Jafarian, Jafar Haadi
36  results:
Search for persons X
?
3

The Dangers of Money and Corporate Power Relating to Online..:

, In: 2022 23rd IEEE International Conference on Mobile Data Management (MDM),
 
?
4

A Game-Theoretically Optimal Defense Paradigm against Traff..:

, In: Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies,
 
?
 
?
8

A Novel Permutational Sampling Technique for Cooperative Ne..:

, In: 2019 17th International Conference on Privacy, Security and Trust (PST),
 
?
9

WebMTD : Defeating Web Code Injection Attacks using Web ..:

, In: Proceedings of the 2017 Workshop on Moving Target Defense,
 
?
10

Multi-dimensional Host Identity Anonymization for Defeating..:

, In: Proceedings of the 2016 ACM Workshop on Moving Target Defense,
 
?
11

Towards a General Framework for Optimal Role Mining : A ..:

, In: Proceedings of the 20th ACM Symposium on Access Control Models and Technologies,
 
?
12

Openflow random host mutation : transparent moving targe..:

, In: Proceedings of the first workshop on Hot topics in software defined networks,
 
?
13

A gray-box DPDA-based intrusion detection technique using s..:

, In: Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference,
 
?
15

A Dynamic Mandatory Access Control Model:

, In: Communications in Computer and Information Science; Advances in Computer Science and Engineering,
 
1-15