default search action
Qi Duan
Publications
- 2023
- [j38]Md Sajidul Islam Sajid, Jinpeng Wei, Ehab Al-Shaer, Qi Duan, Basel Abdeen, Latifur Khan:
symbSODA: Configurable and Verifiable Orchestration Automation for Active Malware Deception. ACM Trans. Priv. Secur. 26(4): 51:1-51:36 (2023) - [c57]Ashutosh Dutta, Ehab Al-Shaer, Samrat Chatterjee, Qi Duan:
Autonomous Cyber Defense Against Dynamic Multi-strategy Infrastructural DDoS Attacks. CNS 2023: 1-9 - 2020
- [c55]Qi Duan, Ehab Al-Shaer, Jiang Xie:
Range and Topology Mutation Based Wireless Agility. MTD@CCS 2020: 59-67 - [c54]Muhammad Abdul Basit Ur Rahim, Qi Duan, Ehab Al-Shaer:
A Formal Analysis of Moving Target Defense. COMPSAC 2020: 1802-1807 - [c52]Adam Dalton, Ehsan Aghaei, Ehab Al-Shaer, Archna Bhatia, Esteban Castillo, Zhuo Cheng, Sreekar Dhaduvai, Qi Duan, Bryanna Hebenstreit, Md. Mazharul Islam, Younes Karimi, Amir Masoumzadeh, Brodie Mather, Sashank Santhanam, Samira Shaikh, Alan Zemel, Tomek Strzalkowski, Bonnie J. Dorr:
Active Defense Against Social Engineering: The Case for Human Language Technology. STOC@LREC 2020: 1-8 - [c51]Muhammad Abdul Basit Ur Rahim, Ehab Al-Shaer, Qi Duan:
A Formal Verification of Configuration-Based Mutation Techniques for Moving Target Defense. SecureComm (1) 2020: 61-79 - [i4]Adam Dalton, Ehsan Aghaei, Ehab Al-Shaer, Archna Bhatia, Esteban Castillo, Zhuo Cheng, Sreekar Dhaduvai, Qi Duan, Md. Mazharul Islam, Younes Karimi, Amir Masoumzadeh, Brodie Mather, Sashank Santhanam, Samira Shaikh, Tomek Strzalkowski, Bonnie J. Dorr:
The Panacea Threat Intelligence and Active Defense Platform. CoRR abs/2004.09662 (2020) - 2019
- [c48]Md. Mazharul Islam, Qi Duan, Ehab Al-Shaer:
Specification-driven Moving Target Defense Synthesis. MTD@CCS 2019: 13-24 - [c47]Muhammad Abdul Basit Ur Rahim, Qi Duan, Ehab Al-Shaer:
A formal verification of mutation-based moving target defense. HotSoS 2019: 10:1-10:2 - 2018
- [c44]Fida Gillani, Ehab Al-Shaer, Qi Duan:
In-design Resilient SDN Control Plane and Elastic Forwarding Against Aggressive DDoS Attacks. MTD@CCS 2018: 80-89 - [c43]Qi Duan, Ehab Al-Shaer, Mazharul Islam, Jafar Haadi Jafarian:
CONCEAL: A Strategy Composition for Resilient Cyber Deception-Framework, Metrics and Deployment. CNS 2018: 1-9 - [c42]Mohammed Noraden Alsaleh, Ehab Al-Shaer, Qi Duan:
Verifying the Enforcement and Effectiveness of Network Lateral Movement Resistance Techniques. ICETE (2) 2018: 412-423 - 2017
- [j32]Adel El-Atawy, Qi Duan, Ehab Al-Shaer:
A Novel Class of Robust Covert Channels Using Out-of-Order Packets. IEEE Trans. Dependable Secur. Comput. 14(2): 116-129 (2017) - 2016
- [c40]Jafar Haadi Jafarian, Amirreza Niakanlahiji, Ehab Al-Shaer, Qi Duan:
Multi-dimensional Host Identity Anonymization for Defeating Skilled Attackers. MTD@CCS 2016: 47-58 - 2015
- [j29]Jafar Haadi Jafarian, Ehab Al-Shaer, Qi Duan:
An Effective Address Mutation Approach for Disrupting Reconnaissance Attacks. IEEE Trans. Inf. Forensics Secur. 10(12): 2562-2577 (2015) - [c39]Muhammad Qasim Ali, Ayesha Binte Ashfaq, Ehab Al-Shaer, Qi Duan:
Towards a science of anomaly detection system evasion. CNS 2015: 460-468 - [c38]Fida Gillani, Ehab Al-Shaer, Samantha Lo, Qi Duan, Mostafa H. Ammar, Ellen W. Zegura:
Agile virtualized infrastructure to proactively defend against cyber attacks. INFOCOM 2015: 729-737 - [c37]Jafar Haadi Jafarian, Ehab Al-Shaer, Qi Duan:
Adversary-aware IP address randomization for proactive agility against sophisticated attackers. INFOCOM 2015: 738-746 - 2014
- [c36]Jafar Haadi Jafarian, Ehab Al-Shaer, Qi Duan:
Spatio-temporal Address Mutation for Proactive Cyber Agility against Sophisticated Attackers. MTD@CCS 2014: 69-78 - [i2]Qi Duan, Jafar Haadi Jafarian, Ehab Al-Shaer, Jinhui Xu:
On DDoS Attack Related Minimum Cut Problems. CoRR abs/1412.3359 (2014) - 2013
- [j25]Qi Duan, Ehab Al-Shaer:
Traffic-aware dynamic firewall policy management: techniques and applications. IEEE Commun. Mag. 51(7) (2013) - [c34]Qi Duan, Yongge Wang, Fadi Mohsen, Ehab Al-Shaer:
Private and Anonymous Data Storage and Distribution in Cloud. IEEE SCC 2013: 264-271 - [c33]Qi Duan, Ehab Al-Shaer, Jafar Haadi Jafarian:
Efficient Random Route Mutation considering flow and network constraints. CNS 2013: 260-268 - [c31]Jafar Haadi Jafarian, Ehab Al-Shaer, Qi Duan:
Formal Approach for Route Agility against Persistent Attackers. ESORICS 2013: 237-254 - [c30]Mohammad Ashiqur Rahman, Qi Duan, Ehab Al-Shaer:
Energy efficient navigation management for hybrid electric vehicles on highways. ICCPS 2013: 21-30 - [c29]Ehab Al-Shaer, Qi Duan, Saeed Al-Haj, Moustafa Youssef:
SensorChecker: reachability verification in mission-oriented sensor networks. MiSeNet@MobiCom 2013: 51-56 - [c28]Muhammad Qasim Ali, Ehab Al-Shaer, Qi Duan:
Randomizing AMI configuration for proactive defense in smart grid. SmartGridComm 2013: 618-623 - 2012
- [c27]Qi Duan, Saeed Al-Haj, Ehab Al-Shaer:
Provable configuration planning for wireless sensor networks. CNSM 2012: 316-321 - [c25]Ehab Al-Shaer, Qi Duan, Jafar Haadi Jafarian:
Random Host Mutation for Moving Target Defense. SecureComm 2012: 310-327 - [c24]Jafar Haadi Jafarian, Ehab Al-Shaer, Qi Duan:
Openflow random host mutation: transparent moving target defense using software defined networking. HotSDN@SIGCOMM 2012: 127-132
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-23 19:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint