Openflow random host mutation: transparent moving target defense using software defined networking JH Jafarian, E Al-Shaer, Q Duan Proceedings of the first workshop on Hot topics in software defined networks …, 2012 | 734 | 2012 |
Randomizing AMI configuration for proactive defense in smart grid MQ Ali, E Al-Shaer, Q Duan 2013 IEEE International Conference on Smart Grid Communications …, 2013 | 243 | 2013 |
Random host mutation for moving target defense E Al-Shaer, Q Duan, JH Jafarian International Conference on Security and Privacy in Communication Systems …, 2012 | 203 | 2012 |
An effective address mutation approach for disrupting reconnaissance attacks JH Jafarian, E Al-Shaer, Q Duan IEEE Transactions on Information Forensics and Security 10 (12), 2562-2577, 2015 | 167 | 2015 |
Efficient random route mutation considering flow and network constraints Q Duan, E Al-Shaer, H Jafarian 2013 IEEE Conference on Communications and Network Security (CNS), 260-268, 2013 | 150 | 2013 |
Spatio-temporal address mutation for proactive cyber agility against sophisticated attackers JHH Jafarian, E Al-Shaer, Q Duan Proceedings of the First ACM Workshop on Moving Target Defense, 69-78, 2014 | 124 | 2014 |
Adversary-aware IP address randomization for proactive agility against sophisticated attackers JH Jafarian, E Al-Shaer, Q Duan 2015 IEEE conference on computer communications (INFOCOM), 738-746, 2015 | 89 | 2015 |
Agile virtualized infrastructure to proactively defend against cyber attacks F Gillani, E Al-Shaer, S Lo, Q Duan, M Ammar, E Zegura 2015 IEEE Conference on Computer Communications (INFOCOM), 729-737, 2015 | 84 | 2015 |
Formal approach for route agility against persistent attackers JH Jafarian, E Al-Shaer, Q Duan Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013 | 62 | 2013 |
Multi-dimensional host identity anonymization for defeating skilled attackers JH Jafarian, A Niakanlahiji, E Al-Shaer, Q Duan Proceedings of the 2016 ACM Workshop on Moving Target Defense, 47-58, 2016 | 39 | 2016 |
A novel class of robust covert channels using out-of-order packets A El-Atawy, Q Duan, E Al-Shaer IEEE Transactions on Dependable and Secure Computing 14 (2), 116-129, 2015 | 39 | 2015 |
Traffic-aware dynamic firewall policy management: techniques and applications Q Duan, E Al-Shaer IEEE Communications Magazine 51 (7), 73-79, 2013 | 36 | 2013 |
Conceal: A strategy composition for resilient cyber deception-framework, metrics and deployment Q Duan, E Al-Shaer, M Islam, H Jafarian 2018 IEEE Conference on Communications and Network Security (CNS), 1-9, 2018 | 34 | 2018 |
Energy efficient navigation management for hybrid electric vehicles on highways MA Rahman, Q Duan, E Al-Shaer Proceedings of the ACM/IEEE 4th International Conference on Cyber-Physical …, 2013 | 32 | 2013 |
Proactive routing mutation against stealthy Distributed Denial of Service attacks: metrics, modeling, and analysis Q Duan, E Al-Shaer, S Chatterjee, M Halappanavar, C Oehmen The Journal of Defense Modeling and Simulation 15 (2), 219-230, 2018 | 19 | 2018 |
A new paradigm for load balancing in wireless mesh networks M Virendra, Q Duan, S Upadhyaya, V Anand CSE Dept. State University of New York, Buffalo, 133-142, 2006 | 19 | 2006 |
In-design resilient SDN control plane and elastic forwarding against aggressive DDoS attacks F Gillani, E Al-Shaer, Q Duan Proceedings of the 5th ACM Workshop on Moving Target Defense, 80-89, 2018 | 17 | 2018 |
Provable configuration planning for wireless sensor networks Q Duan, S Al-Haj, E Al-Shaer 2012 8th international conference on network and service management (cnsm …, 2012 | 14 | 2012 |
Active defense against social engineering: The case for human language technology A Dalton, E Aghaei, E Al-Shaer, A Bhatia, E Castillo, Z Cheng, ... Proceedings for the First International Workshop on Social Threats in Online …, 2020 | 12 | 2020 |
Specification-driven moving target defense synthesis MM Islam, Q Duan, E Al-Shaer Proceedings of the 6th ACM Workshop on Moving Target Defense, 13-24, 2019 | 12 | 2019 |