Mohammad Zulkernine

According to our database1, Mohammad Zulkernine
  • authored at least 140 papers between 2001 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Protecting Internet users from becoming victimized attackers of click-fraud.
Journal of Software: Evolution and Process, 2018

2017
A Reliability-Based Resource Allocation Approach for Cloud Computing.
Proceedings of the 2017 IEEE 7th International Symposium on Cloud and Service Computing, 2017

Flamingo: a framework for smartphone security context management.
Proceedings of the Symposium on Applied Computing, 2017

Detecting DNS Tunneling Using Ensemble Learning.
Proceedings of the Network and System Security - 11th International Conference, 2017

Droid Mood Swing (DMS): Automatic Security Modes Based on Contexts.
Proceedings of the Information Security - 20th International Conference, 2017

Defending Application Cache Integrity of Android Runtime.
Proceedings of the Information Security Practice and Experience, 2017

A Participant Contribution Trust Scheme for Crisis Response Systems.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

A Constraint-based intrusion detection system.
Proceedings of the Fifth European Conference on the Engineering of Computer-Based Systems, 2017

Towards defending connected vehicles against attacks.
Proceedings of the Fifth European Conference on the Engineering of Computer-Based Systems, 2017

Message from SEPT 2017 Organizing Committee.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

TRUST-CAP: A Trust Model for Cloud-Based Applications.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
Special issue on High Assurance Systems Engineering.
Software Quality Journal, 2016

Evaluating the impact of design pattern and anti-pattern dependencies on changes and faults.
Empirical Software Engineering, 2016

SAM: A secure anti-malware framework for the smartphone operating systems.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

Intrusion detection in a private network by satisfying constraints.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Analysing vulnerability reproducibility for Firefox browser.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Zonedroid: control your droid through application zoning.
Proceedings of the 11th International Conference on Malicious and Unwanted Software, 2016

DACPI: A decentralized access control protocol for information centric networking.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

FCFraud: Fighting Click-Fraud from the User Side.
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016

CLOUBEX: A Cloud-Based Security Analysis Framework for Browser Extensions.
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016

A Reputation System to Evaluate Participants for Participatory Sensing.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Message from the SEPT Organizing Committee.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Message from STPSA 2016 Workshop Organizers.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

IFCaaS: Information Flow Control as a Service for Cloud Security.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
An Empirical Evaluation of Web-Based Fingerprinting.
IEEE Software, 2015

A Classification of Intrusion Detection Systems in the Cloud.
JIP, 2015

A Survey of Security Attacks in Information-Centric Networking.
IEEE Communications Surveys and Tutorials, 2015

FPGuard: Detection and Prevention of Browser Fingerprinting.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

Message from SEPT Symposium Organizing Committee.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

CloudZombie: Launching and Detecting Slow-Read Distributed Denial of Service Attacks from the Cloud.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

Detection and Prevention of Malicious Requests in ICN Routing and Caching.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
Preventing Cache-Based Side-Channel Attacks in a Cloud Environment.
IEEE Trans. Cloud Computing, 2014

Special issue on "Trustworthy Software Systems for the Digital Society".
Journal of Systems and Software, 2014

Software control flow error detection and correlation with system performance deviation.
J. Comput. Syst. Sci., 2014

Effective detection of vulnerable and malicious browser extensions.
Computers & Security, 2014

FRanC: A Ranking Framework for the Prioritization of Software Maintenance.
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014

Countermeasures for Mitigating ICN Routing Related DDoS Attacks.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

A Hybrid Monitoring of Software Design-Level Security Specifications.
Proceedings of the 2014 14th International Conference on Quality Software, 2014

Anti-pattern Mutations and Fault-proneness.
Proceedings of the 2014 14th International Conference on Quality Software, 2014

Classification of participatory sensing privacy schemes.
Proceedings of the IEEE 39th Conference on Local Computer Networks, Edmonton, AB, Canada, 8-11 September, 2014, 2014

On evaluating and securing firefox for Android browser extensions.
Proceedings of the 1st International Conference on Mobile Software Engineering and Systems, 2014

TabsGuard: A Hybrid Approach to Detect and Prevent Tabnabbing Attacks.
Proceedings of the Risks and Security of Internet and Systems, 2014

2013
A Model-Based Detection of Vulnerable and Malicious Browser Extensions.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013

Confeagle: Automated Analysis of Configuration Vulnerabilities in Web Applications.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013

OSDC: adapting ODC for developing more secure software.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Towards a ranking framework for software components.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Runtime Prediction of Failure Modes from System Error Logs.
Proceedings of the 2013 18th International Conference on Engineering of Complex Computer Systems, 2013

Protecting Web Browser Extensions from JavaScript Injection Attacks.
Proceedings of the 2013 18th International Conference on Engineering of Complex Computer Systems, 2013

Software Assurance: What Should We Do Next?
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

EINSPECT: Evolution-Guided Analysis and Detection of Malicious Web Pages.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

Quality software for quality service (QS4QS).
Proceedings of the Center for Advanced Studies on Collaborative Research, 2013

A Server-Side Solution to Cache-Based Side-Channel Attacks in the Cloud.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013

2012
Guest Editorial: Special section on software reliability and security.
Information & Software Technology, 2012

Trustworthiness testing of phishing websites: A behavior model-based approach.
Future Generation Comp. Syst., 2012

Mitigating program security vulnerabilities: Approaches and challenges.
ACM Comput. Surv., 2012

DESERVE: A Framework for Detecting Program Security Vulnerability Exploitations.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

A Control Flow Representation for Component-Based Software Reliability Analysis.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

Mutation Testing of Event Processing Queries.
Proceedings of the 23rd IEEE International Symposium on Software Reliability Engineering, 2012

Information-Theoretic Detection of SQL Injection Attacks.
Proceedings of the 14th International IEEE Symposium on High-Assurance Systems Engineering, 2012

A Comparative Study of Software Security Pattern Classifications.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Guest Editorial.
JSW, 2011

Taxonomy and classification of automatic monitoring of program security vulnerability exploitations.
Journal of Systems and Software, 2011

Using complexity, coupling, and cohesion metrics as early indicators of vulnerabilities.
Journal of Systems Architecture - Embedded Systems Design, 2011

Information Source-Based Classification of Automatic Phishing Website Detectors.
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011

Building components with embedded security monitors.
Proceedings of the 7th International Conference on the Quality of Software Architectures, 2011

Server Side Detection of Content Sniffing Attacks.
Proceedings of the IEEE 22nd International Symposium on Software Reliability Engineering, 2011

A Fuzzy Logic-Based Buffer Overflow Vulnerability Auditor.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

S2XS2: A Server Side Approach to Automatically Detect XSS Attacks.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

A Connection-Based Signature Approach for Control Flow Error Detection.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

A Natural Classification Scheme for Software Security Patterns.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

Security Monitoring of Components Using Aspects and Contracts in Wrappers.
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

Injecting Comments to Detect JavaScript Code Injection Attacks.
Proceedings of the Workshop Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

2010
Monitoring Buffer Overflow Attacks: A Perennial Task.
IJSSE, 2010

Assessing Test Suites for Buffer Overflow Vulnerabilities.
International Journal of Software Engineering and Knowledge Engineering, 2010

Classification of Static Analysis-Based Buffer Overflow Detectors.
Proceedings of the Fourth International Conference on Secure Software Integration and Reliability Improvement, 2010

PhishTester: Automatic Testing of Phishing Attacks.
Proceedings of the Fourth International Conference on Secure Software Integration and Reliability Improvement, 2010

Failure Type-Aware Reliability Assessment with Component Failure Dependency.
Proceedings of the Fourth International Conference on Secure Software Integration and Reliability Improvement, 2010

Can complexity, coupling, and cohesion metrics be used as early indicators of vulnerabilities?
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Client-Side Detection of Cross-Site Request Forgery Attacks.
Proceedings of the IEEE 21st International Symposium on Software Reliability Engineering, 2010

Architectural Design Decisions for Achieving Reliable Software Systems.
Proceedings of the Architecting Critical Systems, First International Symposium, 2010

A taxonomy of software architecture-based reliability efforts.
Proceedings of the 2010 ICSE Workshop on Sharing and Reusing Architectural Knowledge, 2010

The Level of Decomposition Impact on Component Fault Tolerance.
Proceedings of the Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

Classification of Buffer Overflow Vulnerability Monitors.
Proceedings of the ARES 2010, 2010

2009
Collaboration through computation: incorporating trust model into service-based software systems.
Service Oriented Computing and Applications, 2009

A model-based aspect-oriented framework for building intrusion-aware software systems.
Information & Software Technology, 2009

Towards Model-Based Automatic Testing of Attack Scenarios.
Proceedings of the Computer Safety, 2009

ATM: an automatic trust monitoring algorithm for service software.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Towards developing a trust-based security solution.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

MUTEC: Mutation-based testing of Cross Site Scripting.
Proceedings of the ICSE Workshop on Software Engineering for Secure Systems, 2009

Secure Method Calls by Instrumenting Bytecode with Aspects.
Proceedings of the Data and Applications Security XXIII, 2009

Activity and Artifact Views of a Secure Software Development Process.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Automatic Testing of Program Security Vulnerabilities.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

On Selecting Appropriate Development Processes and Requirements Engineering Methods for Secure Software.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

2008
Random-Forests-Based Network Intrusion Detection Systems.
IEEE Trans. Systems, Man, and Cybernetics, Part C, 2008

Architecture and Implementation of a trust Model for Pervasive Applications.
J. Mobile Multimedia, 2008

CAT: a context-aware trust model for open and dynamic systems.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

UMLtrust: towards developing trust-aware software.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

An anomaly intrusion detection method using the CSI-KNN algorithm.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

MUSIC: Mutation-based SQL Injection Vulnerability Checking.
Proceedings of the Eighth International Conference on Quality Software, 2008

On Failure Propagation in Component-Based Software Systems.
Proceedings of the Eighth International Conference on Quality Software, 2008

Security metrics for source code structures.
Proceedings of the Fourth International Workshop on Software Engineering for Secure Systems, 2008

Mutation-Based Testing of Format String Bugs.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008

At What Level of Granularity Should We be Componentizing for Software Reliability?
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008

Towards Secure Trust Bootstrapping in Pervasive Computing Environment.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008

Mutation-Based Testing of Buffer Overflow Vulnerabilities.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

Quantifying Security in Secure Software Development Phases.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

STPSA 2008 Workshop Organization.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

Message from the STPSA 2008 Workshop Organizers.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

A Distributed Defense Framework for Flooding-Based DDoS Attacks.
Proceedings of the The Third International Conference on Availability, 2008

Towards Incorporating Discrete-Event Systems in Secure Software Development.
Proceedings of the The Third International Conference on Availability, 2008

An Intrusion-Tolerant Mechanism for Intrusion Detection Systems.
Proceedings of the The Third International Conference on Availability, 2008

2007
Intrusion detection aware component-based systems: A specification-based framework.
Journal of Systems and Software, 2007

A software-based trust framework for distributed industrial management systems.
Journal of Systems and Software, 2007

Integrating software specifications into intrusion detection.
Int. J. Inf. Sec., 2007

Packet Filtering Based on Source Router Marking and Hop-Count.
Proceedings of the 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 2007

E-NIPS: An Event-Based Network Intrusion Prediction System.
Proceedings of the Information Security, 10th International Conference, 2007

Detecting Flooding-Based DDoS Attacks.
Proceedings of IEEE International Conference on Communications, 2007

The Power of Temporal Pattern Processing in Anomaly Intrusion Detection.
Proceedings of IEEE International Conference on Communications, 2007

Improving Reliability and Safety by Trading off Software Failure Criticalities.
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007

Towards an Aspect-Oriented Intrusion Detection Framework.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

ACIR: An Aspect-Connector for Intrusion Response.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

AsmLSec: An Extension of Abstract State Machine Language for Attack Scenario Specification.
Proceedings of the The Second International Conference on Availability, 2007

2006
Bridging the gap: software specification meets intrusion detector.
Proceedings of the 2006 International Conference on Privacy, 2006

Anomaly Based Network Intrusion Detection with Unsupervised Outlier Detection.
Proceedings of IEEE International Conference on Communications, 2006

UMLintr: A UML Profile for Specifying Intrusions.
Proceedings of the 13th Annual IEEE International Conference and Workshop on Engineering of Computer Based Systems (ECBS 2006), 2006

Efficacy of Hidden Markov Models Over Neural Networks in Anomaly Intrusion Detection.
Proceedings of the 30th Annual International Computer Software and Applications Conference, 2006

A Trust Framework for Pervasive Computing Environments.
Proceedings of the 2006 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2006), 2006

A Hybrid Network Intrusion Detection Technique Using Random Forests.
Proceedings of the The First International Conference on Availability, 2006

A Dependable Device Discovery Approach for Pervasive Computing Middleware.
Proceedings of the The First International Conference on Availability, 2006

2005
Towards automatic monitoring of component-based software systems.
Journal of Systems and Software, 2005

Routeguard: an intrusion detection and response system for mobile ad hoc networks.
Proceedings of the 2005 IEEE International Conference on Wireless And Mobile Computing, 2005

DIDMA: A Distributed Intrusion Detection System Using Mobile Agents.
Proceedings of the 6th ACIS International Conference on Software Engineering, 2005

A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection.
Proceedings of the 6th ACIS International Conference on Software Engineering, 2005

Network Intrusion Detection using Random Forests.
Proceedings of the Third Annual Conference on Privacy, 2005

Towards an Intrusion Detection System for Pervasive Computing Environments.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Detecting Intrusions Specified in a Software Specification Language.
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005

2004
Towards Developing Sensor Networks Monitoring as a Middleware Service.
Proceedings of the 33rd International Conference on Parallel Processing Workshops (ICPP 2004 Workshops), 2004

2002
Assume-Guarantee Algorithms for Automatic Detection of Software Failures.
Proceedings of the Integrated Formal Methods, Third International Conference, 2002

A Compositional Approach to Monitoring Distributed Systems.
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002

2001
Assume-Guarantee Supervisor for Concurrent Systems.
Proceedings of the 15th International Parallel & Distributed Processing Symposium (IPDPS-01), 2001


  Loading...