Search Results - "Alavizadeh, Hooman"

  • Showing 1 - 18 results of 18
Refine Results
  1. 1

    Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense by Cho, Jin-Hee, Sharma, Dilli P., Alavizadeh, Hooman, Yoon, Seunghyun, Ben-Asher, Noam, Moore, Terrence J., Kim, Dong Seong, Lim, Hyuk, Nelson, Frederica F.

    “…Reactive defense mechanisms, such as intrusion detection systems, have made significant efforts to secure a system or network for the last several decades…”
    Get full text
    Journal Article
  2. 2

    Deep Q-Learning Based Reinforcement Learning Approach for Network Intrusion Detection by Alavizadeh, Hooman, Alavizadeh, Hootan, Jang-Jaccard, Julian

    Published in Computers (Basel) (01-03-2022)
    “…The rise of the new generation of cyber threats demands more sophisticated and intelligent cyber defense solutions equipped with autonomous agents capable of…”
    Get full text
    Journal Article
  3. 3

    Large-Scale Outlier Detection for Low-Cost PM₁₀ Sensors by Wei, Yuanyuan, Jang-Jaccard, Julian, Sabrina, Fariza, Alavizadeh, Hooman

    Published in IEEE access (2020)
    “…Evaluating the air quality of classrooms is important as children spend a large amount of time at school. Massey University (NZ) led the development of a…”
    Get full text
    Journal Article
  4. 4

    Harnessing GPT-4 for generation of cybersecurity GRC policies: A focus on ransomware attack mitigation by McIntosh, Timothy, Liu, Tong, Susnjak, Teo, Alavizadeh, Hooman, Ng, Alex, Nowrozy, Raza, Watters, Paul

    Published in Computers & security (01-11-2023)
    “…This study investigated the potential of Generative Pre-trained Transformers (GPTs), a state-of-the-art large language model, in generating cybersecurity…”
    Get full text
    Journal Article
  5. 5

    Model-based evaluation of combinations of Shuffle and Diversity MTD techniques on the cloud by Alavizadeh, Hooman, Kim, Dong Seong, Jang-Jaccard, Julian

    Published in Future generation computer systems (01-10-2020)
    “…Regardless of cloud computing capabilities, security is still one of the biggest threats in the cloud. Moving Target Defense (MTD) has shown to be an effective…”
    Get full text
    Journal Article
  6. 6

    Evaluating the effectiveness of shuffle and redundancy MTD techniques in the cloud by Alavizadeh, Hooman, Hong, Jin B., Kim, Dong Seong, Jang-Jaccard, Julian

    Published in Computers & security (01-03-2021)
    “…Moving Target Defense (MTD) is a defensive strategy to thwart adversaries by continuously shifting the attack surface. The MTD techniques can be applied to the…”
    Get full text
    Journal Article
  7. 7

    Evaluating the Security and Economic Effects of Moving Target Defense Techniques on the Cloud by Alavizadeh, Hooman, Aref, Samin, Kim, Dong Seong, Jang-Jaccard, Julian

    “…Moving Target Defense (MTD) is a proactive security mechanism that changes the attack surface with the aim of confusing attackers. Cloud computing leverages…”
    Get full text
    Journal Article
  8. 8

    Safeguarding Individuals and Organisations from Privacy Breaches: A Comprehensive Review of Problem Domains, Solution Strategies, and Prospective Research Directions by Kayes, A. S. M., Rahayu, Wenny, Ahmad, Tharam Dillon, Shahraki, Salehi, Alavizadeh, Hooman

    Published in IEEE internet of things journal (19-10-2024)
    “…Privacy breaches have become increasingly prevalent, exposing individuals to significant risks. These breaches can have far-reaching consequences, including…”
    Get full text
    Journal Article
  9. 9

    Deep Q-Learning based Reinforcement Learning Approach for Network Intrusion Detection by Alavizadeh, Hooman, Jang-Jaccard, Julian, Alavizadeh, Hootan

    Published 27-11-2021
    “…The rise of the new generation of cyber threats demands more sophisticated and intelligent cyber defense solutions equipped with autonomous agents capable of…”
    Get full text
    Journal Article
  10. 10
  11. 11

    Cyber Situation Awareness Monitoring and Proactive Response for Enterprises on the Cloud by Alavizadeh, Hootan, Alavizadeh, Hooman, Jang-Jaccard, Julian

    “…The cloud model allows many enterprises able to outsource computing resources at an affordable price without having to commit the expense upfront. Although the…”
    Get full text
    Conference Proceeding
  12. 12

    Cyber Situation Awareness Monitoring and Proactive Response for Enterprises on the Cloud by Alavizadeh, Hootan, Alavizadeh, Hooman, Jang-Jaccard, Julian

    Published 03-09-2020
    “…The cloud model allows many enterprises able to outsource computing resources at an affordable price without having to commit the expense upfront. Although the…”
    Get full text
    Journal Article
  13. 13

    A Game-Theoretic Approach for AI-based Botnet Attack Defence by Alavizadeh, Hooman, Jang-Jaccard, Julian, Alpcan, Tansu, Camtepe, Seyit A

    Published 03-12-2021
    “…The new generation of botnets leverages Artificial Intelligent (AI) techniques to conceal the identity of botmasters and the attack intention to avoid…”
    Get full text
    Journal Article
  14. 14

    A Markov Game Model for AI-based Cyber Security Attack Mitigation by Alavizadeh, Hooman, Jang-Jaccard, Julian, Alpcan, Tansu, Camtepe, Seyit A

    Published 20-07-2021
    “…The new generation of cyber threats leverages advanced AI-aided methods, which make them capable to launch multi-stage, dynamic, and effective attacks. Current…”
    Get full text
    Journal Article
  15. 15

    Evaluating the Security and Economic Effects of Moving Target Defense Techniques on the Cloud by Alavizadeh, Hooman, Aref, Samin, Kim, Dong Seong, Jang-Jaccard, Julian

    Published 04-09-2020
    “…Moving Target Defense (MTD) is a proactive security mechanism which changes the attack surface aiming to confuse attackers. Cloud computing leverages MTD…”
    Get full text
    Journal Article
  16. 16

    A Survey on Threat Situation Awareness Systems: Framework, Techniques, and Insights by Alavizadeh, Hooman, Jang-Jaccard, Julian, Enoch, Simon Yusuf, Al-Sahaf, Harith, Welch, Ian, Camtepe, Seyit A, Kim, Dong Seong

    Published 29-10-2021
    “…Cyberspace is full of uncertainty in terms of advanced and sophisticated cyber threats which are equipped with novel approaches to learn the system and…”
    Get full text
    Journal Article
  17. 17

    An Automated Security Analysis Framework and Implementation for Cloud by Alavizadeh, Hootan, Alavizadeh, Hooman, Kim, Dong Seong, Jang-Jaccard, Julian, Torshiz, Masood Niazi

    Published 03-04-2019
    “…Cloud service providers offer their customers with on-demand and cost-effective services, scalable computing, and network infrastructures. Enterprises migrate…”
    Get full text
    Journal Article
  18. 18

    Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense by Cho, Jin-Hee, Sharma, Dilli P, Alavizadeh, Hooman, Yoon, Seunghyun, Ben-Asher, Noam, Moore, Terrence J, Kim, Dong Seong, Lim, Hyuk, Nelson, Frederica F

    Published 12-09-2019
    “…Reactive defense mechanisms, such as intrusion detection systems, have made significant efforts to secure a system or network for the last several decades…”
    Get full text
    Journal Article