Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Niakanlahiji, Amirreza
add a person with the name Niakanlahiji, Amirreza
 

Other publications of authors with the same name

IoCMiner: Automatic Extraction of Indicators of Compromise from Twitter., , , and . IEEE BigData, page 4747-4754. IEEE, (2019)A Natural Language Processing Based Trend Analysis of Advanced Persistent Threat Techniques., , and . IEEE BigData, page 2995-3000. IEEE, (2018)Multi-dimensional Host Identity Anonymization for Defeating Skilled Attackers., , , and . MTD@CCS, page 47-58. ACM, (2016)Delivering Honeypots as a Service., and . HICSS, page 1-10. ScholarSpace, (2020)ShadowMove: A Stealthy Lateral Movement Strategy., , , , and . USENIX Security Symposium, page 559-576. USENIX Association, (2020)PhishMon: A Machine Learning Framework for Detecting Phishing Webpages., , and . ISI, page 220-225. IEEE, (2018)WebMTD: Defeating Web Code Injection Attacks using Web Element Attribute Mutation., and . MTD@CCS, page 17-26. ACM, (2017)All one needs to know about fog computing and related edge computing paradigms: A complete survey., , , , , , , and . J. Syst. Archit., (2019)Predicting Zero-day Malicious IP Addresses., , , and . SafeConfig@CCS, page 1-6. ACM, (2017)HoneyBug: Personalized Cyber Deception for Web Applications., , , and . HICSS, page 1-10. ScholarSpace, (2020)