Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Niakanlahiji, Amirreza
add a person with the name Niakanlahiji, Amirreza
 

Other publications of authors with the same name

Multi-dimensional Host Identity Anonymization for Defeating Skilled Attackers., , , and . MTD@CCS, page 47-58. ACM, (2016)Delivering Honeypots as a Service., and . HICSS, page 1-10. ScholarSpace, (2020)PhishMon: A Machine Learning Framework for Detecting Phishing Webpages., , and . ISI, page 220-225. IEEE, (2018)ShadowMove: A Stealthy Lateral Movement Strategy., , , , and . USENIX Security Symposium, page 559-576. USENIX Association, (2020)Trip distribution modeling with Twitter data., , , and . Comput. Environ. Urban Syst., (2019)MultiRHM: Defeating multi-staged enterprise intrusion attacks through multi-dimensional and multi-parameter host identity anonymization., and . Comput. Secur., (2023)A Natural Language Processing Based Trend Analysis of Advanced Persistent Threat Techniques., , and . IEEE BigData, page 2995-3000. IEEE, (2018)IoCMiner: Automatic Extraction of Indicators of Compromise from Twitter., , , and . IEEE BigData, page 4747-4754. IEEE, (2019)WebMTD: Defeating Cross-Site Scripting Attacks Using Moving Target Defense., and . Secur. Commun. Networks, (2019)WebMTD: Defeating Web Code Injection Attacks using Web Element Attribute Mutation., and . MTD@CCS, page 17-26. ACM, (2017)