Search Results - "Alavizadeh, Hooman"
-
1
Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense
Published in IEEE Communications surveys and tutorials (2020)“…Reactive defense mechanisms, such as intrusion detection systems, have made significant efforts to secure a system or network for the last several decades…”
Get full text
Journal Article -
2
Deep Q-Learning Based Reinforcement Learning Approach for Network Intrusion Detection
Published in Computers (Basel) (01-03-2022)“…The rise of the new generation of cyber threats demands more sophisticated and intelligent cyber defense solutions equipped with autonomous agents capable of…”
Get full text
Journal Article -
3
Large-Scale Outlier Detection for Low-Cost PM₁₀ Sensors
Published in IEEE access (2020)“…Evaluating the air quality of classrooms is important as children spend a large amount of time at school. Massey University (NZ) led the development of a…”
Get full text
Journal Article -
4
Harnessing GPT-4 for generation of cybersecurity GRC policies: A focus on ransomware attack mitigation
Published in Computers & security (01-11-2023)“…This study investigated the potential of Generative Pre-trained Transformers (GPTs), a state-of-the-art large language model, in generating cybersecurity…”
Get full text
Journal Article -
5
Model-based evaluation of combinations of Shuffle and Diversity MTD techniques on the cloud
Published in Future generation computer systems (01-10-2020)“…Regardless of cloud computing capabilities, security is still one of the biggest threats in the cloud. Moving Target Defense (MTD) has shown to be an effective…”
Get full text
Journal Article -
6
Evaluating the effectiveness of shuffle and redundancy MTD techniques in the cloud
Published in Computers & security (01-03-2021)“…Moving Target Defense (MTD) is a defensive strategy to thwart adversaries by continuously shifting the attack surface. The MTD techniques can be applied to the…”
Get full text
Journal Article -
7
Evaluating the Security and Economic Effects of Moving Target Defense Techniques on the Cloud
Published in IEEE transactions on emerging topics in computing (01-10-2022)“…Moving Target Defense (MTD) is a proactive security mechanism that changes the attack surface with the aim of confusing attackers. Cloud computing leverages…”
Get full text
Journal Article -
8
Safeguarding Individuals and Organisations from Privacy Breaches: A Comprehensive Review of Problem Domains, Solution Strategies, and Prospective Research Directions
Published in IEEE internet of things journal (19-10-2024)“…Privacy breaches have become increasingly prevalent, exposing individuals to significant risks. These breaches can have far-reaching consequences, including…”
Get full text
Journal Article -
9
Deep Q-Learning based Reinforcement Learning Approach for Network Intrusion Detection
Published 27-11-2021“…The rise of the new generation of cyber threats demands more sophisticated and intelligent cyber defense solutions equipped with autonomous agents capable of…”
Get full text
Journal Article -
10
Evaluation for Combination of Shuffle and Diversity on Moving Target Defense Strategy for Cloud Computing
Published in 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) (01-08-2018)“…Moving Target Defence (MTD) has been recently proposed and is an emerging proactive approach which provides an asynchronous defensive strategies. Unlike…”
Get full text
Conference Proceeding -
11
Cyber Situation Awareness Monitoring and Proactive Response for Enterprises on the Cloud
Published in 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (01-12-2020)“…The cloud model allows many enterprises able to outsource computing resources at an affordable price without having to commit the expense upfront. Although the…”
Get full text
Conference Proceeding -
12
Cyber Situation Awareness Monitoring and Proactive Response for Enterprises on the Cloud
Published 03-09-2020“…The cloud model allows many enterprises able to outsource computing resources at an affordable price without having to commit the expense upfront. Although the…”
Get full text
Journal Article -
13
A Game-Theoretic Approach for AI-based Botnet Attack Defence
Published 03-12-2021“…The new generation of botnets leverages Artificial Intelligent (AI) techniques to conceal the identity of botmasters and the attack intention to avoid…”
Get full text
Journal Article -
14
A Markov Game Model for AI-based Cyber Security Attack Mitigation
Published 20-07-2021“…The new generation of cyber threats leverages advanced AI-aided methods, which make them capable to launch multi-stage, dynamic, and effective attacks. Current…”
Get full text
Journal Article -
15
Evaluating the Security and Economic Effects of Moving Target Defense Techniques on the Cloud
Published 04-09-2020“…Moving Target Defense (MTD) is a proactive security mechanism which changes the attack surface aiming to confuse attackers. Cloud computing leverages MTD…”
Get full text
Journal Article -
16
A Survey on Threat Situation Awareness Systems: Framework, Techniques, and Insights
Published 29-10-2021“…Cyberspace is full of uncertainty in terms of advanced and sophisticated cyber threats which are equipped with novel approaches to learn the system and…”
Get full text
Journal Article -
17
An Automated Security Analysis Framework and Implementation for Cloud
Published 03-04-2019“…Cloud service providers offer their customers with on-demand and cost-effective services, scalable computing, and network infrastructures. Enterprises migrate…”
Get full text
Journal Article -
18
Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense
Published 12-09-2019“…Reactive defense mechanisms, such as intrusion detection systems, have made significant efforts to secure a system or network for the last several decades…”
Get full text
Journal Article