Muhammad Qasim Ali

According to our database1, Muhammad Qasim Ali authored at least 14 papers between 2008 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Randomization-Based Intrusion Detection System for Advanced Metering Infrastructure.
ACM Trans. Inf. Syst. Secur., 2015

Towards a science of anomaly detection system evasion.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Firewall Policy Reconnaissance: Techniques and Analysis.
IEEE Trans. Inf. Forensics Secur., 2014

Information theoretic feature space slicing for statistical anomaly detection.
J. Netw. Comput. Appl., 2014

Two-tier data-driven intrusion detection for automatic generation control in smart grid.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2013
Automated Anomaly Detector Adaptation using Adaptive Threshold Tuning.
ACM Trans. Inf. Syst. Secur., 2013

Randomizing AMI configuration for proactive defense in smart grid.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013

Probabilistic model checking for AMI intrusion detection.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013

Revisiting anomaly detection system design philosophy.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Configuration-based IDS for advanced metering infrastructure.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
On stochastic risk ordering of network services for proactive security management.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

2011
Accuracy improving guidelines for network anomaly detection systems.
J. Comput. Virol., 2011

2009
On achieving good operating points on an ROC plane using stochastic anomaly score prediction.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
A Comparative Evaluation of Anomaly Detectors under Portscan Attacks.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008


  Loading...