Journal Article Support US research during COVID-19 2020 • Science • 370(6516):539-540 Jahanian F, and others
Chapter The UARC web-based collaboratory: Software architecture and experience 2019 3-18 Subramanian S, Malan GR, Shim HS, Lee JH, Knoop P, Weymouth T, Jahanian F, Prakash A, Hardin J
Conference Realizing the transformative impact of computing and data in a networked world 2014 1-2 Jahanian F
Conference Learning from early attempts to measure information security performance 2012 • 5th Workshop on Cyber Security Experimentation and Test, CSET 2012 Zhang J, Berthier R, Rhee W, Bailey M, Pal P, Jahanian F, Sanders WH
Conference Learning from early attempts to measure information security performance 2012 • 5th Workshop on Cyber Security Experimentation and Test, CSET 2012 Zhang J, Berthier R, Rhee W, Bailey M, Pal P, Jahanian F, Sanders WH
Conference Learning from early attempts to measure information security performance 2012 • 5th Workshop on Cyber Security Experimentation and Test, CSET 2012 Zhang J, Berthier R, Rhee W, Bailey M, Pal P, Jahanian F, Sanders WH
Conference Safeguarding Academic Accounts and Resources with the University Credential Abuse Auditing System 2012 • Proceedings of the International Conference on Dependable Systems and Networks • 1:1-8 Zhang J, Berthier R, Rhee W, Bailey M, Pal P, Jahanian F, Sanders WH
Conference Workshop on Open Resilient human-aware Cyber-physical systems 2012 • Proceedings of the International Conference on Dependable Systems and Networks • 1:1-2 Kaâniche M, Harrison M, Kopetz H, Siewiorek D
Conference A Comparative Study of Two Network-based Anomaly Detection Methods 2011 • IEEE Infocom. Proceedings • 1:176-180 Nyalkalkar K, Sinha S, Bailey M, Jahanian F
Conference An exploration of L2 cache covert channels in virtualized environments 2011 • Proceedings of the ACM Conference on Computer and Communications Security • 29-40 Xu Y, Bailey M, Jahanian F, Joshi K, Hiltunen M, Schlichting R
Conference CANVuS: Context-Aware Network Vulnerability Scanning 2010 • Lecture Notes in Computer Science • 6307:138-157 Xu Y, Bailey M, Vander Weele E, Jahanian F
Conference Improving Spam Blacklisting Through Dynamic Thresholding and Speculative Aggregation 2010 • Proceedings of the Symposium on Network and Distributed System Security, NDSS 2010 Sinha S, Bailey M, Jahanian F
Conference Internet background radiation revisited 2010 62-74 Wustrow E, Karir M, Bailey M, Jahanian F, Huston G
Conference Internet inter-domain traffic 2010 • Computer Communication Review • 40(4):75-86 Labovitz C, Iekel-Johnson S, McPherson D, Oberheide J, Jahanian F
Conference Internet inter-domain traffic 2010 75-86 Labovitz C, Iekel-Johnson S, McPherson D, Oberheide J, Jahanian F
Conference Message from the General Chair and Conference Coordinator 2010 • Proceedings of the International Conference on Dependable Systems and Networks • iii-iii Jahanian F, Taylor D
Conference Message from the General Chair and Conference Coordinator 2010 • Proceedings of the International Conference on Dependable Systems and Networks • iii-iii Jahanian F
Conference A Survey of Botnet Technology and Defenses 2009 299-304 Bailey M, Cooke E, Jahanian F, Xu Y, Karir M
Conference Dependability in the Cloud: Challenges and Opportunities 2009 • Proceedings of the International Conference on Dependable Systems and Networks • 1:103-104 Joshi KR, Bunker G, Jahanian F, van Moorsel A, Weinman J
Conference If It ain't broke, don't fix it: Challenges and new directions for inferring the impact of software patches 2009 • Proceedings of HotOS 2009 - 12th Workshop on Hot Topics in Operating Systems Oberheide J, Cooke E, Jahanian F
Conference One Size Does Not Fit All: 10 Years of Applying Context-Aware Security 2009 14-21 Sinha S, Bailey M, Jahanian F