | 47 | 2023 |
Evaluation for combination of shuffle and diversity on moving target defense strategy for cloud computing H Alavizadeh, J Jang-Jaccard, DS Kim 2018 17th IEEE international conference on trust, security and privacy in …, 2018 | 42 | 2018 |
Comprehensive security assessment of combined MTD techniques for the cloud H Alavizadeh, JB Hong, J Jang-Jaccard, DS Kim Proceedings of the 5th ACM Workshop on Moving Target Defense, 11-20, 2018 | 32 | 2018 |
Scalable, high-performance, and generalized subtree data anonymization approach for Apache Spark SU Bazai, J Jang-Jaccard, H Alavizadeh Electronics 10 (5), 589, 2021 | 27 | 2021 |
Evaluating the effectiveness of shuffle and redundancy mtd techniques in the cloud H Alavizadeh, JB Hong, DS Kim, J Jang-Jaccard Computers & Security 102, 102091, 2021 | 25 | 2021 |
Effective security analysis for combinations of mtd techniques on cloud computing (short paper) H Alavizadeh, DS Kim, JB Hong, J Jang-Jaccard International Conference on Information Security Practice and Experience …, 2017 | 25 | 2017 |
A survey on cyber situation-awareness systems: Framework, techniques, and insights H Alavizadeh, J Jang-Jaccard, SY Enoch, H Al-Sahaf, I Welch, ... ACM Computing Surveys 55 (5), 1-37, 2022 | 23 | 2022 |
Model-based evaluation of combinations of shuffle and diversity MTD techniques on the cloud H Alavizadeh, DS Kim, J Jang-Jaccard Future Generation Computer Systems 111, 507-522, 2020 | 23 | 2020 |
A novel hybrid approach for multi-dimensional data anonymization for apache spark SU Bazai, J Jang-Jaccard, H Alavizadeh ACM Transactions on Privacy and Security 25 (1), 1-25, 2021 | 20 | 2021 |
Large-scale outlier detection for low-cost PM₁₀ sensors Y Wei, J Jang-Jaccard, F Sabrina, H Alavizadeh IEEE Access 8, 229033-229042, 2020 | 15 | 2020 |
An Automated Security Analysis Framework and Implementation for MTD Techniques on Cloud H Alavizadeh, J Jang-Jaccard, MN Torshiz Information Security and Cryptology-ICISC 2019: 22nd International …, 2020 | 15 | 2020 |
Evaluating the Security and Economic Effects of Moving Target Defense Techniques on the Cloud H Alavizadeh, S Aref, DS Kim, J Jang-Jaccard IEEE Transactions on Emerging Topics in Computing, 2022 | 9 | 2022 |
Cyber Situation Awareness Monitoring and Proactive Response for Enterprises on the Cloud H Alavizadeh, H Alavizadeh, J Jang-Jaccard 2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020 | 7 | 2020 |
A Markov game model for AI-based cyber security attack mitigation H Alavizadeh, J Jang-Jaccard, T Alpcan, SA Camtepe arXiv preprint arXiv:2107.09258, 2021 | 5 | 2021 |
Secure true random number generator in WLAN/LAN A Chefranov, SMA Abhari, H Alavizadeh, MF Zanjani Proceedings of the 6th International Conference on Security of Information …, 2013 | 5 | 2013 |
An automated security analysis framework and implementation for cloud H Alavizadeh, H Alavizadeh, DS Kim, J Jang-Jaccard, MN Torshiz arXiv preprint arXiv:1904.01758, 2019 | 4 | 2019 |
Cybersecurity skills of company directors—ASX 100 N Phair, H Alavizadeh Journal of Risk Management in Financial Institutions 15 (4), 429-436, 2022 | 3 | 2022 |
A game-theoretic approach for AI-based botnet attack defence H Alavizadeh, J Jang-Jaccard, T Alpcan, SA Camtepe arXiv preprint arXiv:2112.02223, 2021 | 3 | 2021 |