default search action
Hooman Alavizadeh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c8]Hooman Alavizadeh, Julian Jang-Jaccard, Hootan Alavizadeh, Tansu Alpcan:
A Markov Game Model for Evaluating Cybersecurity Attacks on Cloud. IWSEC 2024: 244-254 - 2023
- [j9]Timothy R. McIntosh, Tong Liu, Teo Susnjak, Hooman Alavizadeh, Alex Ng, Raza Nowrozy, Paul A. Watters:
Harnessing GPT-4 for generation of cybersecurity GRC policies: A focus on ransomware attack mitigation. Comput. Secur. 134: 103424 (2023) - [j8]Hooman Alavizadeh, Julian Jang-Jaccard, Simon Yusuf Enoch, Harith Al-Sahaf, Ian Welch, Seyit Ahmet Çamtepe, Dan Dongseong Kim:
A Survey on Cyber Situation-awareness Systems: Framework, Techniques, and Insights. ACM Comput. Surv. 55(5): 107:1-107:37 (2023) - 2022
- [j7]Hooman Alavizadeh, Hootan Alavizadeh, Julian Jang-Jaccard:
Deep Q-Learning Based Reinforcement Learning Approach for Network Intrusion Detection. Comput. 11(3): 41 (2022) - [j6]Hooman Alavizadeh, Samin Aref, Dong Seong Kim, Julian Jang-Jaccard:
Evaluating the Security and Economic Effects of Moving Target Defense Techniques on the Cloud. IEEE Trans. Emerg. Top. Comput. 10(4): 1772-1788 (2022) - [j5]Sibghat Ullah Bazai, Julian Jang-Jaccard, Hooman Alavizadeh:
A Novel Hybrid Approach for Multi-Dimensional Data Anonymization for Apache Spark. ACM Trans. Priv. Secur. 25(1): 5:1-5:25 (2022) - 2021
- [j4]Hooman Alavizadeh, Jin B. Hong, Dong Seong Kim, Julian Jang-Jaccard:
Evaluating the effectiveness of shuffle and redundancy MTD techniques in the cloud. Comput. Secur. 102: 102091 (2021) - [i8]Hooman Alavizadeh, Julian Jang-Jaccard, Tansu Alpcan, Seyit Ahmet Çamtepe:
A Markov Game Model for AI-based Cyber Security Attack Mitigation. CoRR abs/2107.09258 (2021) - [i7]Hooman Alavizadeh, Julian Jang-Jaccard, Simon Yusuf Enoch, Harith Al-Sahaf, Ian Welch, Seyit Ahmet Çamtepe, Dong Seong Kim:
A Survey on Threat Situation Awareness Systems: Framework, Techniques, and Insights. CoRR abs/2110.15747 (2021) - [i6]Hooman Alavizadeh, Julian Jang-Jaccard, Hootan Alavizadeh:
Deep Q-Learning based Reinforcement Learning Approach for Network Intrusion Detection. CoRR abs/2111.13978 (2021) - [i5]Hooman Alavizadeh, Julian Jang-Jaccard, Tansu Alpcan, Seyit Ahmet Çamtepe:
A Game-Theoretic Approach for AI-based Botnet Attack Defence. CoRR abs/2112.02223 (2021) - 2020
- [j3]Yuanyuan Wei, Julian Jang-Jaccard, Fariza Sabrina, Hooman Alavizadeh:
Large-Scale Outlier Detection for Low-Cost PM₁₀ Sensors. IEEE Access 8: 229033-229042 (2020) - [j2]Jin-Hee Cho, Dilli P. Sharma, Hooman Alavizadeh, Seunghyun Yoon, Noam Ben-Asher, Terrence J. Moore, Dong Seong Kim, Hyuk Lim, Frederica Free-Nelson:
Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense. IEEE Commun. Surv. Tutorials 22(1): 709-745 (2020) - [j1]Hooman Alavizadeh, Dong Seong Kim, Julian Jang-Jaccard:
Model-based evaluation of combinations of Shuffle and Diversity MTD techniques on the cloud. Future Gener. Comput. Syst. 111: 507-522 (2020) - [c7]Hootan Alavizadeh, Hooman Alavizadeh, Julian Jang-Jaccard:
Cyber Situation Awareness Monitoring and Proactive Response for Enterprises on the Cloud. TrustCom 2020: 1276-1284 - [i4]Hootan Alavizadeh, Hooman Alavizadeh, Julian Jang-Jaccard:
Cyber Situation Awareness Monitoring and Proactive Response for Enterprises on the Cloud. CoRR abs/2009.01604 (2020) - [i3]Hooman Alavizadeh, Samin Aref, Dong Seong Kim, Julian Jang-Jaccard:
Evaluating the Security and Economic Effects of Moving Target Defense Techniques on the Cloud. CoRR abs/2009.02030 (2020)
2010 – 2019
- 2019
- [c6]Hooman Alavizadeh, Hootan Alavizadeh, Dong Seong Kim, Julian Jang-Jaccard, Masood Niazi Torshiz:
An Automated Security Analysis Framework and Implementation for MTD Techniques on Cloud. ICISC 2019: 150-164 - [i2]Hootan Alavizadeh, Hooman Alavizadeh, Dong Seong Kim, Julian Jang-Jaccard, Masood Niazi Torshiz:
An Automated Security Analysis Framework and Implementation for Cloud. CoRR abs/1904.01758 (2019) - [i1]Jin-Hee Cho, Dilli P. Sharma, Hooman Alavizadeh, Seunghyun Yoon, Noam Ben-Asher, Terrence J. Moore, Dong Seong Kim, Hyuk Lim, Frederica Free-Nelson:
Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense. CoRR abs/1909.08092 (2019) - 2018
- [c5]Hooman Alavizadeh, Jin B. Hong, Julian Jang-Jaccard, Dong Seong Kim:
Comprehensive Security Assessment of Combined MTD Techniques for the Cloud. MTD@CCS 2018: 11-20 - [c4]Hooman Alavizadeh, Julian Jang-Jaccard, Dong Seong Kim:
Evaluation for Combination of Shuffle and Diversity on Moving Target Defense Strategy for Cloud Computing. TrustCom/BigDataSE 2018: 573-578 - 2017
- [c3]Hooman Alavizadeh, Dong Seong Kim, Jin B. Hong, Julian Jang-Jaccard:
Effective Security Analysis for Combinations of MTD Techniques on Cloud Computing (Short Paper). ISPEC 2017: 539-548 - [c2]Hooman Alavizadeh, Hootan Alavizadeh, Kudakwashe Dube, Dong Seong Kim, Julian Jang-Jaccard, Hans W. Guesgen:
A Secure Server-Based Pseudorandom Number Generator Protocol for Mobile Devices. ISPEC 2017: 860-876 - 2013
- [c1]Alexander G. Chefranov, SeyedMasoud Alavi Abhari, Hooman Alavizadeh, Maryam Farajzadeh-Zanjani:
Secure true random number generator in WLAN/LAN. SIN 2013: 331-335
Coauthor Index
aka: Julian Jang-Jaccard
aka: Dan Dongseong Kim
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-30 21:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint