Jafar Haadi Jafarian
Orcid: 0000-0001-8115-085X
According to our database1,
Jafar Haadi Jafarian
authored at least 37 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Toward enhancing web privacy on HTTPS traffic: A novel SuperLearner attack model and an efficient defense approach with adversarial examples.
Comput. Secur., 2024
2023
Comput. Secur., 2023
MultiRHM: Defeating multi-staged enterprise intrusion attacks through multi-dimensional and multi-parameter host identity anonymization.
Comput. Secur., 2023
IEEE Access, 2023
2022
A Game-Theoretically Optimal Defense Paradigm against Traffic Analysis Attacks using Multipath Routing and Deception.
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022
Proceedings of the 23rd IEEE International Conference on Mobile Data Management, 2022
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022
Arbitrarily Fast Switched Distributed Stabilization of Partially Unknown Interconnected Multiagent Systems: A Proactive Cyber Defense Perspective.
Proceedings of the American Control Conference, 2022
2021
Proceedings of the Machine Learning and Principles and Practice of Knowledge Discovery in Databases, 2021
Proceedings of the IWSPA@CODASPY 2021: ACM Workshop on Security and Privacy Analytics, 2021
2020
Proceedings of the Intelligent Computing, 2020
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020
An Accurate and Scalable Role Mining Algorithm based on Graph Embedding and Unsupervised Feature Learning.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020
2019
Secur. Commun. Networks, 2019
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019
2018
CONCEAL: A Strategy Composition for Resilient Cyber Deception-Framework, Metrics and Deployment.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
2017
Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30, 2017
Proceedings of the 2017 Workshop on Moving Target Defense, 2017
2016
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 2016
2015
IEEE Trans. Inf. Forensics Secur., 2015
Towards a General Framework for Optimal Role Mining: A Constraint Satisfaction Approach.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015
Adversary-aware IP address randomization for proactive agility against sophisticated attackers.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
2014
Spatio-temporal Address Mutation for Proactive Cyber Agility against Sophisticated Attackers.
Proceedings of the First ACM Workshop on Moving Target Defense, 2014
2013
Proceedings of the Computer Security - ESORICS 2013, 2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013
2012
Openflow random host mutation: transparent moving target defense using software defined networking.
Proceedings of the first workshop on Hot topics in software defined networks, 2012
Proceedings of the Security and Privacy in Communication Networks, 2012
2011
Proceedings of the 8th Annual Collaboration, 2011
2010
Telecommun. Syst., 2010
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
2009
2008
Proceedings of the Computer Safety, 2008
Protecting Location Privacy through a Graph-Based Location Representation and a Robust Obfuscation Technique.
Proceedings of the Information Security and Cryptology, 2008
Proceedings of the Advances in Computer Science and Engineering, 2008