Salmin Sultana

According to our database1, Salmin Sultana authored at least 20 papers between 2008 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
HeNet: A Deep Learning Approach on Intel® Processor Trace for Effective Exploit Detection.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

2017
A System for Response and Prevention of Security Incidents in Wireless Sensor Networks.
TOSN, 2017

2015
Effective Key Management in Dynamic Wireless Sensor Networks.
IEEE Trans. Information Forensics and Security, 2015

A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks.
IEEE Trans. Dependable Sec. Comput., 2015

A Distributed System for The Management of Fine-grained Provenance.
J. Database Manag., 2015

2014
A roadmap for privacy-enhanced secure data provenance.
J. Intell. Inf. Syst., 2014

Kinesis: a security incident response and prevention system for wireless sensor networks.
Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems, 2014

Secure data provenance compression using arithmetic coding in wireless sensor networks.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014

2013
Secure Provenance Transmission for Streaming Data.
IEEE Trans. Knowl. Data Eng., 2013

SYREN: Synergistic Link Correlation-Aware and Network Coding-Based Dissemination in Wireless Sensor Networks.
Proceedings of the 2013 IEEE 21st International Symposium on Modelling, 2013

A file provenance system.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

2012
Link correlation and network coding in broadcast protocols for wireless sensor networks.
Proceedings of the 9th Annual IEEE Communications Society Conference on Sensor, 2012

A Comprehensive Model for Provenance.
Proceedings of the Provenance and Annotation of Data and Processes, 2012

A Lightweight Secure Provenance Scheme for Wireless Sensor Networks.
Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems, 2012

A Comprehensive Model for Provenance.
Proceedings of the Advances in Conceptual Modeling, 2012

Demonstrating a lightweight data provenance for sensor networks.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
A Provenance Based Mechanism to Identify Malicious Packet Dropping Adversaries in Sensor Networks.
Proceedings of the 31st IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2011 Workshops), 2011

2010
Characterizing Failures in Mobile OSes: A Case Study with Android and Symbian.
Proceedings of the IEEE 21st International Symposium on Software Reliability Engineering, 2010

A selective encryption approach to fine-grained access control for P2P file sharing.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

2008
Ubicomp secretary: a web service based ubiquitous computing application.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008


  Loading...