Follow
Vahid Foroushani
Vahid Foroushani
Verified email at cs.dal.ca
Title
Cited by
Cited by
Year
Can we identify NAT behavior by analyzing traffic flows?
Y Gokcen, VA Foroushani, ANZ Heywood
2014 IEEE Security and Privacy Workshops, 132-139, 2014
482014
Deterministic and authenticated flow marking for IP traceback
VA Foroushani, AN Zincir-Heywood
2013 IEEE 27th International Conference on Advanced Information Networking …, 2013
372013
TDFA: traceback-based defense against DDoS flooding attacks
VA Foroushani, AN Zincir-Heywood
2014 IEEE 28th International Conference on Advanced Information Networking …, 2014
362014
Intrusion detection in encrypted accesses with SSH protocol to network public servers
VA Foroushani, F Adibnia, E Hojati
2008 International conference on computer and communication engineering, 314-318, 2008
312008
A proxy identifier based on patterns in traffic flows
V Aghaei-Foroushani, AN Zincir-Heywood
2015 IEEE 16th International Symposium on High Assurance Systems Engineering …, 2015
292015
IP traceback through (authenticated) deterministic flow marking: an empirical evaluation
V Aghaei-Foroushani, AN Zincir-Heywood
EURASIP Journal on Information Security 2013, 1-24, 2013
222013
On evaluating ip traceback schemes: a practical perspective
V Aghaei-Foroushani, AN Zincir-Heywood
2013 IEEE Security and Privacy Workshops, 127-134, 2013
192013
Autonomous system based flow marking scheme for IP-Traceback
V Aghaei-Foroushani, AN Zincir-Heywood
NOMS 2016-2016 IEEE/IFIP Network Operations and Management Symposium, 121-128, 2016
122016
Investigating unique flow marking for tracing back DDoS attacks
V Aghaei-Foroushani, AN Zincir-Heywood
2015 IFIP/IEEE International Symposium on Integrated Network Management (IM …, 2015
92015
Probabilistic flow marking for IP traceback (PFM)
V Aghaei-Foroushani, AN Zincir-Heywood
2015 7th International Workshop on Reliable Networks Design and Modeling …, 2015
82015
Investigating application behavior in network traffic traces
VA Foroushani, AN Zincir-Heywood
2013 IEEE Symposium on Computational Intelligence for Security and Defense …, 2013
82013
Remote management of computer networks by short message service
M Ghasemzadeh, VA Foroushani
2008 International Conference on Computer and Communication Engineering, 300-305, 2008
32008
Deterministic flow marking for IPv6 traceback (DFM6)
V Aghaei-Foroushani, AN Zincir-Heywood
2015 11th International Conference on Network and Service Management (CNSM …, 2015
12015
A SECURITY FRAMEWORK BASED ON FLOW MARKING IP-TRACEBACK TECHNIQUES
V Aghaei Foroushani
2016
A SECURITY FRAMEWORK BASED ON FLOW MARKING IP-TRACEBACK TECHNIQUES.
VA Foroushani
Dalhousie University, 2016
2016
The system can't perform the operation now. Try again later.
Articles 1–15