Mohammad Zulkernine
According to our database1, Mohammad Zulkernine
Timeline
Legend:
Book In proceedings Article PhD thesis OtherLinks
On csauthors.net:
Bibliography
2017
Flamingo: a framework for smartphone security context management.
Proceedings of the Symposium on Applied Computing, 2017
Detecting DNS Tunneling Using Ensemble Learning.
Proceedings of the Network and System Security - 11th International Conference, 2017
Droid Mood Swing (DMS): Automatic Security Modes Based on Contexts.
Proceedings of the Information Security - 20th International Conference, 2017
Defending Application Cache Integrity of Android Runtime.
Proceedings of the Information Security Practice and Experience, 2017
A Participant Contribution Trust Scheme for Crisis Response Systems.
Proceedings of the 2017 IEEE Global Communications Conference, 2017
A Constraint-based intrusion detection system.
Proceedings of the Fifth European Conference on the Engineering of Computer-Based Systems, 2017
Towards defending connected vehicles against attacks.
Proceedings of the Fifth European Conference on the Engineering of Computer-Based Systems, 2017
Message from SEPT 2017 Organizing Committee.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017
TRUST-CAP: A Trust Model for Cloud-Based Applications.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017
2016
Special issue on High Assurance Systems Engineering.
Software Quality Journal, 2016
Evaluating the impact of design pattern and anti-pattern dependencies on changes and faults.
Empirical Software Engineering, 2016
SAM: A secure anti-malware framework for the smartphone operating systems.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016
Intrusion detection in a private network by satisfying constraints.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Analysing vulnerability reproducibility for Firefox browser.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Zonedroid: control your droid through application zoning.
Proceedings of the 11th International Conference on Malicious and Unwanted Software, 2016
DACPI: A decentralized access control protocol for information centric networking.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
FCFraud: Fighting Click-Fraud from the User Side.
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016
CLOUBEX: A Cloud-Based Security Analysis Framework for Browser Extensions.
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016
A Reputation System to Evaluate Participants for Participatory Sensing.
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Message from the SEPT Organizing Committee.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
Message from STPSA 2016 Workshop Organizers.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
IFCaaS: Information Flow Control as a Service for Cloud Security.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
An Empirical Evaluation of Web-Based Fingerprinting.
IEEE Software, 2015
A Classification of Intrusion Detection Systems in the Cloud.
JIP, 2015
A Survey of Security Attacks in Information-Centric Networking.
IEEE Communications Surveys and Tutorials, 2015
FPGuard: Detection and Prevention of Browser Fingerprinting.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015
Message from SEPT Symposium Organizing Committee.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015
CloudZombie: Launching and Detecting Slow-Read Distributed Denial of Service Attacks from the Cloud.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015
Detection and Prevention of Malicious Requests in ICN Routing and Caching.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015
2014
Preventing Cache-Based Side-Channel Attacks in a Cloud Environment.
IEEE Trans. Cloud Computing, 2014
Special issue on "Trustworthy Software Systems for the Digital Society".
Journal of Systems and Software, 2014
Software control flow error detection and correlation with system performance deviation.
J. Comput. Syst. Sci., 2014
Effective detection of vulnerable and malicious browser extensions.
Computers & Security, 2014
FRanC: A Ranking Framework for the Prioritization of Software Maintenance.
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014
Countermeasures for Mitigating ICN Routing Related DDoS Attacks.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
A Hybrid Monitoring of Software Design-Level Security Specifications.
Proceedings of the 2014 14th International Conference on Quality Software, 2014
Anti-pattern Mutations and Fault-proneness.
Proceedings of the 2014 14th International Conference on Quality Software, 2014
Classification of participatory sensing privacy schemes.
Proceedings of the IEEE 39th Conference on Local Computer Networks, Edmonton, AB, Canada, 8-11 September, 2014, 2014
On evaluating and securing firefox for Android browser extensions.
Proceedings of the 1st International Conference on Mobile Software Engineering and Systems, 2014
TabsGuard: A Hybrid Approach to Detect and Prevent Tabnabbing Attacks.
Proceedings of the Risks and Security of Internet and Systems, 2014
2013
A Model-Based Detection of Vulnerable and Malicious Browser Extensions.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013
Confeagle: Automated Analysis of Configuration Vulnerabilities in Web Applications.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013
OSDC: adapting ODC for developing more secure software.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013
Towards a ranking framework for software components.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013
Runtime Prediction of Failure Modes from System Error Logs.
Proceedings of the 2013 18th International Conference on Engineering of Complex Computer Systems, 2013
Protecting Web Browser Extensions from JavaScript Injection Attacks.
Proceedings of the 2013 18th International Conference on Engineering of Complex Computer Systems, 2013
Software Assurance: What Should We Do Next?
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013
EINSPECT: Evolution-Guided Analysis and Detection of Malicious Web Pages.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013
Quality software for quality service (QS4QS).
Proceedings of the Center for Advanced Studies on Collaborative Research, 2013
A Server-Side Solution to Cache-Based Side-Channel Attacks in the Cloud.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013
2012
Guest Editorial: Special section on software reliability and security.
Information & Software Technology, 2012
Trustworthiness testing of phishing websites: A behavior model-based approach.
Future Generation Comp. Syst., 2012
Mitigating program security vulnerabilities: Approaches and challenges.
ACM Comput. Surv., 2012
DESERVE: A Framework for Detecting Program Security Vulnerability Exploitations.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012
A Control Flow Representation for Component-Based Software Reliability Analysis.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012
Mutation Testing of Event Processing Queries.
Proceedings of the 23rd IEEE International Symposium on Software Reliability Engineering, 2012
Information-Theoretic Detection of SQL Injection Attacks.
Proceedings of the 14th International IEEE Symposium on High-Assurance Systems Engineering, 2012
A Comparative Study of Software Security Pattern Classifications.
Proceedings of the Seventh International Conference on Availability, 2012
2011
Guest Editorial.
JSW, 2011
Taxonomy and classification of automatic monitoring of program security vulnerability exploitations.
Journal of Systems and Software, 2011
Using complexity, coupling, and cohesion metrics as early indicators of vulnerabilities.
Journal of Systems Architecture - Embedded Systems Design, 2011
Information Source-Based Classification of Automatic Phishing Website Detectors.
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011
Building components with embedded security monitors.
Proceedings of the 7th International Conference on the Quality of Software Architectures, 2011
Server Side Detection of Content Sniffing Attacks.
Proceedings of the IEEE 22nd International Symposium on Software Reliability Engineering, 2011
A Fuzzy Logic-Based Buffer Overflow Vulnerability Auditor.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011
S2XS2: A Server Side Approach to Automatically Detect XSS Attacks.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011
A Connection-Based Signature Approach for Control Flow Error Detection.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011
A Natural Classification Scheme for Software Security Patterns.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011
Security Monitoring of Components Using Aspects and Contracts in Wrappers.
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011
Injecting Comments to Detect JavaScript Code Injection Attacks.
Proceedings of the Workshop Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011
2010
Monitoring Buffer Overflow Attacks: A Perennial Task.
IJSSE, 2010
Assessing Test Suites for Buffer Overflow Vulnerabilities.
International Journal of Software Engineering and Knowledge Engineering, 2010
Classification of Static Analysis-Based Buffer Overflow Detectors.
Proceedings of the Fourth International Conference on Secure Software Integration and Reliability Improvement, 2010
PhishTester: Automatic Testing of Phishing Attacks.
Proceedings of the Fourth International Conference on Secure Software Integration and Reliability Improvement, 2010
Failure Type-Aware Reliability Assessment with Component Failure Dependency.
Proceedings of the Fourth International Conference on Secure Software Integration and Reliability Improvement, 2010
Can complexity, coupling, and cohesion metrics be used as early indicators of vulnerabilities?
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010
Client-Side Detection of Cross-Site Request Forgery Attacks.
Proceedings of the IEEE 21st International Symposium on Software Reliability Engineering, 2010
Architectural Design Decisions for Achieving Reliable Software Systems.
Proceedings of the Architecting Critical Systems, First International Symposium, 2010
A taxonomy of software architecture-based reliability efforts.
Proceedings of the 2010 ICSE Workshop on Sharing and Reusing Architectural Knowledge, 2010
The Level of Decomposition Impact on Component Fault Tolerance.
Proceedings of the Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010
Classification of Buffer Overflow Vulnerability Monitors.
Proceedings of the ARES 2010, 2010
2009
Collaboration through computation: incorporating trust model into service-based software systems.
Service Oriented Computing and Applications, 2009
A model-based aspect-oriented framework for building intrusion-aware software systems.
Information & Software Technology, 2009
Towards Model-Based Automatic Testing of Attack Scenarios.
Proceedings of the Computer Safety, 2009
ATM: an automatic trust monitoring algorithm for service software.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009
Towards developing a trust-based security solution.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009
MUTEC: Mutation-based testing of Cross Site Scripting.
Proceedings of the ICSE Workshop on Software Engineering for Secure Systems, 2009
Secure Method Calls by Instrumenting Bytecode with Aspects.
Proceedings of the Data and Applications Security XXIII, 2009
Activity and Artifact Views of a Secure Software Development Process.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Automatic Testing of Program Security Vulnerabilities.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009
On Selecting Appropriate Development Processes and Requirements Engineering Methods for Secure Software.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009
2008
Random-Forests-Based Network Intrusion Detection Systems.
IEEE Trans. Systems, Man, and Cybernetics, Part C, 2008
Architecture and Implementation of a trust Model for Pervasive Applications.
J. Mobile Multimedia, 2008
CAT: a context-aware trust model for open and dynamic systems.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008
UMLtrust: towards developing trust-aware software.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008
An anomaly intrusion detection method using the CSI-KNN algorithm.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008
MUSIC: Mutation-based SQL Injection Vulnerability Checking.
Proceedings of the Eighth International Conference on Quality Software, 2008
On Failure Propagation in Component-Based Software Systems.
Proceedings of the Eighth International Conference on Quality Software, 2008
Security metrics for source code structures.
Proceedings of the Fourth International Workshop on Software Engineering for Secure Systems, 2008
Mutation-Based Testing of Format String Bugs.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008
At What Level of Granularity Should We be Componentizing for Software Reliability?
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008
Towards Secure Trust Bootstrapping in Pervasive Computing Environment.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008
Mutation-Based Testing of Buffer Overflow Vulnerabilities.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008
Quantifying Security in Secure Software Development Phases.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008
STPSA 2008 Workshop Organization.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008
Message from the STPSA 2008 Workshop Organizers.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008
A Distributed Defense Framework for Flooding-Based DDoS Attacks.
Proceedings of the The Third International Conference on Availability, 2008
Towards Incorporating Discrete-Event Systems in Secure Software Development.
Proceedings of the The Third International Conference on Availability, 2008
An Intrusion-Tolerant Mechanism for Intrusion Detection Systems.
Proceedings of the The Third International Conference on Availability, 2008
2007
Intrusion detection aware component-based systems: A specification-based framework.
Journal of Systems and Software, 2007
A software-based trust framework for distributed industrial management systems.
Journal of Systems and Software, 2007
Integrating software specifications into intrusion detection.
Int. J. Inf. Sec., 2007
Packet Filtering Based on Source Router Marking and Hop-Count.
Proceedings of the 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 2007
E-NIPS: An Event-Based Network Intrusion Prediction System.
Proceedings of the Information Security, 10th International Conference, 2007
Detecting Flooding-Based DDoS Attacks.
Proceedings of IEEE International Conference on Communications, 2007
The Power of Temporal Pattern Processing in Anomaly Intrusion Detection.
Proceedings of IEEE International Conference on Communications, 2007
Improving Reliability and Safety by Trading off Software Failure Criticalities.
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007
Towards an Aspect-Oriented Intrusion Detection Framework.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007
ACIR: An Aspect-Connector for Intrusion Response.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007
AsmLSec: An Extension of Abstract State Machine Language for Attack Scenario Specification.
Proceedings of the The Second International Conference on Availability, 2007
2006
Bridging the gap: software specification meets intrusion detector.
Proceedings of the 2006 International Conference on Privacy, 2006
Anomaly Based Network Intrusion Detection with Unsupervised Outlier Detection.
Proceedings of IEEE International Conference on Communications, 2006
UMLintr: A UML Profile for Specifying Intrusions.
Proceedings of the 13th Annual IEEE International Conference and Workshop on Engineering of Computer Based Systems (ECBS 2006), 2006
Efficacy of Hidden Markov Models Over Neural Networks in Anomaly Intrusion Detection.
Proceedings of the 30th Annual International Computer Software and Applications Conference, 2006
A Trust Framework for Pervasive Computing Environments.
Proceedings of the 2006 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2006), 2006
A Hybrid Network Intrusion Detection Technique Using Random Forests.
Proceedings of the The First International Conference on Availability, 2006
A Dependable Device Discovery Approach for Pervasive Computing Middleware.
Proceedings of the The First International Conference on Availability, 2006
2005
Towards automatic monitoring of component-based software systems.
Journal of Systems and Software, 2005
Routeguard: an intrusion detection and response system for mobile ad hoc networks.
Proceedings of the 2005 IEEE International Conference on Wireless And Mobile Computing, 2005
DIDMA: A Distributed Intrusion Detection System Using Mobile Agents.
Proceedings of the 6th ACIS International Conference on Software Engineering, 2005
A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection.
Proceedings of the 6th ACIS International Conference on Software Engineering, 2005
Network Intrusion Detection using Random Forests.
Proceedings of the Third Annual Conference on Privacy, 2005
Towards an Intrusion Detection System for Pervasive Computing Environments.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005
Detecting Intrusions Specified in a Software Specification Language.
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005
2004
Towards Developing Sensor Networks Monitoring as a Middleware Service.
Proceedings of the 33rd International Conference on Parallel Processing Workshops (ICPP 2004 Workshops), 2004
2002
Assume-Guarantee Algorithms for Automatic Detection of Software Failures.
Proceedings of the Integrated Formal Methods, Third International Conference, 2002
A Compositional Approach to Monitoring Distributed Systems.
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002
2001
Assume-Guarantee Supervisor for Concurrent Systems.
Proceedings of the 15th International Parallel & Distributed Processing Symposium (IPDPS-01), 2001