Salmin Sultana

According to our database1, Salmin Sultana authored at least 23 papers between 2008 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
MEMES: Memory Encryption-Based Memory Safety on Commodity Hardware.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

EC-CFI: Control-Flow Integrity via Code Encryption Counteracting Fault Attacks.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2023

2021
Cryptographic Capability Computing.
Proceedings of the MICRO '21: 54th Annual IEEE/ACM International Symposium on Microarchitecture, 2021

2019
Barnum: Detecting Document Malware via Control Flow Anomalies in Hardware Traces.
Proceedings of the Information Security - 22nd International Conference, 2019

2018
HeNet: A Deep Learning Approach on Intel® Processor Trace for Effective Exploit Detection.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

2017
A System for Response and Prevention of Security Incidents in Wireless Sensor Networks.
ACM Trans. Sens. Networks, 2017

2015
Effective Key Management in Dynamic Wireless Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2015

A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks.
IEEE Trans. Dependable Secur. Comput., 2015

A Distributed System for The Management of Fine-grained Provenance.
J. Database Manag., 2015

2014
A roadmap for privacy-enhanced secure data provenance.
J. Intell. Inf. Syst., 2014

Kinesis: a security incident response and prevention system for wireless sensor networks.
Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems, 2014

Secure data provenance compression using arithmetic coding in wireless sensor networks.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014

2013
Secure Provenance Transmission for Streaming Data.
IEEE Trans. Knowl. Data Eng., 2013

SYREN: Synergistic Link Correlation-Aware and Network Coding-Based Dissemination in Wireless Sensor Networks.
Proceedings of the 2013 IEEE 21st International Symposium on Modelling, 2013

A file provenance system.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

2012
Link correlation and network coding in broadcast protocols for wireless sensor networks.
Proceedings of the 9th Annual IEEE Communications Society Conference on Sensor, 2012

A Lightweight Secure Provenance Scheme for Wireless Sensor Networks.
Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems, 2012

A Comprehensive Model for Provenance.
Proceedings of the Advances in Conceptual Modeling, 2012

Demonstrating a lightweight data provenance for sensor networks.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
A Provenance Based Mechanism to Identify Malicious Packet Dropping Adversaries in Sensor Networks.
Proceedings of the 31st IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2011 Workshops), 2011

2010
Characterizing Failures in Mobile OSes: A Case Study with Android and Symbian.
Proceedings of the IEEE 21st International Symposium on Software Reliability Engineering, 2010

A selective encryption approach to fine-grained access control for P2P file sharing.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

2008
Ubicomp secretary: a web service based ubiquitous computing application.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008


  Loading...