Author of the publication

Multi-dimensional Host Identity Anonymization for Defeating Skilled Attackers.

, , , and . MTD@CCS, page 47-58. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Insider Threat Mitigation Using Moving Target Defense and Deception., and . MIST@CCS, page 93-96. ACM, (2017)A Novel Permutational Sampling Technique for Cooperative Network Scanning., and . PST, page 1-6. IEEE, (2019)Toward practical defense against traffic analysis attacks on encrypted DNS traffic., , , and . Comput. Secur., (2023)An Accurate and Scalable Role Mining Algorithm based on Graph Embedding and Unsupervised Feature Learning., , , and . HICSS, page 1-10. ScholarSpace, (2020)A Deception Planning Framework for Cyber Defense., and . HICSS, page 1-10. ScholarSpace, (2020)HoneyBug: Personalized Cyber Deception for Web Applications., , , and . HICSS, page 1-10. ScholarSpace, (2020)Random Host Mutation for Moving Target Defense., , and . SecureComm, volume 106 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 310-327. Springer, (2012)Adversary-aware IP address randomization for proactive agility against sophisticated attackers., , and . INFOCOM, page 738-746. IEEE, (2015)On DDoS Attack Related Minimum Cut Problems., , , and . CoRR, (2014)Spatio-temporal Address Mutation for Proactive Cyber Agility against Sophisticated Attackers., , and . MTD@CCS, page 69-78. ACM, (2014)