Salmin Sultana

According to our database1, Salmin Sultana authored at least 24 papers between 2008 and 2023.

Collaborative distances:



In proceedings 
PhD thesis 




MEMES: Memory Encryption-Based Memory Safety on Commodity Hardware.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

EC-CFI: Control-Flow Integrity via Code Encryption Counteracting Fault Attacks.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2023

Cryptographic Capability Computing.
Proceedings of the MICRO '21: 54th Annual IEEE/ACM International Symposium on Microarchitecture, 2021

Barnum: Detecting Document Malware via Control Flow Anomalies in Hardware Traces.
Proceedings of the Information Security - 22nd International Conference, 2019

HeNet: A Deep Learning Approach on Intel® Processor Trace for Effective Exploit Detection.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

A System for Response and Prevention of Security Incidents in Wireless Sensor Networks.
ACM Trans. Sens. Networks, 2017

Effective Key Management in Dynamic Wireless Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2015

A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks.
IEEE Trans. Dependable Secur. Comput., 2015

A Distributed System for The Management of Fine-grained Provenance.
J. Database Manag., 2015

Digital provenance - models, systems, and applications
PhD thesis, 2014

A roadmap for privacy-enhanced secure data provenance.
J. Intell. Inf. Syst., 2014

Kinesis: a security incident response and prevention system for wireless sensor networks.
Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems, 2014

Secure data provenance compression using arithmetic coding in wireless sensor networks.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014

Secure Provenance Transmission for Streaming Data.
IEEE Trans. Knowl. Data Eng., 2013

SYREN: Synergistic Link Correlation-Aware and Network Coding-Based Dissemination in Wireless Sensor Networks.
Proceedings of the 2013 IEEE 21st International Symposium on Modelling, 2013

A file provenance system.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

Link correlation and network coding in broadcast protocols for wireless sensor networks.
Proceedings of the 9th Annual IEEE Communications Society Conference on Sensor, 2012

A Lightweight Secure Provenance Scheme for Wireless Sensor Networks.
Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems, 2012

A Comprehensive Model for Provenance.
Proceedings of the Advances in Conceptual Modeling, 2012

Demonstrating a lightweight data provenance for sensor networks.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

A Provenance Based Mechanism to Identify Malicious Packet Dropping Adversaries in Sensor Networks.
Proceedings of the 31st IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2011 Workshops), 2011

Characterizing Failures in Mobile OSes: A Case Study with Android and Symbian.
Proceedings of the IEEE 21st International Symposium on Software Reliability Engineering, 2010

A selective encryption approach to fine-grained access control for P2P file sharing.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

Ubicomp secretary: a web service based ubiquitous computing application.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008