Jafar Haadi Jafarian

Orcid: 0000-0001-8115-085X

According to our database1, Jafar Haadi Jafarian authored at least 36 papers between 2008 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Toward practical defense against traffic analysis attacks on encrypted DNS traffic.
Comput. Secur., 2023

MultiRHM: Defeating multi-staged enterprise intrusion attacks through multi-dimensional and multi-parameter host identity anonymization.
Comput. Secur., 2023

Detecting Network Scanning Through Monitoring and Manipulation of DNS Traffic.
IEEE Access, 2023

2022
A Game-Theoretically Optimal Defense Paradigm against Traffic Analysis Attacks using Multipath Routing and Deception.
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022

The Dangers of Money and Corporate Power Relating to Online Disinformation.
Proceedings of the 23rd IEEE International Conference on Mobile Data Management, 2022

HoneyTree: Making Honeywords Sweeter.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022

Arbitrarily Fast Switched Distributed Stabilization of Partially Unknown Interconnected Multiagent Systems: A Proactive Cyber Defense Perspective.
Proceedings of the American Control Conference, 2022

2021
Practical Black Box Model Inversion Attacks Against Neural Nets.
Proceedings of the Machine Learning and Principles and Practice of Knowledge Discovery in Databases, 2021

A Scalable Role Mining Approach for Large Organizations.
Proceedings of the IWSPA@CODASPY 2021: ACM Workshop on Security and Privacy Analytics, 2021

2020
Improved Deterministic Broadcasting for Multiple Access Channels.
Proceedings of the Intelligent Computing, 2020

HoneyBug: Personalized Cyber Deception for Web Applications.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

A Deception Planning Framework for Cyber Defense.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

Delivering Honeypots as a Service.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

An Accurate and Scalable Role Mining Algorithm based on Graph Embedding and Unsupervised Feature Learning.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

2019
WebMTD: Defeating Cross-Site Scripting Attacks Using Moving Target Defense.
Secur. Commun. Networks, 2019

A Novel Permutational Sampling Technique for Cooperative Network Scanning.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

2018
CONCEAL: A Strategy Composition for Resilient Cyber Deception-Framework, Metrics and Deployment.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Insider Threat Mitigation Using Moving Target Defense and Deception.
Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30, 2017

WebMTD: Defeating Web Code Injection Attacks using Web Element Attribute Mutation.
Proceedings of the 2017 Workshop on Moving Target Defense, 2017

2016
Multi-dimensional Host Identity Anonymization for Defeating Skilled Attackers.
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 2016

2015
An Effective Address Mutation Approach for Disrupting Reconnaissance Attacks.
IEEE Trans. Inf. Forensics Secur., 2015

Towards a General Framework for Optimal Role Mining: A Constraint Satisfaction Approach.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

Adversary-aware IP address randomization for proactive agility against sophisticated attackers.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

2014
On DDoS Attack Related Minimum Cut Problems.
CoRR, 2014

Spatio-temporal Address Mutation for Proactive Cyber Agility against Sophisticated Attackers.
Proceedings of the First ACM Workshop on Moving Target Defense, 2014

2013
Formal Approach for Route Agility against Persistent Attackers.
Proceedings of the Computer Security - ESORICS 2013, 2013

Efficient Random Route Mutation considering flow and network constraints.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
Openflow random host mutation: transparent moving target defense using software defined networking.
Proceedings of the first workshop on Hot topics in software defined networks, 2012

Random Host Mutation for Moving Target Defense.
Proceedings of the Security and Privacy in Communication Networks, 2012

2011
A gray-box DPDA-based intrusion detection technique using system-call monitoring.
Proceedings of the 8th Annual Collaboration, 2011

2010
GTHBAC: A Generalized Temporal History Based Access Control Model.
Telecommun. Syst., 2010

A Vagueness-based Obfuscation Technique for Protecting Location Privacy.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

2009
CAMAC: a context-aware mandatory access control model.
ISC Int. J. Inf. Secur., 2009

2008
A Context-Aware Mandatory Access Control Model for Multilevel Security Environments.
Proceedings of the Computer Safety, 2008

Protecting Location Privacy through a Graph-Based Location Representation and a Robust Obfuscation Technique.
Proceedings of the Information Security and Cryptology, 2008

A Dynamic Mandatory Access Control Model.
Proceedings of the Advances in Computer Science and Engineering, 2008


  Loading...