Follow
Amirreza Niakanlahiji
Amirreza Niakanlahiji
Senior Security Researcher, Microsoft Corporation
Verified email at microsoft.com - Homepage
Title
Cited by
Cited by
Year
All one needs to know about fog computing and related edge computing paradigms: A complete survey
A Yousefpour, C Fung, T Nguyen, K Kadiyala, F Jalali, A Niakanlahiji, ...
Journal of Systems Architecture 98, 289-330, 2019
13992019
Trip distribution modeling with Twitter data
N Pourebrahim, S Sultana, A Niakanlahiji, JC Thill
Computers, Environment and Urban Systems 77, 101354, 2019
492019
Phishmon: A machine learning framework for detecting phishing webpages
A Niakanlahiji, BT Chu, E Al-Shaer
2018 IEEE International Conference on Intelligence and Security Informatics …, 2018
492018
A natural language processing based trend analysis of advanced persistent threat techniques
A Niakanlahiji, J Wei, BT Chu
2018 IEEE International Conference on Big Data (Big Data), 2995-3000, 2018
392018
Multi-dimensional host identity anonymization for defeating skilled attackers
JH Jafarian, A Niakanlahiji, E Al-Shaer, Q Duan
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 47-58, 2016
392016
Iocminer: Automatic extraction of indicators of compromise from twitter
A Niakanlahiji, L Safarnejad, R Harper, BT Chu
2019 IEEE International Conference on Big Data (Big Data), 4747-4754, 2019
352019
WebMTD: Defeating Web Code Injection Attacks using Web Element Attribute Mutation
A Niakanlahiji, JH Jafarian
Proceedings of the 2017 Workshop on Moving Target Defense, 17-26, 2017
202017
ShadowMove: A Stealthy Lateral Movement Strategy
A Niakanlahiji, J Wei, MR Alam, Q Wang, BT Chu
29th USENIX Security Symposium (USENIX Security '20), 2020
192020
Predicting Zero-day Malicious IP Addresses
A Niakanlahiji, MM Pritom, BT Chu, E Al-Shaer
Proceedings of the 2017 Workshop on Automated Decision Making for Active …, 2017
142017
All one needs to know about fog computing and related edge computing paradigms
A Yousefpour, C Fung, T Nguyen, K Kadiyala, F Jalali, A Niakanlahiji, ...
Journal of Systems Architecture, 0
13
Webmtd: Defeating cross-site scripting attacks using moving target defense
A Niakanlahiji, JH Jafarian
Security and Communication Networks 2019, 2019
112019
Delivering Honeypots as a Service
JH Jafarian, A Niakanlahiji
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020
92020
HoneyBug: Personalized Cyber Deception for Web Applications
A Niakanlahiji, JH Jafarian, BT Chu, E Al-Shaer
Proceedings of the 53rd Hawaii International Conference on System Sciences …, 2020
82020
A Deception Planning Framework for Cyber Defense.
JH Jafarian, A Niakanlahiji
HICSS, 1-10, 2020
62020
Toward practical defense against traffic analysis attacks on encrypted DNS traffic
A Niakanlahiji, S Orlowski, A Vahid, JH Jafarian
Computers & Security 124, 103001, 2023
42023
MultiRHM: Defeating multi-staged enterprise intrusion attacks through multi-dimensional and multi-parameter host identity anonymization
JH Jafarian, A Niakanlahiji
Computers & Security 124, 102958, 2023
12023
Discovering zero-day attacks by leveraging cyber threat intelligence
A Niakanlahiji
Order, 2019
12019
ENCRYPTED TRAFFIC OBFUSCATION METHOD AND SYSTEM
A Vahid, H Jafarian, A Niakanlahiji
US Patent App. 18/456,657, 2024
2024
Worm Containment in Gnutella Network with Heterogeneity
AR Niakan-Lahiji, B Sadeghiyan
International Journal of Information and Electronics Engineering 2 (3), 451, 2012
2012
The system can't perform the operation now. Try again later.
Articles 1–19