Mohammad Ashiqur Rahman

Orcid: 0000-0002-2963-7430

According to our database1, Mohammad Ashiqur Rahman authored at least 132 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Feasibility Analysis for Sybil Attacks in Shard-Based Permissionless Blockchains.
Distributed Ledger Technol. Res. Pract., December, 2023

Deep learning-based energy harvesting with intelligent deployment of RIS-assisted UAV-CFmMIMOs.
Comput. Networks, June, 2023

Optimal False Data Injection Attacks Against Power System Frequency Stability.
IEEE Trans. Smart Grid, March, 2023

Trajectory Synthesis for a UAV Swarm Based on Resilient Data Collection Objectives.
IEEE Trans. Netw. Serv. Manag., March, 2023

Optimal False Data Injection Attack Against Load-Frequency Control in Power Systems.
IEEE Trans. Inf. Forensics Secur., 2023

A Security Enforcement Framework for SDN Controller Using Game Theoretic Approach.
IEEE Trans. Dependable Secur. Comput., 2023

Adaptive Neuro-Fuzzy Inference System-based Lightweight Intrusion Detection System for UAVs.
Proceedings of the 48th IEEE Conference on Local Computer Networks, 2023

Q-SECURE: A Quantum Resistant Security for Resource Constrained IoT Device Encryption.
Proceedings of the 10th International Conference on Internet of Things: Systems, 2023

SHATTER: Control and Defense-Aware Attack Analytics for Activity-Driven Smart Home Systems.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

FAKEY: Fake Hashed Key Attack on Payment Channel Networks.
Proceedings of the IEEE Conference on Communications and Network Security, 2023

SHIP: Securing Hashed Timelock Contracts in Payment Channel Networks.
Proceedings of the IEEE Conference on Communications and Network Security, 2023

Adversarial Data-Augmented Resilient Intrusion Detection System for Unmanned Aerial Vehicles.
Proceedings of the IEEE International Conference on Big Data, 2023

Secure the 5G and Beyond Networks with Zero Trust and Access Control Systems for Cloud Native Architectures.
Proceedings of the 20th ACS/IEEE International Conference on Computer Systems and Applications, 2023

2022
Bayesian Hyperparameter Optimization for Deep Neural Network-Based Network Intrusion Detection.
CoRR, 2022

Secure Spectrum and Resource Sharing for 5G Networks using a Blockchain-based Decentralized Trusted Computing Platform.
CoRR, 2022

Techniques for Realizing Secure, Resilient and Differentiated 5G Operations.
Proceedings of the 14th IFIP Wireless and Mobile Networking Conference, 2022

Toward Zero Trust Security IN 5G Open Architecture Network Slices.
Proceedings of the IEEE Military Communications Conference, 2022

DeepCAD: A Stand-alone Deep Neural Network-based Framework for Classification and Anomaly Detection in Smart Healthcare Systems.
Proceedings of the IEEE International Conference on Digital Health, 2022

PHASE: Security Analyzer for Next-Generation Smart Personalized Smart Healthcare System.
Proceedings of the IEEE International Conference on Digital Health, 2022

On Algorand Transaction Fees: Challenges and Mechanism Design.
Proceedings of the IEEE International Conference on Communications, 2022

Optimal Improvement of Post-Disturbance Dynamic Response in Power Grids.
Proceedings of the IEEE Industry Applications Society Annual Meeting, 2022

A Literature Review on Blockchain-enabled Security and Operation of Cyber-Physical Systems.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

FED-UP: Federated Deep Reinforcement Learning-based UAV Path Planning against Hostile Defense System.
Proceedings of the 18th International Conference on Network and Service Management, 2022

Poster: A Novel Formal Threat Analyzer for Activity Monitoring-based Smart Home Heating, Ventilation, and Cooling Control System.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Resiliency-Aware Deployment of SDN in Smart Grid SCADA: A Formal Synthesis Model.
IEEE Trans. Netw. Serv. Manag., 2021

Strategic Defense Against Stealthy Link Flooding Attacks: A Signaling Game Approach.
IEEE Trans. Netw. Sci. Eng., 2021

Automated Configuration Synthesis for Resilient Smart Metering Infrastructure.
EAI Endorsed Trans. Security Safety, 2021

A Survey on Security and Privacy Issues in Modern Healthcare Systems: Attacks and Defenses.
ACM Trans. Comput. Heal., 2021

A Literature Review on Blockchain-enabled Security and Operation of Cyber-Physical Systems.
CoRR, 2021

A Novel Framework for Threat Analysis of Machine Learning-based Smart Healthcare Systems.
CoRR, 2021

Efficient UAV Trajectory-Planning using Economic Reinforcement Learning.
CoRR, 2021

False Relay Operation Attacks in Power Systems with High Renewables.
CoRR, 2021

False Data Injection Attack Against Power System Small-Signal Stability.
CoRR, 2021

REPlanner: Efficient UAV Trajectory-Planning using Economic Reinforcement Learning.
Proceedings of the IEEE International Conference on Smart Computing, 2021

iDDAF: An Intelligent Deceptive Data Acquisition Framework for Secure Cyber-Physical Systems.
Proceedings of the Security and Privacy in Communication Networks, 2021

BIoTA: Control-Aware Attack Analytics for Building Internet of Things.
Proceedings of the 18th Annual IEEE International Conference on Sensing, 2021

CURE: Enabling RF Energy Harvesting Using Cell-Free Massive MIMO UAVs Assisted by RIS.
Proceedings of the 46th IEEE Conference on Local Computer Networks, 2021

5G Core Security in Edge Networks: A Vulnerability Assessment Approach.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

BIOCAD: Bio-Inspired Optimization for Classification and Anomaly Detection in Digital Healthcare Systems.
Proceedings of the IEEE International Conference on Digital Health, 2021

Towards Blockchain-Based Secure Data Management for Remote Patient Monitoring.
Proceedings of the IEEE International Conference on Digital Health, 2021

DDAF: Deceptive Data Acquisition Framework against Stealthy Attacks in Cyber-Physical Systems.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

Ensemble-based Efficient Anomaly Detection for Smart Building Control Systems.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021

iAttackGen: Generative Synthesis of False Data Injection Attacks in Cyber-physical Systems.
Proceedings of the IEEE Conference on Communications and Network Security, 2021

Ride-Hailing for Autonomous Vehicles: Hyperledger Fabric-Based Secure and Decentralize Blockchain Platform.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

Bayesian Hyperparameter Optimization for Deep Neural Network-Based Network Intrusion Detection.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2020
Impact of Stealthy Attacks on Optimal Power Flow: A Simulink-Driven Formal Analysis.
IEEE Trans. Dependable Secur. Comput., 2020

A game-theoretic analysis to defend against remote operating system fingerprinting.
J. Inf. Secur. Appl., 2020

A signaling game approach to mitigate co-resident attacks in an IaaS cloud environment.
J. Inf. Secur. Appl., 2020

Machine Learning in Generation, Detection, and Mitigation of Cyberattacks in Smart Grid: A Survey.
CoRR, 2020

Smart Weather Forecasting Using Machine Learning: A Case Study in Tennessee.
CoRR, 2020

Automated Trajectory Synthesis for UAV Swarms Based on Resilient Data Collection Objectives.
CoRR, 2020

On the Feasibility of Sybil Attacks in Shard-Based Permissionless Blockchains.
CoRR, 2020

An energy-efficient load distribution framework for SDN controllers.
Computing, 2020

Formal Synthesis of Trajectories for Unmanned Aerial Vehicles to Perform Resilient Surveillance of Critical Power Transmission Lines.
Proceedings of the 25th International Conference on Engineering of Complex Computer Systems, 2020

Adversarial Attacks to Machine Learning-Based Smart Healthcare Systems.
Proceedings of the IEEE Global Communications Conference, 2020

On Incentive Compatible Role-Based Reward Distribution in Algorand.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020

G-IDS: Generative Adversarial Networks Assisted Intrusion Detection System.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

WTC^2: Impact-Aware Threat Analysis for Water Treatment Centers.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

Actionable Knowledge Extraction Framework for COVID-19.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

2019
A Requirement-Oriented Design of NFV Topology by Formal Synthesis.
IEEE Trans. Netw. Serv. Manag., 2019

Trajectory Synthesis for a UAV Swarm to Perform Resilient Requirement-Aware Surveillance: A Smart Grid-based Study.
CoRR, 2019

Novel Attacks against Contingency Analysis in Power Grids.
CoRR, 2019

Toward a Secure and Decentralized Blockchain-based Ride-Hailing Platform for Autonomous Vehicles.
CoRR, 2019

A Formal Approach for Efficient Navigation Management of Hybrid Electric Vehicles on Long Trips.
CoRR, 2019

Security design against stealthy attacks on power system state estimation: A formal approach.
Comput. Secur., 2019

An adaptive load balancing scheme for software-defined network controllers.
Comput. Networks, 2019

False data injection attacks against contingency analysis in power grids: poster.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Data Protection Labware for Mobile Security.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

HealthGuard: A Machine Learning-Based Security Framework for Smart Healthcare Systems.
Proceedings of the Sixth International Conference on Social Networks Analysis, 2019

A Signalling Game-Based Security Enforcement Mechanism for SDN Controllers.
Proceedings of the 10th International Conference on Computing, 2019

DroidPatrol: A Static Analysis Plugin For Secure Mobile Software Development.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

Hands-on File Inclusion Vulnerablity and Proactive Control for Secure Software Development.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

LIPs: A Protocol for Leadership Incentives for Heterogeneous and Dynamic Platoons.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

A Game-Theoretic Analysis of Pricing Competition between Aggregators in V2G Systems.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

A Formal Model for Resiliency-Aware Deployment of SDN: A SCADA-Based Case Study.
Proceedings of the 15th International Conference on Network and Service Management, 2019

Safety Analysis of AMI Networks Through Smart Fraud Detection.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

Blockchain-Based Charging Coordination Mechanism for Smart Grid Energy Storage Units.
Proceedings of the IEEE International Conference on Blockchain, 2019

2018
Blockchain-based Privacy-Preserving Charging Coordination Mechanism for Energy Storage Units.
CoRR, 2018

Load Control and Privacy-Preserving Scheme for Data Collection in AMI Networks.
CoRR, 2018

A new approach for energy efficiency in software defined network.
Proceedings of the Fifth International Conference on Software Defined Systems, 2018

A scalable and flexible DDoS mitigation system using network function virtualization.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Privacy Preserving Fine-Grained Data Distribution Aggregation for Smart Grid AMI Networks.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Poster Abstract: Safety Analysis for UAV Networks.
Proceedings of the 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation, 2018

Poster Abstract: Chained of Things: A Secure and Dependable Design of Autonomous Vehicle Services.
Proceedings of the 2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation, 2018

Formal Analysis of k-Resiliency for Collaborative UAVs.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Chained of Things: A Secure and Dependable Design of Autonomous Vehicle Services.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2017
Automated Synthesis of Distributed Network Access Controls: A Formal Framework with Refinement.
IEEE Trans. Parallel Distributed Syst., 2017

Secure and Private Data Aggregation for Energy Consumption Scheduling in Smart Grids.
IEEE Trans. Dependable Secur. Comput., 2017

Secure and efficient protection of consumer privacy in Advanced Metering Infrastructure supporting fine-grained data analysis.
J. Comput. Syst. Sci., 2017

Data-driven analytics for cyber-threat intelligence and information sharing.
Comput. Secur., 2017

A cost-effective security management for clouds: A game-theoretic deception mechanism.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

Optimal Deployment of Charging Stations for Electric Vehicles: A Formal Approach.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017

Formal Modelling and Verification of Requirements of Adaptive Routing Protocol for Mobile Ad-Hoc Network.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

Dynamic DDoS Defense Resource Allocation using Network Function Virtualization.
Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2017

Automated synthesis of NFV topology: A security requirement-oriented design.
Proceedings of the 13th International Conference on Network and Service Management, 2017

Cyber Threat Analysis Framework for the Wind Energy Based Power System.
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 2017

A Formal Framework of Resource Management for VNFaaS in Cloud.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

Protection by Detection: A Signaling Game Approach to Mitigate Co-Resident Attacks in Cloud.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
Security and Resiliency Analytics for Smart Grids - Static and Dynamic Approaches
Advances in Information Security 67, Springer, ISBN: 978-3-319-32871-3, 2016

Electric vehicle consumption markets: An economic analysis.
Proceedings of the 2016 IEEE Global Conference on Signal and Information Processing, 2016

Formal Analysis for Dependable Supervisory Control and Data Acquisition in Smart Grids.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

Analysis of trust models in Mobile Ad Hoc Networks: A simulation based study.
Proceedings of the 8th International Conference on Communication Systems and Networks, 2016

A Novel Secure and Efficient Policy Management Framework for Software Defined Network.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Message from STPSA 2016 Workshop Organizers.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

VFence: A Defense against Distributed Denial of Service Attacks Using Network Function Virtualization.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Automated synthesis of resiliency configurations for cyber networks.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

IoTSAT: A formal framework for security analysis of the internet of things (IoT).
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2015
Attribution, Temptation, and Expectation: A Formal Framework for Defense-by-Deception in Cyberwarfare.
Proceedings of the Cyber Warfare - Building the Scientific Foundation, 2015

Formal synthesis of dependable configurations for advanced metering infrastructures.
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015

Automated Decision Making for Active Cyber Defense: Panel Discussion.
Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense, 2015

SafeConfig 2015: Workshop on Automated Decision Making for Active Cyber Defense.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Impact Analysis of Topology Poisoning Attacks on Economic Operation of the Smart Power Grid.
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014

A formal model for verifying the impact of stealthy attacks on optimal power flow in power grids.
Proceedings of the ACM/IEEE International Conference on Cyber-Physical Systems, 2014

Security Threat Analytics and Countermeasure Synthesis for Power System State Estimation.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

Moving Target Defense for Hardening the Security of the Power System State Estimation.
Proceedings of the First ACM Workshop on Moving Target Defense, 2014

2013
A Noninvasive Threat Analyzer for Advanced Metering Infrastructure in Smart Grid.
IEEE Trans. Smart Grid, 2013

A formal model for verifying stealthy attacks on state estimation in power grids.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013

Metrics for Automated Network Security Design.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

A formal approach for network security management based on qualitative risk analysis.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

A Formal Framework for Network Security Design Synthesis.
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013

Energy efficient navigation management for hybrid electric vehicles on highways.
Proceedings of the ACM/IEEE 4th International Conference on Cyber-Physical Systems (with CPS Week 2013), 2013

A game-theoretic approach for deceiving Remote Operating System Fingerprinting.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

A formal model for sustainable vehicle-to-grid management.
Proceedings of the SEGS'13, 2013

2012
A Permission based Multilevel Parallel Solution for Distributed Mutual Exclusion.
J. Comput., 2012

Secure Distributed Solution for Optimal Energy Consumption Scheduling in Smart Grid.
Proceedings of the 11th IEEE International Conference on Trust, 2012

A Declarative Logic-Based Approach for Threat Analysis of Advanced Metering Infrastructure.
Proceedings of the Automated Security Management [papers from SafeConfig 2012, 2012

SmartAnalyzer: A noninvasive security threat analyzer for AMI smart grid.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

2011
AMIAnalyzer: Security analysis of AMI configurations.
Proceedings of the 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31, 2011

A declarative approach for global network security configuration verification and evaluation.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

2010
A Permission Based Hierarchical Algorithm for Mutual Exclusion.
J. Comput., 2010

A consensus-based <i>l</i>-Exclusion algorithm for mobile ad hoc networks.
Ad Hoc Networks, 2010

2007
A Quorum Based Distributed Mutual Exclusion Algorithm for Multi-Level Clustered Network Architecture.
Proceedings of the Workshop on Algorithms and Computation 2007, 2007


  Loading...