J. Haadi Jafarian
J. Haadi Jafarian
Assistant Professor at Department of Computer Science and Engineering, University of Colorado Denver
Verified email at - Homepage
Cited by
Cited by
Openflow random host mutation: transparent moving target defense using software defined networking
JH Jafarian, E Al-Shaer, Q Duan
Proceedings of the first workshop on Hot topics in software defined networks …, 2012
Random host mutation for moving target defense
E Al-Shaer, Q Duan, JH Jafarian
International Conference on Security and Privacy in Communication Systems …, 2012
An Effective Address Mutation Approach for Disrupting Reconnaissance Attacks
JH Jafarian, E Al-Shaer, Q Duan
IEEE Transactions on Information Forensics and Security 10 (12), 2562 - 2577, 2015
Efficient random route mutation considering flow and network constraints
Q Duan, E Al-Shaer, H Jafarian
2013 IEEE Conference on Communications and Network Security (CNS), 260-268, 2013
Spatio-temporal address mutation for proactive cyber agility against sophisticated attackers
JHH Jafarian, E Al-Shaer, Q Duan
Proceedings of the First ACM Workshop on Moving Target Defense, 69-78, 2014
Adversary-aware IP address randomization for proactive agility against sophisticated attackers
JH Jafarian, E Al-Shaer, Q Duan
2015 IEEE conference on computer communications (INFOCOM), 738-746, 2015
Formal approach for route agility against persistent attackers
JH Jafarian, E Al-Shaer, Q Duan
Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013
Multi-dimensional host identity anonymization for defeating skilled attackers
JH Jafarian, A Niakanlahiji, E Al-Shaer, Q Duan
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 47-58, 2016
Conceal: A strategy composition for resilient cyber deception-framework, metrics and deployment
Q Duan, E Al-Shaer, M Islam, H Jafarian
2018 IEEE Conference on Communications and Network Security (CNS), 1-9, 2018
Webmtd: defeating web code injection attacks using web element attribute mutation
A Niakanlahiji, JH Jafarian
Proceedings of the 2017 Workshop on Moving Target Defense, 17-26, 2017
Towards a general framework for optimal role mining: A constraint satisfaction approach
JH Jafarian, H Takabi, H Touati, E Hesamifard, M Shehab
Proceedings of the 20th ACM Symposium on Access Control Models and …, 2015
CAMAC: A Context-Aware Mandatory Access Control Model.
JH Jafarian, M Amini
ISeCure 1 (1), 2009
A game-theoretically optimal defense paradigm against traffic analysis attacks using multipath routing and deception
M Abolfathi, I Shomorony, A Vahid, JH Jafarian
Proceedings of the 27th ACM on symposium on access control models and …, 2022
A vagueness-based obfuscation technique for protecting location privacy
JH Jafarian
2010 IEEE Second International Conference on Social Computing, 865-872, 2010
GTHBAC: a generalized temporal history based access control model
AN Ravari, JH Jafarian, M Amini, R Jalili
Telecommunication Systems 45, 111-125, 2010
WebMTD: defeating cross‐site scripting attacks using moving target defense
A Niakanlahiji, JH Jafarian
Security and Communication Networks 2019 (1), 2156906, 2019
Protecting location privacy through a graph-based location representation and a robust obfuscation technique
JH Jafarian, AN Ravari, M Amini, R Jalili
Information Security and Cryptology–ICISC 2008: 11th International …, 2009
Deliverying Honeypots as a Service
JH Jafarian, A Niakanlahiji
53rd Hawaii International Conference on System Sciences (HICSS 53), 1835-1844, 2020
HoneyBug: Personalized cyber deception for web applications
A Niakanlahiji, JH Jafarian, BT Chu, E Al-Shaer
Insider threat mitigation using moving target defense and deception
H Takabi, JH Jafarian
Proceedings of the 2017 international workshop on managing insider security …, 2017
The system can't perform the operation now. Try again later.
Articles 1–20