Mohammad Zulkernine

Orcid: 0000-0003-1697-4101

According to our database1, Mohammad Zulkernine authored at least 229 papers between 2001 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Beyond Smart Homes: An In-Depth Analysis of Smart Aging Care System Security.
ACM Comput. Surv., February, 2024

2023
Security assessment of in-vehicle communication protocols.
Veh. Commun., December, 2023

AIM: An Android Interpretable Malware detector based on application class modeling.
J. Inf. Secur. Appl., June, 2023

D2D-MAP: A Drone to Drone Authentication Protocol Using Physical Unclonable Functions.
IEEE Trans. Veh. Technol., April, 2023

Detection of Cyberbullying in Social Media Texts Using Explainable Artificial Intelligence.
Proceedings of the Ubiquitous Security, 2023

TrainSec: A Simulation Framework for Security Modeling and Evaluation in CBTC Networks.
Proceedings of the Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification, 2023

A VeReMi-based Dataset for Predicting the Effect of Attacks in VANETs.
Proceedings of the Int'l ACM Conference on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2023

CBTCset: A Reference Dataset for Detecting Misbehavior Attacks in CBTC Networks.
Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering, ISSRE 2023, 2023

Risk Assessment in Smart Aging Care Systems: An Elderly-Centered Perspective.
Proceedings of the IEEE International Conference on Digital Health, 2023

Attack Endgame: Proactive Security Approach for Predicting Attack Consequences in VANET.
Proceedings of the IEEE International Conference on Communications, 2023

Autonomous and Security-Aware Dynamic Vehicular Platoon Formation.
Proceedings of the 10th International Conference on Dependable Systems and Their Applications, 2023

Automatic Conversion of ABAC Policies for RBAC Systems.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2023

The Tables Have Turned: GPT-3 Distinguishing Passwords from Honeywords.
Proceedings of the IEEE Conference on Communications and Network Security, 2023

The Ultimate Battle Against Zero-Day Exploits: Toward Fully Autonomous Cyber-Physical Defense.
Proceedings of the IEEE International Conference on Software Services Engineering, 2023

2022
A coalitional security game against data integrity attacks in autonomous vehicle networks.
Veh. Commun., 2022

AdaptIDS: Adaptive Intrusion Detection for Mission-Critical Aerospace Vehicles.
IEEE Trans. Intell. Transp. Syst., 2022

OD1NF1ST: True Skip Intrusion Detection and Avionics Network Cyber-attack Simulation.
ACM Trans. Cyber Phys. Syst., 2022

A Review and Analysis of Attack Vectors on MIL-STD-1553 Communication Bus.
IEEE Trans. Aerosp. Electron. Syst., 2022

CamoDroid: An Android application analysis environment resilient against sandbox evasion.
J. Syst. Archit., 2022

Scalable Collaborative Intrusion Detection in Autonomous Vehicular Networks: A hierarchical framework based on game theory.
Internet Things, 2022

Classification-Based Anomaly Prediction in XACML Policies.
Proceedings of the Security and Privacy in Communication Networks, 2022

SAS-GKE: A Secure Authenticated Scalable Group Key Exchange.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

SV1DUR: A Real-Time MIL-STD-1553 Bus Simulator with Flight Subsystems for Cyber-Attack Modeling and Assessments.
Proceedings of the IEEE Military Communications Conference, 2022

DKS-PKI: A Distributed Key Server Architecture for Public Key Infrastructure.
Proceedings of the Information Systems Security - 18th International Conference, 2022

Mining Attribute-Based Access Control Policies.
Proceedings of the Information Systems Security - 18th International Conference, 2022

AT-CBDC: Achieving Anonymity and Traceability in Central Bank Digital Currency.
Proceedings of the IEEE International Conference on Communications, 2022

Detecting Intrusions in Communication-Based Train Control Systems.
Proceedings of the IEEE International Conference on Communications, 2022

Stealthy Data Corruption Attack Against Road Traffic Congestion Avoidance Applications.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

Security Pattern Detection Through Diagonally Distributed Matrix Matching.
Proceedings of the 9th International Conference on Dependable Systems and Their Applications, 2022

A Scary Peek into The Future: Advanced Persistent Threats in Emerging Computing Environments.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022

Message from the Standing Committee Vice Chairs.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

SAMM: Situation Awareness with Machine Learning for Misbehavior Detection in VANET.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
Vulnerability-Oriented Fuzz Testing for Connected Autonomous Vehicle Systems.
IEEE Trans. Reliab., 2021

Protecting the Internet of Vehicles Against Advanced Persistent Threats: A Bayesian Stackelberg Game.
IEEE Trans. Reliab., 2021

A security pattern detection framework for building more secure software.
J. Syst. Softw., 2021

A secure architecture for TCP/UDP-based cloud communications.
Int. J. Inf. Sec., 2021

More Lessons: Analysis of PUF-based Authentication Protocols for IoT.
IACR Cryptol. ePrint Arch., 2021

IEEE COMPSAC 2022.
Computer, 2021

RansomCare: Data-centric detection and mitigation against smartphone crypto-ransomware.
Comput. Networks, 2021

T2T-MAP: A PUF-Based Thing-to-Thing Mutual Authentication Protocol for IoT.
IEEE Access, 2021

DeepGuard: A DeepBillboard Attack Detection Technique against Connected and Autonomous Vehicles.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

Boosting Grey-box Fuzzing for Connected Autonomous Vehicle Systems.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

Towards a Secure Software Lifecycle for Autonomous Vehicles.
Proceedings of the IEEE International Symposium on Software Reliability Engineering, 2021

Cut It: Deauthentication Attacks on Protected Management Frames in WPA2 and WPA3.
Proceedings of the Foundations and Practice of Security - 14th International Symposium, 2021

Reinforcement Learning-driven Attack on Road Traffic Signal Controllers.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

AVSDA: Autonomous Vehicle Security Decay Assessment.
Proceedings of the Risks and Security of Internet and Systems, 2021

Policy Modeling and Anomaly Detection in ABAC Policies.
Proceedings of the Risks and Security of Internet and Systems, 2021

2020
A classification of attacks to In-Vehicle Components (IVCs).
Veh. Commun., 2020

Vehicle Software Engineering (VSE): Research and Practice.
IEEE Internet Things J., 2020

Attacks and Defenses in Short-Range Wireless Technologies for IoT.
IEEE Access, 2020

PredictDeep: Security Analytics as a Service for Anomaly Detection and Prediction.
IEEE Access, 2020

Exploiting Race Condition for Wi-Fi Denial of Service Attacks.
Proceedings of the SIN 2020: 13th International Conference on Security of Information and Networks, 2020

LaaCan: A Lightweight Authentication Architecture for Vehicle Controller Area Network.
Proceedings of the Security and Privacy in Communication Networks, 2020

A Game-Theoretic Approach for Distributed Attack Mitigation in Intelligent Transportation Systems.
Proceedings of the NOMS 2020, 2020

Optimizing Virtual Machine Migration in Multi-Clouds.
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020

Multi-Objective Interdependent VM Placement Model based on Cloud Reliability Evaluation.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Reliability-based Formation of Cloud Federations Using Game Theory.
Proceedings of the IEEE Global Communications Conference, 2020

HBD-Authority: Streaming Access Control Model for Hadoop.
Proceedings of the 6th IEEE International Conference on Dependability in Sensor, 2020

Frequency Hopping Spread Spectrum to Counter Relay Attacks in PKESs.
Proceedings of the Risks and Security of Internet and Systems, 2020

2019
Offering security diagnosis as a service for cloud SaaS applications.
J. Inf. Secur. Appl., 2019

Towards a Security Architecture for Protecting Connected Vehicles from Malware.
Proceedings of the 89th IEEE Vehicular Technology Conference, 2019

Bad-token: denial of service attacks on WPA3.
Proceedings of the 12th International Conference on Security of Information and Networks, 2019

Security Vulnerability Metrics for Connected Vehicles.
Proceedings of the 19th IEEE International Conference on Software Quality, 2019

Trust-Based Cooperative Game Model for Secure Collaboration in the Internet of Vehicles.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Securing Vehicle ECU Communications and Stored Data.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Reliability-Driven Task Assignment in Vehicular Crowdsourcing: A Matching Game.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2019

Bluetooth Low Energy Makes "Just Works" Not Work.
Proceedings of the 3rd Cyber Security in Networking Conference, 2019

Cloud-based Sybil Attack Detection Scheme for Connected Vehicles.
Proceedings of the 3rd Cyber Security in Networking Conference, 2019

WPA3 Connection Deprivation Attacks.
Proceedings of the Risks and Security of Internet and Systems, 2019

Security Features for Proximity Verification.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

CSKES: A Context-Based Secure Keyless Entry System.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

STPSA 2019 Welcome Message.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

Graphene: A Secure Cloud Communication Architecture.
Proceedings of the Applied Cryptography and Network Security Workshops, 2019

2018
Protecting Internet users from becoming victimized attackers of click-fraud.
J. Softw. Evol. Process., 2018

Preventing unauthorized access in information centric networking.
Secur. Priv., 2018

DADI: Defending against distributed denial of service in information-centric networking routing and caching.
Secur. Priv., 2018

A Taxonomy of Security as a Service.
Proceedings of the On the Move to Meaningful Internet Systems. OTM 2018 Conferences, 2018

SpyDroid: A Framework for Employing Multiple Real-Time Malware Detectors on Android.
Proceedings of the 13th International Conference on Malicious and Unwanted Software, 2018

An Adaptive Dataset for the Evaluation of Android Malware Detection Techniques.
Proceedings of the International Conference on Software Security and Assurance, 2018

Integrating Security in Cloud Application Development Cycle.
Proceedings of the International Conference on Software Security and Assurance, 2018

A Context-Aware Privacy Scheme for Crisis Situations.
Proceedings of the IEEE Global Communications Conference, 2018

CREM: A Cloud Reliability Evaluation Model.
Proceedings of the IEEE Global Communications Conference, 2018

A Dynamic App Anti-Debugging Approach on Android ART Runtime.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

Securing Web Applications with Secure Coding Practices and Integrity Verification.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

A Security Framework for ICN Traffic Management.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

Connection Dumping Vulnerability Affecting Bluetooth Availability.
Proceedings of the Risks and Security of Internet and Systems, 2018

Message from the STPSA 2018 Workshop Organizers.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Towards Security Monitoring for Cloud Analytic Applications.
Proceedings of the 4th IEEE International Conference on Big Data Security on Cloud, 2018

2017
A Reliability-Based Resource Allocation Approach for Cloud Computing.
Proceedings of the 2017 IEEE 7th International Symposium on Cloud and Service Computing, 2017

Flamingo: a framework for smartphone security context management.
Proceedings of the Symposium on Applied Computing, 2017

Detecting DNS Tunneling Using Ensemble Learning.
Proceedings of the Network and System Security - 11th International Conference, 2017

Droid Mood Swing (DMS): Automatic Security Modes Based on Contexts.
Proceedings of the Information Security - 20th International Conference, 2017

Defending Application Cache Integrity of Android Runtime.
Proceedings of the Information Security Practice and Experience, 2017

An Automatic Software Vulnerability Classification Framework.
Proceedings of the International Conference on Software Security and Assurance, 2017

Security Pattern Detection Using Ordered Matrix Matching.
Proceedings of the International Conference on Software Security and Assurance, 2017

A Participant Contribution Trust Scheme for Crisis Response Systems.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

A Constraint-based intrusion detection system.
Proceedings of the Fifth European Conference on the Engineering of Computer-Based Systems, 2017

Towards defending connected vehicles against attacks.
Proceedings of the Fifth European Conference on the Engineering of Computer-Based Systems, 2017

Message from SEPT 2017 Organizing Committee.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

TRUST-CAP: A Trust Model for Cloud-Based Applications.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
Special issue on High Assurance Systems Engineering.
Softw. Qual. J., 2016

Evaluating the impact of design pattern and anti-pattern dependencies on changes and faults.
Empir. Softw. Eng., 2016

SAM: A secure anti-malware framework for the smartphone operating systems.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

Intrusion detection in a private network by satisfying constraints.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Analysing vulnerability reproducibility for Firefox browser.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Zonedroid: control your droid through application zoning.
Proceedings of the 11th International Conference on Malicious and Unwanted Software, 2016

DACPI: A decentralized access control protocol for information centric networking.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

FCFraud: Fighting Click-Fraud from the User Side.
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016

CLOUBEX: A Cloud-Based Security Analysis Framework for Browser Extensions.
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016

A Reputation System to Evaluate Participants for Participatory Sensing.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Message from the SEPT Organizing Committee.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Message from STPSA 2016 Workshop Organizers.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

IFCaaS: Information Flow Control as a Service for Cloud Security.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
An Empirical Evaluation of Web-Based Fingerprinting.
IEEE Softw., 2015

A Classification of Intrusion Detection Systems in the Cloud.
J. Inf. Process., 2015

A Survey of Security Attacks in Information-Centric Networking.
IEEE Commun. Surv. Tutorials, 2015

FPGuard: Detection and Prevention of Browser Fingerprinting.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

Message from SEPT Symposium Organizing Committee.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

CloudZombie: Launching and Detecting Slow-Read Distributed Denial of Service Attacks from the Cloud.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

Detection and Prevention of Malicious Requests in ICN Routing and Caching.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
Preventing Cache-Based Side-Channel Attacks in a Cloud Environment.
IEEE Trans. Cloud Comput., 2014

Special issue on "Trustworthy Software Systems for the Digital Society".
J. Syst. Softw., 2014

Software control flow error detection and correlation with system performance deviation.
J. Comput. Syst. Sci., 2014

Effective detection of vulnerable and malicious browser extensions.
Comput. Secur., 2014

FRanC: A Ranking Framework for the Prioritization of Software Maintenance.
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014

Countermeasures for Mitigating ICN Routing Related DDoS Attacks.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

A Hybrid Monitoring of Software Design-Level Security Specifications.
Proceedings of the 2014 14th International Conference on Quality Software, 2014

Anti-pattern Mutations and Fault-proneness.
Proceedings of the 2014 14th International Conference on Quality Software, 2014

Classification of participatory sensing privacy schemes.
Proceedings of the IEEE 39th Conference on Local Computer Networks, Edmonton, AB, Canada, 8-11 September, 2014, 2014

On evaluating and securing firefox for Android browser extensions.
Proceedings of the 1st International Conference on Mobile Software Engineering and Systems, 2014

TabsGuard: A Hybrid Approach to Detect and Prevent Tabnabbing Attacks.
Proceedings of the Risks and Security of Internet and Systems, 2014

2013
A Model-Based Detection of Vulnerable and Malicious Browser Extensions.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013

Confeagle: Automated Analysis of Configuration Vulnerabilities in Web Applications.
Proceedings of the IEEE 7th International Conference on Software Security and Reliability, 2013

OSDC: adapting ODC for developing more secure software.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Towards a ranking framework for software components.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Runtime Prediction of Failure Modes from System Error Logs.
Proceedings of the 2013 18th International Conference on Engineering of Complex Computer Systems, 2013

Protecting Web Browser Extensions from JavaScript Injection Attacks.
Proceedings of the 2013 18th International Conference on Engineering of Complex Computer Systems, 2013

Software Assurance: What Should We Do Next?
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

EINSPECT: Evolution-Guided Analysis and Detection of Malicious Web Pages.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

Quality software for quality service (QS4QS).
Proceedings of the Center for Advanced Studies on Collaborative Research, 2013

A Server-Side Solution to Cache-Based Side-Channel Attacks in the Cloud.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013

2012
Guest Editorial: Special section on software reliability and security.
Inf. Softw. Technol., 2012

Trustworthiness testing of phishing websites: A behavior model-based approach.
Future Gener. Comput. Syst., 2012

Mitigating program security vulnerabilities: Approaches and challenges.
ACM Comput. Surv., 2012

DESERVE: A Framework for Detecting Program Security Vulnerability Exploitations.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

A Control Flow Representation for Component-Based Software Reliability Analysis.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

Mutation Testing of Event Processing Queries.
Proceedings of the 23rd IEEE International Symposium on Software Reliability Engineering, 2012

Information-Theoretic Detection of SQL Injection Attacks.
Proceedings of the 14th International IEEE Symposium on High-Assurance Systems Engineering, 2012

A Comparative Study of Software Security Pattern Classifications.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Guest Editorial.
J. Softw., 2011

Taxonomy and classification of automatic monitoring of program security vulnerability exploitations.
J. Syst. Softw., 2011

Using complexity, coupling, and cohesion metrics as early indicators of vulnerabilities.
J. Syst. Archit., 2011

Information Source-Based Classification of Automatic Phishing Website Detectors.
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011

Building components with embedded security monitors.
Proceedings of the 7th International Conference on the Quality of Software Architectures, 2011

Server Side Detection of Content Sniffing Attacks.
Proceedings of the IEEE 22nd International Symposium on Software Reliability Engineering, 2011

A Fuzzy Logic-Based Buffer Overflow Vulnerability Auditor.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

S2XS2: A Server Side Approach to Automatically Detect XSS Attacks.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

A Connection-Based Signature Approach for Control Flow Error Detection.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

A Natural Classification Scheme for Software Security Patterns.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

Security Monitoring of Components Using Aspects and Contracts in Wrappers.
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

Injecting Comments to Detect JavaScript Code Injection Attacks.
Proceedings of the Workshop Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

2010
Monitoring Buffer Overflow Attacks: A Perennial Task.
Int. J. Secur. Softw. Eng., 2010

Assessing Test Suites for Buffer Overflow Vulnerabilities.
Int. J. Softw. Eng. Knowl. Eng., 2010

Classification of Static Analysis-Based Buffer Overflow Detectors.
Proceedings of the Fourth International Conference on Secure Software Integration and Reliability Improvement, 2010

PhishTester: Automatic Testing of Phishing Attacks.
Proceedings of the Fourth International Conference on Secure Software Integration and Reliability Improvement, 2010

Failure Type-Aware Reliability Assessment with Component Failure Dependency.
Proceedings of the Fourth International Conference on Secure Software Integration and Reliability Improvement, 2010

Can complexity, coupling, and cohesion metrics be used as early indicators of vulnerabilities?
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Client-Side Detection of Cross-Site Request Forgery Attacks.
Proceedings of the IEEE 21st International Symposium on Software Reliability Engineering, 2010

Architectural Design Decisions for Achieving Reliable Software Systems.
Proceedings of the Architecting Critical Systems, First International Symposium, 2010

A taxonomy of software architecture-based reliability efforts.
Proceedings of the 2010 ICSE Workshop on Sharing and Reusing Architectural Knowledge, 2010

The Level of Decomposition Impact on Component Fault Tolerance.
Proceedings of the Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

Classification of Buffer Overflow Vulnerability Monitors.
Proceedings of the ARES 2010, 2010

2009
Collaboration through computation: incorporating trust model into service-based software systems.
Serv. Oriented Comput. Appl., 2009

A model-based aspect-oriented framework for building intrusion-aware software systems.
Inf. Softw. Technol., 2009

Towards Model-Based Automatic Testing of Attack Scenarios.
Proceedings of the Computer Safety, 2009

ATM: an automatic trust monitoring algorithm for service software.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Towards developing a trust-based security solution.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

MUTEC: Mutation-based testing of Cross Site Scripting.
Proceedings of the ICSE Workshop on Software Engineering for Secure Systems, 2009

Secure Method Calls by Instrumenting Bytecode with Aspects.
Proceedings of the Data and Applications Security XXIII, 2009

Activity and Artifact Views of a Secure Software Development Process.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Automatic Testing of Program Security Vulnerabilities.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

On Selecting Appropriate Development Processes and Requirements Engineering Methods for Secure Software.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

2008
Random-Forests-Based Network Intrusion Detection Systems.
IEEE Trans. Syst. Man Cybern. Part C, 2008

Architecture and Implementation of a trust Model for Pervasive Applications.
J. Mobile Multimedia, 2008

CAT: a context-aware trust model for open and dynamic systems.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

UMLtrust: towards developing trust-aware software.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

An anomaly intrusion detection method using the CSI-KNN algorithm.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

MUSIC: Mutation-based SQL Injection Vulnerability Checking.
Proceedings of the Eighth International Conference on Quality Software, 2008

On Failure Propagation in Component-Based Software Systems.
Proceedings of the Eighth International Conference on Quality Software, 2008

Security metrics for source code structures.
Proceedings of the Fourth International Workshop on Software Engineering for Secure Systems, 2008

Mutation-Based Testing of Format String Bugs.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008

At What Level of Granularity Should We be Componentizing for Software Reliability?
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008

Towards Secure Trust Bootstrapping in Pervasive Computing Environment.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008

Mutation-Based Testing of Buffer Overflow Vulnerabilities.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

Quantifying Security in Secure Software Development Phases.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

STPSA 2008 Workshop Organization.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

Message from the STPSA 2008 Workshop Organizers.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

A Distributed Defense Framework for Flooding-Based DDoS Attacks.
Proceedings of the The Third International Conference on Availability, 2008

Towards Incorporating Discrete-Event Systems in Secure Software Development.
Proceedings of the The Third International Conference on Availability, 2008

An Intrusion-Tolerant Mechanism for Intrusion Detection Systems.
Proceedings of the The Third International Conference on Availability, 2008

2007
Intrusion detection aware component-based systems: A specification-based framework.
J. Syst. Softw., 2007

A software-based trust framework for distributed industrial management systems.
J. Syst. Softw., 2007

Integrating software specifications into intrusion detection.
Int. J. Inf. Sec., 2007

Packet Filtering Based on Source Router Marking and Hop-Count.
Proceedings of the 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 2007

E-NIPS: An Event-Based Network Intrusion Prediction System.
Proceedings of the Information Security, 10th International Conference, 2007

Detecting Flooding-Based DDoS Attacks.
Proceedings of IEEE International Conference on Communications, 2007

The Power of Temporal Pattern Processing in Anomaly Intrusion Detection.
Proceedings of IEEE International Conference on Communications, 2007

Improving Reliability and Safety by Trading off Software Failure Criticalities.
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007

Towards an Aspect-Oriented Intrusion Detection Framework.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

ACIR: An Aspect-Connector for Intrusion Response.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

AsmLSec: An Extension of Abstract State Machine Language for Attack Scenario Specification.
Proceedings of the The Second International Conference on Availability, 2007

2006
Bridging the gap: software specification meets intrusion detector.
Proceedings of the 2006 International Conference on Privacy, 2006

Anomaly Based Network Intrusion Detection with Unsupervised Outlier Detection.
Proceedings of IEEE International Conference on Communications, 2006

UMLintr: A UML Profile for Specifying Intrusions.
Proceedings of the 13th Annual IEEE International Conference and Workshop on Engineering of Computer Based Systems (ECBS 2006), 2006

Efficacy of Hidden Markov Models Over Neural Networks in Anomaly Intrusion Detection.
Proceedings of the 30th Annual International Computer Software and Applications Conference, 2006

A Trust Framework for Pervasive Computing Environments.
Proceedings of the 2006 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2006), 2006

A Hybrid Network Intrusion Detection Technique Using Random Forests.
Proceedings of the The First International Conference on Availability, 2006

A Dependable Device Discovery Approach for Pervasive Computing Middleware.
Proceedings of the The First International Conference on Availability, 2006

2005
Towards automatic monitoring of component-based software systems.
J. Syst. Softw., 2005

Routeguard: an intrusion detection and response system for mobile ad hoc networks.
Proceedings of the 2005 IEEE International Conference on Wireless And Mobile Computing, 2005

DIDMA: A Distributed Intrusion Detection System Using Mobile Agents.
Proceedings of the 6th ACIS International Conference on Software Engineering, 2005

A Software Implementation of a Genetic Algorithm Based Approach to Network Intrusion Detection.
Proceedings of the 6th ACIS International Conference on Software Engineering, 2005

Network Intrusion Detection using Random Forests.
Proceedings of the Third Annual Conference on Privacy, 2005

Towards an Intrusion Detection System for Pervasive Computing Environments.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Detecting Intrusions Specified in a Software Specification Language.
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005

2004
Towards Developing Sensor Networks Monitoring as a Middleware Service.
Proceedings of the 33rd International Conference on Parallel Processing Workshops (ICPP 2004 Workshops), 2004

2002
Assume-Guarantee Algorithms for Automatic Detection of Software Failures.
Proceedings of the Integrated Formal Methods, Third International Conference, 2002

A Compositional Approach to Monitoring Distributed Systems.
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002

2001
Assume-Guarantee Supervisor for Concurrent Systems.
Proceedings of the 15th International Parallel & Distributed Processing Symposium (IPDPS-01), 2001


  Loading...