Journal Article Support US research during COVID-19 2020 • Science • 370(6516):539-540 Jahanian F, and others
Chapter The UARC web-based collaboratory: Software architecture and experience 2019 3-18 Subramanian S, Malan GR, Shim HS, Lee JH, Knoop P, Weymouth T, Jahanian F, Prakash A, Hardin J
Conference Realizing the transformative impact of computing and data in a networked world 2014 1-2 Jahanian F
Conference Small is better: Avoiding latency traps in virtualized data centers 2013 • Proceedings of the 4th Annual Symposium on Cloud Computing, SoCC 2013 Xu Y, Bailey M, Noble B, Jahanian F
Conference Learning from early attempts to measure information security performance 2012 • 5th Workshop on Cyber Security Experimentation and Test, CSET 2012 Zhang J, Berthier R, Rhee W, Bailey M, Pal P, Jahanian F, Sanders WH
Conference Learning from early attempts to measure information security performance 2012 • 5th Workshop on Cyber Security Experimentation and Test, CSET 2012 Zhang J, Berthier R, Rhee W, Bailey M, Pal P, Jahanian F, Sanders WH
Conference Learning from early attempts to measure information security performance 2012 • 5th Workshop on Cyber Security Experimentation and Test, CSET 2012 Zhang J, Berthier R, Rhee W, Bailey M, Pal P, Jahanian F, Sanders WH
Conference Safeguarding academic accounts and resources with the University Credential Abuse Auditing System 2012 • Proceedings of the International Conference on Dependable Systems and Networks Zhang J, Berthier R, Rhee W, Bailey M, Pal P, Jahanian F, Sanders WH
Conference Workshop on open resilient human-aware cyber-physical systems 2012 • Proceedings of the International Conference on Dependable Systems and Networks Jahanian F, and others
Conference A comparative study of two network-based anomaly detection methods 2011 • IEEE Infocom. Proceedings • 176-180 Nyalkalkar K, Sinhay S, Bailey M, Jahanian F
Conference An exploration of L2 cache covert channels in virtualized environments 2011 • Proceedings of the ACM Conference on Computer and Communications Security • 29-39 Xu Y, Bailey M, Jahanian F, Joshi K, Hiltunen M, Schlichting R
Conference CANVuS: Context-aware network vulnerability scanning 2010 • Lecture Notes in Computer Science • 6307 LNCS:138-157 Xu Y, Bailey M, Vander Weele E, Jahanian F
Conference Improving Spam Blacklisting Through Dynamic Thresholding and Speculative Aggregation 2010 • Proceedings of the Symposium on Network and Distributed System Security, NDSS 2010 Sinha S, Bailey M, Jahanian F
Conference Internet background radiation revisited 2010 • Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC • 62-74 Wustrow E, Karir M, Bailey M, Jahanian F, Huston G
Conference Internet inter-domain traffic 2010 • SIGCOMM'10 - Proceedings of the SIGCOMM 2010 Conference • 75-86 Labovitz C, Iekel-Johnson S, McPherson D, Oberheide J, Jahanian F
Conference Internet inter-domain traffic 2010 • Computer Communication Review • 40(4):75-86 Labovitz C, Iekel-Johnson S, McPherson D, Oberheide J, Jahanian F
Conference Message from the general chair and conference coordinator 2010 • Proceedings of the International Conference on Dependable Systems and Networks Jahanian F, Taylor D
Conference Proceedings of the International Conference on Dependable Systems and Networks: Message from the general chair and conference coordinator 2010 • Proceedings of the International Conference on Dependable Systems and Networks Jahanian F, Taylor D
Conference When mobile is harder than fixed (and vice versa): Demystifying security challenges in mobile environments 2010 • HotMobile 2010: The 11th Workshop on Mobile Computing Systems and Applications • 43-48 Oberheide J, Jahanian F
Conference Al survey of botnet technology and defenses 2009 • Proceedings - Cybersecurity Applications and Technology Conference for Homeland Security, CATCH 2009 • 299-304 Bailey M, Cooke E, Jahanian F, Xu Y, Karir M
Conference Dependability in the cloud: Challenges and opportunities 2009 • Proceedings of the International Conference on Dependable Systems and Networks • 103-104 Joshi KR, Bunker G, Jahanian F, Van Moorsel A, Weinman J
Conference If It ain't broke, don't fix it: Challenges and new directions for inferring the impact of software patches 2009 • Proceedings of HotOS 2009 - 12th Workshop on Hot Topics in Operating Systems Oberheide J, Cooke E, Jahanian F
Conference One size does not fit all: 10 years of applying context-aware security 2009 • 2009 IEEE Conference on Technologies for Homeland Security, HST 2009 • 14-21 Sinha S, Bailey M, Jahanian F